No Access to PHI Sample Clauses

No Access to PHI. In the event Supplier does not require access to PHI in order to perform Services pursuant to this Agreement, and Supplier has unintentionally received PHI, Supplier will notify UC immediately and Supplier shall use commercially reasonable efforts to return the PHI to UC, as applicable, and to maintain the confidentiality of the PHI. Additionally, in the event the nature of the Goods and/or Services change such as to require Supplier to have access to PHI, Supplier will notify UC, as applicable, and Supplier will execute and deliver the UC Appendix - Business Associate or modify the terms of this Agreement.
AutoNDA by SimpleDocs
No Access to PHI. Unless UC so specifically indicates in any of the Incorporated Documents, it is not anticipated that Supplier will require access to “Protected Health Information,” as defined by the privacy and security standards of HIPAA, the regulations promulgated thereunder by the U.S. Department of Health and Human Services, or “Medical Information” (collectively with Protected Health Information, “PHI”), as defined by the California Confidentiality of Medical Information Act, California Civil Code §§ 56-56.16 or California Health and Safety Code §1280.15 and California Civil Code §§ 1798.82 and 1798.29 in order to perform its obligations under the Agreement. However, in the event that Supplier has unintentionally received PHI, Supplier will notify UC immediately and Supplier shall use commercially reasonable efforts to return the PHI to UC, as applicable, and to maintain the confidentiality of the PHI. Additionally, in the event the nature of the Good and/or Services change such as to require Supplier to have access to PHI, Supplier will notify UC, as applicable, and Supplier will execute and deliver the UC HIPAA Business Associate Agreement.
No Access to PHI. You acknowledge and agree that: (i) Sherweb is not acting on Your behalf as a Business Associate for the purposes of the U.S. Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) as amended and supplemented; (ii) You shall not provide, transmit or otherwise disclose protected health information (“PHI”) to Sherweb; and (iii) the Services will not be used in any manner that would require Sherweb or the Services to be compliant with HIPAA, the U.S. Health Information Technology for Economic and Clinical Health Act ( “HITECH”) as amended and supplemented, or their enabling regulations, or similar state laws or regulations. You are solely responsible to ensure that its use of the Services will not result in any of the foregoing clauses becoming inaccurate. In this paragraph, the terms, “Business Associate”, subcontractor, “protected health information”, and “PHI” shall have the meanings described in HIPAA, HITECH, their enabling regulations, or similar state laws or regulations.
No Access to PHI. In the event Supplier does not require access to PHI in order to perform Services pursuant to this Agreement, and Supplier has unintentionally received PHI, Supplier will notify UC immediately and Supplier shall use commercially reasonable efforts to return the PHI to UC, as applicable, and to maintain the confidentiality of the PHI. Additionally, in the event the nature of the Good and/or Services change such as to require Supplier to have access to PHI, Supplier will notify UC, as applicable, and Supplier will execute and deliver the UC HIPAA Business Associate Agreement or modify the terms of this Agreement. UC and Supplier believe an essential element of advancing the core objectives and mission of UC is to encourage the development of health care technology that significantly improves the quality, process and/or outcome of care. In support of this belief, the Parties acknowledge that certain products and implants which incorporate breakthrough technologies have the potential to significantly improve non-clinical operational efficiency, or improved clinical outcomes when compared to the level of safety, operational efficiency, process of care and/or outcomes delivered through use of the products covered under this Agreement (hereafter, "New Technology Products"). New Technology Products shall be disclosed to UC promptly upon such products’ commercial availability. New Technology Products will not be provided to UC without prior review and approval by UC. Should such New Technology Products become available, UC will conduct an evaluation to determine if the product meets facility criteria and clinical needs. Supplier shall cooperate with UC’s efforts to evaluate such New Technology Products, including, but not limited to, providing UC with information and/or training pertaining to the products. If UC agrees to accept a New Technology Product following evaluation, UC and Supplier shall negotiate final pricing and product conversion (if required) based on the contract pricing of the nearest comparable product(s) available to UC for purchase under the Agreement for which pricing has been mutually agreed upon at the time of release. Following the negotiation of pricing terms for such approved New Technology Products, the parties shall amend in writing any of the Incorporated Documents as necessary to identify the New Technology Products available to UC and Customers under this Agreement, and the pricing agreed upon. Invoices that contain New Technology Prod...
No Access to PHI. It is not anticipated that Supplier will require access to “Protected Health Information,” as defined by the privacy and security standards of HIPAA, the regulations promulgated thereunder by the U.S. Department of Health and Human Services, or “Medical Information” (collectively with Protected Health Information, “PHI”), as defined by the California Confidentiality of Medical Information Act, California Civil Code §§ 56-56.16 or California Health and Safety Code §1280.15 and California Civil Code §§ 1798.82 and 1798.29 in order to perform its obligations under the Agreement. However, in the event that Supplier has unintentionally received PHI, Supplier will notify UCLA immediately and Supplier shall use commercially reasonable efforts to return the PHI to UCLA, as applicable, and to maintain the confidentiality of the PHI. Additionally, in the event the nature of the Good and/or Services change such as to require Supplier to have access to PHI, Supplier will notify UCLA, as applicable, and Supplier will execute and deliver the UCLA HIPAA Business Associate Agreement.

Related to No Access to PHI

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to NID 2.7.3.1 NewPhone may access the customer’s premises wiring by any of the following means and NewPhone shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID: 2.7.3.1.1 BellSouth shall allow NewPhone to connect its Loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premises; 2.7.3.1.2 Where an adequate length of the customer’s premises wiring is present and environmental conditions permit, either Party may remove the customer premises wiring from the other Party’s NID and connect such wiring to that Party’s own NID; 2.7.3.1.3 Either Party may enter the subscriber access chamber or dual chamber NID enclosures for the purpose of extending a cross-connect or spliced jumper wire from the customer premises wiring through a suitable “punch-out” hole of such NID enclosures; or 2.7.3.1.4 NewPhone may request BellSouth to make other rearrangements to the customer premises wiring terminations or terminal enclosure on a time and materials cost basis. 2.7.3.2 In no case shall either Party remove or disconnect the other Party’s loop facilities from either Party’s NIDs, enclosures, or protectors unless the applicable Commission has expressly permitted the same and the disconnecting Party provides prior notice to the other Party. In such cases, it shall be the responsibility of the Party disconnecting loop facilities to leave undisturbed the existing form of electrical protection and to maintain the physical integrity of the NID. It will be NewPhone’s responsibility to ensure there is no safety hazard, and NewPhone will hold BellSouth harmless for any liability associated with the removal of the BellSouth Loop from the BellSouth NID. Furthermore, it shall be the responsibility of the disconnecting Party, once the other Party’s loop has been disconnected from the NID, to reconnect the disconnected loop to a nationally recognized testing laboratory listed station protector, which has been grounded as per Article 800 of the National Electrical Code. If no spare station protector exists in the NID, the disconnected loop must be appropriately cleared, capped and stored. 2.7.3.3 NewPhone shall not remove or disconnect ground wires from BellSouth’s NIDs, enclosures, or protectors. 2.7.3.4 NewPhone shall not remove or disconnect NID modules, protectors, or terminals from BellSouth’s NID enclosures. 2.7.3.5 Due to the wide variety of NID enclosures and outside plant environments, BellSouth will work with NewPhone to develop specific procedures to establish the most effective means of implementing this section if the procedures set forth herein do not apply to the NID in question.

  • Access to Employees Staff representatives of the Union shall be allowed to visit work areas of employees during working hours and confer on conditions of employment to the extent that such visitations do not disrupt the work activities of the area being visited. Prior to entering the work area, the representative shall receive permission from the appropriate department head or his/her designee stating the reason(s) for such visitations. Permission shall not be unreasonably denied.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • Access to Property Borrower shall permit agents, representatives and employees of Lender to inspect the Property or any part thereof at reasonable hours upon reasonable advance notice.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.

  • Use of Attachment Facilities by Third Parties Purpose of Attachment Facilities.‌‌ Except as may be required by Applicable Laws and Regulations, or as otherwise agreed to among the Parties, the Attachment Facilities shall be constructed for the sole purpose of interconnecting the Large Generating Facility to the New York State Transmission System and shall be used for no other purpose.

  • Use of Interconnection Facilities by Third Parties 6551 Error! Hyperlink reference not valid.9.9.1 Purpose of Interconnection Facilities. 6551

  • Access to Properties Subject to the rights of Tenants, Borrower shall permit agents, representatives and employees of Lender to inspect the Properties or any part thereof at reasonable hours upon reasonable advance notice.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!