Other Protected Information Sample Clauses

Other Protected Information. The use and/or disclosure of any Consumer Personal Information, Company Customer Information, and/or Bank Cardholder Information shall be subject to Applicable Law, Section 2.8, and this Section 10.17.
AutoNDA by SimpleDocs
Other Protected Information. Other information protected by state and federal laws and regulations includes, but is not limited to:
Other Protected Information. The CAC will report all other privacy incidents and security incidents to State. a. Initial report. The CAC will report all other privacy and security incidents to State, in writing, within five (5) days of discovery. If the CAC is unable to complete its investigation of, and response to, a privacy incident or security incident within five (5) days of discovery, then the CAC will provide State with all information under Section 2.2(E)(1)-(4), of this Attachment that are available to the CAC at the time of the initial report.
Other Protected Information. COUNTY will report all other Privacy Incidents, Security Incidents, and/or Breaches to STATE. a. Initial report. COUNTY will report all other Privacy Incidents, Security Incidents, and/or Breaches to STATE, in writing, within five (5) calendar days of discovery. If COUNTY is unable to complete its investigation of, and response to, a Privacy Incident, Security Incident, and/or Breach within five b. Final report. COUNTY will, upon completion of its investigation of and response to a Privacy Incident, Security Incident, and/or Breach, or upon STATE’s request in accordance with subsection 2.2(E)(5) submit in writing a report to STATE documenting all actions taken under subsections 2.2(E)(1)– (4), of this Attachment.
Other Protected Information. COUNTY will report all other Privacy Incidents, Security Incidents, and/or Breaches to STATE. a. Initial report. COUNTY will report all other Privacy Incidents, Security Incidents, and/or Breaches to STATE, in writing, within five (5) calendar days of discovery. If COUNTY is unable to complete its investigation of, and response to, a Privacy Incident, Security Incident, and/or Breach within five b. Final report. COUNTY will, upon completion of its investigation of and response to a Privacy Incident, Security Incident, and/or Breach, or upon
Other Protected Information. Contractor will report all other privacy incidents and security incidents to State. a. Initial report. Contractor will report all other privacy and security incidents to State, in writing, within five (5) days of discovery. If Contractor is unable to complete its investigation of, and response to, a privacy incident or security incident within five (5) days of discovery, then Contractor will provide State with all information under Section 2.2(E)(1)-(4), of this Attachment that are available to Contractor at the time of the initial report.
Other Protected Information. Each Responsible Party will report all other Privacy Incidents and/or Security Incidents, to the other party. a. Initial report. The Responsible Party will report all other Privacy Incidents and/or Security Incidents to the other party, in writing, within five (5) calendar days of discovery. If the Responsible Party is unable to complete its investigation of, and response to, a Privacy Incident, Security Incident, and/or Breach within five (5) calendar days of discovery, then the Responsible Party will provide the other party with all information under subsections 6.2.F(1)–(4), of this Agreement that are available to the Responsible Party at the time of the initial report, and provide updated reports as additional information becomes available.
AutoNDA by SimpleDocs
Other Protected Information. The use and/or disclosure of any Consumer Personal Information shall be subject to Applicable Law, and this Section 6 (j).
Other Protected Information. Tribe will report all other privacy incidents and security incidents to State. a. Initial report. Tribe will report all other privacy and security incidents to State, in writing, within five (5) days of discovery. If Tribe is unable to complete its investigation of, and response to, a privacy incident or security incident within five (5) days of discovery, then Tribe will provide State with all information under Section 2.2(E)(1)-(4), of this Attachment that are available to Tribe at the time of the initial report.

Related to Other Protected Information

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Protected Information 5.3.1 In this Section "Protected Information" means:

  • Confidential Information Protections 4.1 At all times during and after the Employee’s employment, the Employee will hold in confidence and will not disclose, use, lecture upon, or publish any of Company’s Confidential Information (defined below), except as may be required in connection with the Employee’s work for Company, or as expressly authorized by the Board. The Employee will obtain the written approval of the Board before publishing or submitting for publication any material (written, oral, or otherwise) that relates to the Employee’s work at Company and/or incorporates any Confidential Information. The Employee hereby assigns to Company any rights the Employee may have or acquire in any and all Confidential Information and recognize that all Confidential Information shall be the sole and exclusive property of Company and its assigns.

  • Requested Information with reasonable promptness, such other data and information relating to the business, operations, affairs, financial condition, assets or properties of the Company or any of its Subsidiaries or relating to the ability of the Company to perform its obligations hereunder and under the Notes as from time to time may be reasonably requested by any such holder of Notes.

  • Use and Disclosure of Protected Health Information The Business Associate must not use or further disclose protected health information other than as permitted or required by the Contract or as required by law. The Business Associate must not use or further disclose protected health information in a manner that would violate the requirements of HIPAA Regulations.

  • Other Confidential Consumer Information Party agrees to comply with the requirements of AHS Rule No. 08-048 concerning access to and uses of personal information relating to any beneficiary or recipient of goods, services or other forms of support. Party further agrees to comply with any applicable Vermont State Statute and other regulations respecting the right to individual privacy. Party shall ensure that all of its employees, subcontractors and other service providers performing services under this agreement understand and preserve the sensitive, confidential and non-public nature of information to which they may have access.

  • Electronic Protected Health Information “Electronic Protected Health Information” means individually identifiable health information that is transmitted by or maintained in electronic media.

  • Protected Health Information “Protected Health Information” shall have the same meaning as the term “protected health information” in Section 160.103 and is limited to the information created or received by Contractor from or on behalf of County.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Employer Information The Employer shall supply full and timely information to the Administrator on all matters relating to the Executive’s compensation, death, Disability or Separation from Service, and such other information as the Administrator reasonably requires.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!