Notification of Breach and Notification of Suspected Breach Sample Clauses

Notification of Breach and Notification of Suspected Breach. The Procuring Party shall notify TennCare’s Privacy Office immediately upon becoming aware of any incident, either confirmed or suspected, that represents or may represent unauthorized access, use or disclosure of encrypted or unencrypted computerized data that materially compromises the security, confidentiality, or integrity of enrollee PHI maintained or held by the Procuring Party, including any unauthorized acquisition of enrollee PHI by an employee or otherwise authorized user of the Procuring Party’s system. This includes, but is not limited to, loss or suspected loss of remote computing or telework devices such as laptops, tablets, PDAs, smartphones, flash drives, CD/DVDs, and/or other fixed or portable storage media.
AutoNDA by SimpleDocs
Notification of Breach and Notification of Suspected Breach. The Contractor shall notify TennCare’s Privacy Office immediately upon becoming aware of and in no case later than forty-eight (48) hours after discovery of any incident, either confirmed or suspected, that represents or may represent unauthorized access, use or disclosure of encrypted or unencrypted computerized data that materially compromises the security, confidentiality, or integrity of enrollee PHI maintained or held by the Contractor, including any unauthorized acquisition of enrollee PHI by an employee or otherwise authorized user of the Contractor ’s system. This includes, but is not limited to, loss or suspected loss of remote computing or telework devices such as laptops, PDAs, Blackberrys or other Smartphones, USB drives, thumb drives, flash drives, CDs, and/or disks.
Notification of Breach and Notification of Suspected Breach. UNIVERSITY shall notify TennCare's Privacy Office immediately upon becoming aware of and in no case later than forty-eight (48) hours after discovery of any incident, either confirmed or suspected, that represents or may represent unauthorized access, use or disclosure of encrypted or unencrypted computerized data that materially compromises the security, confidentiality, or integrity of enrollee PHI maintained or held by UNIVERSITY, including any unauthorized acquisition of enrollee PHI by an employee or otherwise authorized user of a UNIVERSITY system. This includes, but is not limited to, loss or suspected loss of remote computing or telework devices such as laptops, PDAs, Blackberrys or other Smartphones, USB drives, thumb drives, flash drives, CDs, and/or disks.
Notification of Breach and Notification of Suspected Breach. The Grantee shall notify TennCare’s Privacy Office immediately upon becoming aware of and in no case later than forty-eight (48) hours af ter discovery of any incident, either confirmed or suspected, that represents or may represent unauthorized access, use or disclosure of encrypted or unencrypted computerized data that materially compromises the security, confidentiality, or integrity of a TennCare enrollee’s Protected Health Information (PHI) maintained or held by the Grantee including any unauthorized acquisition of enrollee PHI by an employee or otherwise authorized user of the Grantee’s system. This includes, but is not limited to, loss or suspected loss of remote computing or telework devices such as laptops, Personal Digital Assistants (PDAs), Blackberry devices (or other Smartphones), Universal Serial Bus (USB) drives, thumb drives, flash drives, Compact Discs (CDs), and/or hard disks.
Notification of Breach and Notification of Suspected Breach. The Procuring Party shall notify TennCare Privacy Office immediately upon becoming aware of any incident, either confirmed or suspected, that represents or may represent unauthorized access, use or disclosure of encrypted or unencrypted computerized data that materially compromises the security, confidentiality, or integrity of enrollee PHI maintained or held by the Procuring Party, including any unauthorized acquisition of enrollee PHI by an employee or otherwise authorized user of the Procuring Party loss or suspected loss of remote computing or telework devices such as laptops, tablets, PDAs, smartphones, flash drives, CD/DVDs, and/or other fixed or portable storage media.
Notification of Breach and Notification of Suspected Breach. The Contractor shall notify TennCare’s Privacy Office in accordance with the HIPAA Business Associate Agreement.
Notification of Breach and Notification of Suspected Breach. The Grantee shall notify TennCare’s Privacy Office immediately upon becoming aware of and in no case later than forty-eight (48) hours after discovery of any incident, either confirmed or suspected, that represents or may represent unauthorized access, use or disclosure of encrypted or unencrypted computerized data that materially compromises the security, confidentiality, or integrity of enrollee PHI maintained or held by the Grantee, including any unauthorized acquisition of enrollee PHI by an employee or otherwise authorized user of the Grantee’s system. This includes, but is not limited to, loss or suspected loss of remote computing or telework devices such as laptops, PDAs, Blackberrys or other Smartphones, USB drives, thumb drives, flash drives, CDs, and/or disks.
AutoNDA by SimpleDocs

Related to Notification of Breach and Notification of Suspected Breach

  • Notification of Breach During the term of this Agreement:

  • Notification of Possible Breach BA shall notify CE within twenty-four (24) hours of any suspected or actual breach of Protected Information; any use or disclosure of Protected Information not permitted by the Contract or Addendum; any security incident (i.e., any attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in and information system) related to Protected Information, and any actual or suspected use or disclosure of data in violation of any applicable federal or state laws by BA or its agents or subcontractors. The notification shall include, to the extent possible, the identification of each individual whose unsecured Protected Information has been, or is reasonably believed by the BA to have been, accessed, acquired, used, or disclosed, as well as any other available information that CE is required to include in notification to the individual, the media, the Secretary, and any other entity under the Breach Notification Rule and any other applicable state or federal laws, including, but not limited to, 45 C.F.R. Section 164.404 through 45 C.F.R. Section 164.408, at the time of the notification required by this paragraph or promptly thereafter as information becomes available. BA shall take (i) prompt corrective action to cure any deficiencies and (ii) any action pertaining to unauthorized uses or disclosures required by applicable federal and state laws [42 U.S.C. Section 17921; 45 C.F.R. Section 164.504(e)(2)(ii)(c); 45 C.F.R. Section164.308(b)].

  • Notification of Anticipatory Breach Vendor agrees that should it, for any reason, not be able to provide or maintain appropriate safeguards to fulfill its obligations under this Section, it will immediately inform Citizens in writing of such inability and such inability on Vendor’s part will serve as justification for Citizens’ termination of this Agreement, at Citizens’ sole election, at any time after the inability becomes known to Citizens.

  • Data Breach Notification Seller will promptly notify Buyer of any actual or potential exposure or misappropriation of Buyer data ("breach") that comes to Seller's attention. Seller will cooperate with Xxxxx and in investigating any such breach, at Xxxxxx's expense. Seller will likewise cooperate with Buyer and, as applicable, with law enforcement agencies in any effort to notify injured or potentially injured parties, and such cooperation will be at Seller's expense, except to the extent that the breach was caused by Xxxxx. The remedies and obligations set forth in this subsection are in addition to any others Buyer may have, including, but not limited to, any requirements in the “Privacy, Confidentiality, and Security” provisions of this Agreement.

  • TERMINATION BY MPS - BREACH BY CONTRACTOR If Contractor fails to fulfill its obligations under this Contract in a timely or proper manner, or violates any of its provisions, MPS shall thereupon have the right to terminate it by giving five (5) days written notice before the effective date of termination of the Contract, specifying the alleged violations, and effective date of termination. The Contract shall not be terminated if, upon receipt of the notice, Contractor promptly cures the alleged violation with five (5) days. In the event of termination, MPS will only be liable for services rendered through the date of termination and not for the uncompleted portion, or for any materials or services purchased or paid for by Contractor for use in completing the Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.