Privacy and Security of Shared Information Sample Clauses

Privacy and Security of Shared Information. ACO shall manage all data received from Preferred Provider which includes protected health information, in a manner that is compliant with state and federal privacy and security laws, rules and regulations, as they are applicable and as they may change from time to time. ACO will develop policies and procedures that will require ACO to protect the privacy and security of health information shared with ACO by Preferred Provider consistent with the Business Associate and Qualified Service Organization Addendum attached hereto as Exhibit 2 and ACO shall comply with that Addendum. XXX also agrees to manage data supplied to Preferred Provider in accordance with the ACO Data Use Policy(ies) and/or contract amendment as may be implemented at a later date.
AutoNDA by SimpleDocs
Privacy and Security of Shared Information. ‌ A. HCSA Compliance with Policies and Procedures‌ HCSA shall comply with SHIE Data Sharing Agreement and the corresponding Policies and Procedures as indicated in this document. Further, it will comply with its organizational Privacy and Security Policies. B. Notice of Privacy Practices‌ For the time being, HCSA does not require the use of a specific Notice of Privacy Practices, if Participant is a member of the Organized Health Care Arrangement. C. Security Incident Reporting and Response for HCSA and Participant‌ 1. Security official of the party that sustained the security incident will coordinate review of the incident to establish if a possible HIPAA Breach has occurred. 2. Security official will follow all HIPAA and California breach notification requirements whenever a security incident is identified as a breach. 3. Customize the Security Incident Form (Appendix A) and distribute copies to all personnel as well as instruct personnel and management on how to complete the form. 4. Train personnel to report both suspicious as well as actual incidents. 5. Security official (or designee) will review any incident report within twenty-four (24) hours of receipt. In the event of a violation that does not have an incident report; the security official will review the violation within twenty-four (24) hours and also document this using the incident report. 6. The security official will determine if the incident is an actual violation or just suspicious activity. If needed, the security official will contact the systems vendor for assistance. 7. The security official will address actual violations immediately based on the nature of the violation. 8. If a security incident occurs where PHI has been breached, the security official will investigate the breach immediately, and follow the HIPAA Breach Notification procedures, if applicable, and the applicable requirements of the Data Sharing Agreement. The security official will take reasonable steps to determine the scope of the breach and restore the reasonable integrity of the data system. The security official, where appropriate, will contact the organization’s attorney or outside advisors to determine the most appropriate compliance plan, which will generally include notification of all affected patients. 9. If the security official, organization’s attorney or outside consultants determine that PHI, medical information, personal information or health insurance information (as defined in SB1386 and AB1298) in ...

Related to Privacy and Security of Shared Information

  • Company Creation and Use of Confidential Information The Executive understands and acknowledges that the Company has invested, and continues to invest, substantial time, money and specialized knowledge into developing its resources, creating a customer base, generating customer and potential customer lists, training its employees, and improving its product offerings in the field of financial services. The Executive understands and acknowledges that as a result of these efforts, the Company has created, and continues to use and create Confidential Information. This Confidential Information provides the Company with a competitive advantage over others in the marketplace.

  • Security of Confidential Information Each party possessing Confidential Information of the other party will maintain all such Confidential Information under secure conditions, using reasonable security measures and in any event not less than the same security procedures used by such party for the protection of its own Confidential Information of a similar kind.

  • Confidentiality of Contractor Information The Contractor acknowledges and agrees that this Contract and any and all Contractor information obtained by the State in connection with this Contract are subject to the State of Vermont Access to Public Records Act, 1 V.S.A. § 315 et seq. The State will not disclose information for which a reasonable claim of exemption can be made pursuant to 1 V.S.A. § 317(c), including, but not limited to, trade secrets, proprietary information or financial information, including any formulae, plan, pattern, process, tool, mechanism, compound, procedure, production data, or compilation of information which is not patented, which is known only to the Contractor, and which gives the Contractor an opportunity to obtain business advantage over competitors who do not know it or use it.

  • Restriction on Disclosure and Use of Confidential Information Executive agrees that Executive shall not, directly or indirectly, use any Confidential Information on Executive’s own behalf or on behalf of any Person other than Employer, or reveal, divulge, or disclose any Confidential Information to any Person not expressly authorized by Employer to receive such Confidential Information. This obligation shall remain in effect for as long as the information or materials in question retain their status as Confidential Information. Executive further agrees to fully cooperate with Employer in maintaining the Confidential Information to the extent permitted by law. The Parties acknowledge and agree that this Agreement is not intended to, and does not, alter either Employer’s rights or Executive’s obligations under any state or federal statutory or common law regarding trade secrets and unfair trade practices. Anything herein to the contrary notwithstanding, Executive shall not be restricted from disclosing information that is required to be disclosed by law, court order, or other valid and appropriate legal process; provided, however, that in the event such disclosure is required by law, Executive shall provide Employer with prompt notice of such requirement so that Employer may seek an appropriate protective order prior to any such required disclosure by Executive. Executive understands and acknowledges that nothing in this section limits Executive’s ability to report possible violations of federal, state, or local law or regulation to any governmental agency or entity; to communicate with any government agencies or otherwise participate in any investigation or proceeding that may be conducted by any government agencies in connection with any charge or complaint, whether filed by Executive, on Executive’s behalf, or by any other individual; or to make other disclosures that are protected under the whistleblower provisions of federal, state, or local law or regulation, and Executive shall not need the prior authorization of Employer to make any such reports or disclosures and shall not be required to notify Employer that Executive has made such reports or disclosures. In addition, and anything herein to the contrary notwithstanding, Executive is hereby given notice that Executive shall not be criminally or civilly liable under any federal or state trade secret law for disclosing a trade secret (as defined by 18 U.S.C. § 1839) in confidence to a federal, state, or local government official, either directly or indirectly, or to an attorney, in either event solely for the purpose of reporting or investigating a suspected violation of law; or disclosing a trade secret (as defined by 18 U.S.C. § 1839) in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal.

  • Maintenance of Confidential Information The Contractor acknowledges that in the course of its appointment hereunder the Contractor will, either directly or indirectly, have access to and be entrusted with information (whether oral, written or by inspection) relating to the Company or its respective affiliates, associates or customers (the “Confidential Information”). For the purposes of this Agreement, “Confidential Information” includes, without limitation, any and all Developments (as defined herein), trade secrets, inventions, innovations, techniques, processes, formulas, drawings, designs, products, systems, creations, improvements, documentation, data, specifications, technical reports, customer lists, supplier lists, distributor lists, distribution channels and methods, retailer lists, reseller lists, employee information, financial information, sales or marketing plans, competitive analysis reports and any other thing or information whatsoever, whether copyrightable or uncopyrightable or patentable or unpatentable. The Contractor acknowledges that the Confidential Information constitutes a proprietary right, which the Company is entitled to protect. Accordingly the Contractor covenants and agrees that during the Term and thereafter until such time as all the Confidential Information becomes publicly known and made generally available through no action or inaction of the Contractor, the Contractor will keep in strict confidence the Confidential Information and shall not, without prior written consent of the Company in each instance, disclose, use or otherwise disseminate the Confidential Information, directly or indirectly, to any third party.

  • Exclusions from Confidential Information Receiving Party's obligations under this Agreement do not extend to information that is: (a) publicly known at the time of disclosure or subsequently becomes publicly known through no fault of the Receiving Party; (b) discovered or created by the Receiving Party before disclosure by Disclosing Party; (c) learned by the Receiving Party through legitimate means other than from the Disclosing Party or Disclosing Party's representatives; or (d) is disclosed by Receiving Party with Disclosing Party's prior written approval.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8 and Applicable Law, Verizon grants to Reconex a non-exclusive license to use Verizon OSS Information. 8.5.2 All Verizon OSS Information shall at all times remain the property of Verizon. Except as expressly stated in this Section 8, Reconex shall acquire no rights in or to any Verizon OSS Information. 8.5.2.1 The provisions of this Section 8.5.2 shall apply to all Verizon OSS Information, except (a) Reconex Usage Information, (b) CPNI of Reconex, and (c) CPNI of a Verizon Customer or a Reconex Customer, to the extent the Customer has authorized Reconex to use the Customer Information. 8.5.2.2 Verizon OSS Information may be accessed and used by Reconex only to provide Telecommunications Services to Reconex Customers. 8.5.2.3 Reconex shall treat Verizon OSS Information that is designated by Verizon, through written or electronic notice (including, but not limited to, through the Verizon OSS Services), as “Confidential” or “Proprietary” as Confidential Information of Verizon pursuant to Section 10 of the Agreement. 8.5.2.4 Except as expressly stated in this Section 8, this Agreement does not grant to Reconex any right or license to grant sublicenses to other persons, or permission to other persons (except Reconex’s employees, agents or contractors, in accordance with Section 8.5.2.5 below, to access, use or disclose Verizon OSS Information. 8.5.2.5 Reconex’s employees, agents and contractors may access, use and disclose Verizon OSS Information only to the extent necessary for Reconex’s access to, and use and disclosure of, Verizon OSS Information permitted by this Section 8. Any access to, or use or disclosure of, Verizon OSS Information by Reconex’s employees, agents or contractors, shall be subject to the provisions of this Agreement, including, but not limited to, Section 10 of the Agreement and Section 8.5.2.3 above. 8.5.2.6 Reconex’s license to use Verizon OSS Information shall expire upon the earliest of: (a) the time when the Verizon OSS Information is no longer needed by Reconex to provide Telecommunications Services to Reconex Customers; (b) termination of the license in accordance with this Section 8; or (c) expiration or termination of the Agreement. 8.5.2.7 All Verizon OSS Information received by Reconex shall be destroyed or returned by Reconex to Verizon, upon expiration, suspension or termination of the license to use such Verizon OSS Information. 8.5.3 Unless sooner terminated or suspended in accordance with the Agreement or this Section 8 (including, but not limited to, Section 2.2 of the Agreement and Section 8.6.1 below), Reconex’s access to Verizon OSS Information through Verizon OSS Services shall terminate upon the expiration or termination of the Agreement. 8.5.3.1 Verizon shall have the right (but not the obligation) to audit Reconex to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement with regard to Reconex’s access to, and use and disclosure of, Verizon OSS Information. 8.5.3.2 Without in any way limiting any other rights Verizon may have under the Agreement or Applicable Law, Verizon shall have the right (but not the obligation) to monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex pursuant to this Agreement, to ascertain whether Reconex is complying with the requirements of Applicable Law and this Agreement, with regard to Reconex’s access to, and use and disclosure of, such Verizon OSS Information. The foregoing right shall include, but not be limited to, the right (but not the obligation) to electronically monitor Reconex’s access to and use of Verizon OSS Information which is made available by Verizon to Reconex through Verizon OSS Facilities. 8.5.3.3 Information obtained by Verizon pursuant to this Section 8.5.3.3 shall be treated by Verizon as Confidential Information of Reconex pursuant to Section 10 of the Agreement; provided that, Verizon shall have the right (but not the obligation) to use and disclose information obtained by Verizon pursuant to this Section 8.5.3.3 to enforce Verizon’s rights under the Agreement or Applicable Law.

  • Access to Company Information (a) During the period from the date of this Agreement to the Effective Time, the Company shall permit representatives of the Parent to have reasonable access (at all reasonable times, and in a manner so as not to interfere with the normal business operations of the Company) to all premises, properties, financial and accounting records, contracts, other records and documents, and personnel, of or pertaining to the Company. (b) The Parent and each of its Subsidiaries (i) shall treat and hold as confidential any Company Confidential Information (as defined below), (ii) shall not use any of the Company Confidential Information except in connection with this Agreement, and (iii) if this Agreement is terminated for any reason whatsoever, shall return to the Company all tangible embodiments (and all copies) thereof which are in its possession. For purposes of this Agreement, “Company Confidential Information” means any information of the Company that is furnished to the Parent or any of its Subsidiaries by the Company in connection with this Agreement; provided, however, that it shall not include any information (A) which, at the time of disclosure, is available publicly other than as a result of non-permitted disclosure by the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (B) which, after disclosure, becomes available publicly through no fault of the Parent, any of its Subsidiaries or their respective directors, officers, or employees, (C) which the Parent or any of its Subsidiaries knew or to which the Parent or any of its Subsidiaries had access prior to disclosure, as demonstrated by competent evidence, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company, or (D) which the Parent or any of its Subsidiaries rightfully obtains from a source other than the Company, provided that the source of such information is not known by the Parent or any of its Subsidiaries to be bound by a confidentiality obligation to the Company.

  • Release of Confidential Information No Party shall release or disclose Confidential Information to any other person, except to its Affiliates (limited by FERC Standards of Conduct requirements), subcontractors, employees, consultants, or to parties who may be considering providing financing to or equity participation with Developer, or to potential purchasers or assignees of a Party, on a need-to-know basis in connection with this Agreement, unless such person has first been advised of the confidentiality provisions of this Article 22 and has agreed to comply with such provisions. Notwithstanding the foregoing, a Party providing Confidential Information to any person shall remain primarily responsible for any release of Confidential Information in contravention of this Article 22.

  • Use of Confidential Information 7.1 Each Party may be given access to Confidential Information from the other Party in order to perform its obligations under this Agreement. The Party that receives Confidential Information shall be known as “Receiving Party”. The Party that discloses Confidential Information shall be known as “Disclosing Party”. 7.2 The Receiving Party acknowledges that the Confidential Information is received on a confidential basis, and that the Disclosing Party shall remain the exclusive owner of its Confidential Information and of Intellectual Property rights contained therein. No license or conveyance of any such rights to the Receiving Party is granted or implied under this Agreement. 7.3 The Receiving Party shall: (a) use the Confidential Information of the Disclosing Party only for purposes of complying with its obligations under this Agreement and, without limiting the generality of the foregoing, shall not, directly or indirectly, deal with, use, exploit or disclose such Confidential Information or any part thereof to any person or entity or for any purpose whatsoever (or in any manner which would benefit any competitor of the Disclosing Party) except as expressly permitted hereunder or unless and until expressly authorized in writing to do so by the Disclosing Party; (b) use reasonable efforts to treat, and to cause all its officers, agents, servants, employees, professional advisors and contractors and prospective contractors to treat, as strictly confidential all Confidential Information. In no event shall such efforts be less than the degree of care and discretion as the Receiving Party exercises in protecting its own valuable confidential information. Any contractors engaged by or prospective contractors to be engaged by the Receiving Party in connection with the performance of the Services shall be required to assume obligations of secrecy equal to or greater than the obligations that the Receiving Party has assumed in this Agreement with respect to the Confidential Information; (c) not, without the prior written consent of the Disclosing Party, disclose or otherwise make available the Disclosing Party’s Confidential Information or any part thereof to any party other than those of its directors, officers, agents, servants, employees, professional advisors, contractors or prospective contractors who need to know the Confidential Information for the purposes set forth herein; (d) not copy or reproduce in any manner whatsoever the Confidential Information of the Disclosing Party or any part thereof without the prior written consent of the Disclosing Party, except where required for its own internal use in accordance with this Agreement; and (e) promptly, upon termination or expiration of this Agreement, return and confirm in writing the return of all originals, copies, reproductions and summaries of Confidential Information or, or at the option of the Disclosing Party, destroy and confirm in writing the destruction of the Confidential Information (this sub- clause being applicable only on the User). 7.4 Provided, however that nothing herein shall restrict in any manner the ability of either Party to use or disclose Confidential Information owned by it in any manner whatsoever, and the obligations of confidentiality herein shall apply to each Party only to the extent that the Confidential Information or portion thereof is not owned by that particular Party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!