Privacy and Security Requirements for Personally Sample Clauses

Privacy and Security Requirements for Personally. Identifiable Data (a) HIPAA Requirements. Contractor agrees to comply with applicable provisions of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), including the Administrative Simplification Provisions of HIPAA, as codified at 42 U.S.C. § 1320d et seq., the Health Information Technology for Economic and Clinical Health Act of 2009 (“HITECH”), and any current and future regulations promulgated under HITECH or HIPAA, all as amended from time to time and collectively referred to herein as the “HIPAA Requirements”. Contractor agrees not to use or further disclose any Protected Health Information other than as permitted or required by the HIPAA Requirements and the terms of this Agreement.
AutoNDA by SimpleDocs
Privacy and Security Requirements for Personally. Identifiable Data
Privacy and Security Requirements for Personally. Identifiable Data (a) HIPAA Requirements. Contractor agrees to comply with applicable provisions of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), including the Administrative Simplification Provisions of HIPAA, as codified at 42 U.S.C. § 1320d et seq., the Health Information Technology for Economic and Clinical Health Act of 2009 (“HITECH”), and any current and future regulations promulgated under HITECH or HIPAA, all as amended from time to time and collectively referred to herein as the “HIPAA Requirements”. Contractor agrees not to use or further disclose any Protected Health Information, other than as permitted or required by the HIPAA Requirements and the terms of this Agreement. For purposes of this Agreement, the Exchange represents that the Exchange is a “health oversight entity,” as that term is defined in HIPAA at 45 C.F.R. § 164.501 and, as such, Contractor is permitted to disclose protected health information to Exchange in its role as a health oversight entity.

Related to Privacy and Security Requirements for Personally

  • Privacy and Security (a) Each of the Company and its Subsidiaries complies (and requires and monitors the compliance of applicable third parties) in all material respects with all applicable Laws relating to privacy or data security, and reputable industry practice, standards, self-governing rules and policies and their own published, posted and internal agreements and policies (which are in conformance with reputable industry practice) (all of the foregoing collectively, “Privacy Laws”) with respect to: (i) personally identifiable information (including name, address, telephone number, electronic mail address, social security number, bank account number or credit card number), sensitive personal information and any special categories of personal information regulated thereunder or covered thereby (“Personal Information”), whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners; and (ii) non-personally identifiable information, whether any of same is accessed or used by the Company or any of its Subsidiaries or any of their respective business partners. (b) Neither the Company nor any of its Subsidiaries uses, collects, or receives any Personal Information or sensitive non-personally identifiable information and does not become aware of the identity or location of, or identify or locate, any particular Person as a result of any receipt of such Personal Information, in a manner which would materially breach or violate any Privacy Laws and materially and adversely impact the business of the Company and its Subsidiaries, taken as a whole. (c) To the Company’s knowledge, Persons with which the Company or any of its Subsidiaries have contractual relationships have not breached any agreements or any Privacy Laws pertaining to Personal Information and to non-personally identifiable information. (d) To the Company’s knowledge, the Company and its Subsidiaries take all commercially reasonable steps to protect the operation, confidentiality, integrity and security of their respective business systems and websites and all information and transactions stored or contained therein or transmitted thereby against any unauthorized or improper use, access, transmittal, interruption, modification or corruption, and there have been no material breaches of same. Without limiting the generality of the foregoing, each of the Company and its Subsidiaries (i) uses industry standard encryption technology and (ii) has implemented a comprehensive security plan that (1) identifies internal and external risks to the security of the Company’s or its Subsidiaries’ confidential information and Personal Information and (2) implements, monitors and improves adequate and effective safeguards to control those risks.

  • PERSONAL INFORMATION PRIVACY AND SECURITY CONTRACT 11 Any reference to statutory, regulatory, or contractual language herein shall be to such language as in 12 effect or as amended. 13 A. DEFINITIONS

  • Bill of Rights for Data Privacy and Security As required by Education Law Section 2-d, the Parents Bill of Rights for Data Privacy and Security and the supplemental information for the Service Agreement are included as Exhibit A and Exhibit B, respectively, and incorporated into this DPA. Contractor shall complete and sign Exhibit B and append it to this DPA. Pursuant to Education Law Section 2-d, the EA is required to post the completed Exhibit B on its website.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!