ACCESS TO PROTECTED HEALTH INFORMATION 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524. 7.2 If any Individual requests access to Protected Health Information directly from Business Associate or its agents or Subcontractors, Business Associate shall notify Covered Entity in writing within two (2) days of the receipt of the request. Whether access shall be provided or denied shall be determined by Covered Entity. 7.3 To the extent that Business Associate maintains Protected Health Information that is subject to access as set forth above in one or more Designated Record Sets electronically and if the Individual requests an electronic copy of such information, Business Associate shall provide the Individual with access to the Protected Health Information in the electronic form and format requested by the Individual, if it is readily producible in such form and format; or, if not, in a readable electronic form and format as agreed to by Covered Entity and the Individual.
Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.
Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.
Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.
Line Information Database LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, MyLineToo must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.
Restricted Access (a) Buyer agrees that the Facilities themselves contain Seller’s valuable trade secrets. Buyer agrees (i) to restrict the use of such information to matters relating to the Facilities, and (ii) to restrict access to such information as provided in Section 10.3(b). (b) Seller’s Confidential Information will not be reproduced without Seller’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Seller upon written request (not to be made while materials are still of use to the operation of a Facility and no Buyer Default has occurred and is continuing), unless otherwise agreed by the Parties. Buyer’s Confidential Information will not be reproduced by Seller without Buyer’s prior written consent, and following termination of this Agreement all copies of such written information will be returned to Buyer upon written request or shall be certified by Seller as having been destroyed. (c) Subject to ARTICLE XI and Section 10.2(a) and (b) hereof, the Facilities are offered for sale and are sold by Seller subject to the condition that such sale does not convey any license, expressly or by implication, to manufacture, reverse engineer, duplicate or otherwise copy or reproduce any part of the Facilities, documentation or Software without Seller’s express advance written permission. Subject to ARTICLE XI hereof, Buyer agrees not to remove the covering, not to access the interior or to reverse engineer, or cause or knowingly allow any third party to open, access the interior or reverse engineer any Facility or Software provided by Seller. Subject to ARTICLE XI hereof, and anything contemplated pursuant to this Agreement, only Seller or its authorized representatives may open or access the interior of a Facility. Notwithstanding the foregoing or anything else herein to the contrary, and without limitation of the rights set forth in ARTICLE XI hereof, if any Facility is no longer covered by this Agreement or another agreement between Buyer and Seller (or any Affiliate of Seller) regarding the operation and maintenance of such Facility, Buyer shall be entitled to maintain, or cause a third party to maintain, such Facility, including replacing parts or components as needed or desired; provided that Buyer shall use commercially reasonable efforts to engage a third party to provide such maintenance that is not a competitor of Seller or its Affiliates and is not in litigation or other material dispute with Seller.
Electronic Protected Health Information “Electronic Protected Health Information” (“EPHI”) means individually identifiable health information that is transmitted or maintained in electronic media, limited to the information created, received, maintained or transmitted by Business Associate from or on behalf of Covered Entity.
Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.
Line Information Database (LIDB 9.1 BellSouth will store in its Line Information Database (LIDB) records relating to service only in the BellSouth region. The LIDB Storage Agreement is included in this Attachment as Exhibit C. 9.2 BellSouth will provide LIDB Storage upon written request to <<customer_name>>’s Account Manager stating a requested activation date.
Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.