Prohibited Marketing and Sale of PHI Sample Clauses

Prohibited Marketing and Sale of PHI. Notwithstanding any other provision in this BAA, Business Associate shall comply with the following requirements: (i) Business Associate shall not Use or Disclose PHI for fundraising or marketing purposes, except to the extent expressly authorized or permitted by this BAA and consistent with the requirements of 42 U.S.C. § 17936, 45 C.F.R. §§ 164.514(f), and 164.508(a)(3)(ii), and (iii) Business Associate shall not directly or indirectly receive remuneration in exchange for PHI except with the prior written consent of Covered Entity and as permitted by the HITECH Act, 42 U.S.C. § 17935(d)(2), and 45 C.F.R. § 164.502(a)(5)(ii).
AutoNDA by SimpleDocs
Prohibited Marketing and Sale of PHI. Notwithstanding any other provision in this BAA, Business Associate shall comply with the following requirements: (i) Business Associate shall not Use or Disclose PHI for fundraising or marketing purposes, except to the extent expressly authorized or permitted by any Underlying Agreement and consistent with the requirements of 42 U.S.C. § 17936, 45 C.F.R. §§ 164.514(f), and 164.508(a)(3)(ii), and (ii) Business Associate shall not directly or indirectly receive remuneration in exchange for PHI except with the prior written consent of Covered Entity and as permitted by the HITECH Act, 42 U.S.C. § 17935(d)(2), and 45 C.F.R. § 164.502(a)(5)(ii); however this proh bition shall not affect payment by Covered Entity to Business Associate for the provision of Services pursuant to any Underlying Agreement.
Prohibited Marketing and Sale of PHI. Notwithstanding any other provision in this BAA, Business Associate shall comply with the following requirements: (i) Business Associate shall not Use or Disclose PHI for fundraising or marketing purposes, except to the extent expressly authorized or permitted by this BAA and consistent with the requirements of 42 U.S.C. § 17936, 45 C.F.R. §§ 164.514(f), and 164.508(a)(3)(ii), and

Related to Prohibited Marketing and Sale of PHI

  • Marketing and Outreach CONTRACTOR shall identify culturally and linguistically appropriate measures for reaching older adults in need of transportation and determine procedures for implementation of outreach, which may include, but is not limited to, brochures, flyers, and public presentations. In order to ensure effective collaboration and coordination of services, a CONTRACTOR shall be required to submit drafts of all printed materials related to outreach and marketing of OoA Senior Non-Emergency Medical Transportation Fixed-Price Per Mile Program services to OoA for approval before publication and dissemination.

  • Advertising and Marketing Except in so far as herein expressly provided, the Service Provider shall not make or issue any formal or informal announcement (with the exception of Stock Exchange announcements), advertisement or statement to the media in connection with this Agreement or otherwise disclose the existence of this Agreement or the subject matter thereof to any other person without the prior written consent of SARS.

  • Xxxxxx and Recall An employee in receipt of notice of layoff pursuant to 9.08(A)(a)(ii) may:

  • Health Promotion and Health Education Both parties to this Agreement recognize the value and importance of health promotion and health education programs. Such programs can assist employees and their dependents to maintain and enhance their health, and to make appropriate use of the health care system. To work toward these goals:

  • Marketing and Advertising Provider shall not advertise or market to schools, students or their parents/guardians when the advertising is based upon any Student Data that Provider has acquired because of the use of that Provider’s site, Products, Services, or this Agreement.

  • Marketing and Publicity Each party may use the other party’s Brand Features in connection with the Agreement as permitted in the Agreement. Customer may state publicly that it is a Google customer and display Google Brand Features in accordance with the Trademark Guidelines. Customer and Google will work together on an announcement of Customer being a Google customer, which will take place on a mutually agreed upon date within 6 months of the Effective Date. Additionally, with prior written consent, the parties may engage in joint marketing activities such as customer testimonials, announcements, press engagements, public speaking events, and analyst interviews. A party may revoke the other party’s right to use its Brand Features with 30 days’ written notice. Any use of a party’s Brand Features will inure to the benefit of the party holding Intellectual Property Rights to those Brand Features.

  • Felling and Bucking Felling shall be done to minimize breakage of Included Timber and dam- age to residual timber. Unless agreed otherwise, felling shall be done by saws or shears. Bucking shall be done to permit removal of all minimum pieces set forth in A2. Purchaser may buck out cull material when necessary to produce pieces meeting Utilization Standards. Such bucked out material shall contain a minimum amount of sound wood, not in excess of the net scale in percentage of gross scale, or based on the merchantability factor, whichever is stated in A2. If necessary to assess extent of defect, Purchaser shall make sample saw cuts or wedges. B6.411 Felling in Clearings. Insofar as ground conditions, tree lean, and shape of clearings per- mit, trees shall be felled so that their tops do not extend outside Clearcutting Units, construction clearings, and ar- eas of regeneration cutting. B6.000 Xxxxx Xxxxxxx. Stumps shall not exceed, on the side adjacent to the highest ground, the maximum heights set forth in A6, except that occasional stumps of greater heights are acceptable when Purchaser determines that they are necessary for safe and efficient conduct of logging. Unless otherwise agreed, Purchaser shall re-cut high stumps so they will not exceed heights specified in A6 and shall dispose of severed portions in the same manner as other logging debris. The xxxxx heights shown in A6 were selected with the objective of maximum reasonable utilization of the timber, unless Sale Area Map shows special areas where xxxxx heights are lower for aesthetic, land treatment, or silvicultural rea- sons.

  • Xxxxxx and X Xxxxxxxxx. Key-agreement in ad-hoc networks. In Nordsec’99, 1999. [4] X. Xxxxxxxx, X. Xxxxxxx, and X. Xxxxxx. Authenticated Group Key Agreement and Friends. In 5th ACM Conference on Computer and Communications Security, pages 17–26. ACM, November 1998. [5] X. Xxxxxx and X. Xxxxx. Communication complexity of group key distribution. In 5th ACM Conference on Computer and Communications Security, November 1998. [6] X. Xxxxxxx and X. Xxxxxxx. Random oracles are practical: A paradigm for designing efficient protocols. In 1st ACM Conference on Computer and Communications Security, 1993. [7] Xxx Xxxxx. The Decision Xxxxxx-Xxxxxxx problem. In Third Algorithmic Number Theory Symposium, number 1423 in Lecture Notes in Computer Science, pages 48–63. Springer-Verlag, Berlin Germany, 1998. [8] Xxx Xxxxx and Xxxxx Xxxxxxxxxx. Applications of multilinear forms to cryptography. To appear in Contemporary Mathematics, American Mathematical Society. [9] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, and Xxxxx Xxxxxxxxxxx. Provably authenticated group Xxxxxx-Xxxxxxx key exchange — the dynamic case. In Xxxxx Xxxx, editor, Advances in Cryptology – ASIACRYPT ’2001, Lecture Notes in Computer Science, Gold Coast, Australia, 2001. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany. [10] Xxxxxxxx Xxxxxxx, Xxxxxxx Xxxxxxxxx, Xxxxx Xxxxxxxxxxx, and Xxxx-Xxxxxxx Xxxxxxxxxx. Provably authenticated group xxxxxx-xxxxxxx key exchange. In Xxxxxxxxxx Xxxxxxxx, editor, 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001. ACM Press. [11] Xxxx Xxxxxxxxx and Xxx Xxxxxxx. A secure and efficient conference key distribution system. In X. Xx Xxxxxx, editor, Advances in Cryptology – EUROCRYPT ’94, number 950 in Lecture Notes in Computer Science. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany, 1995. final version of proceedings. [12] X. Xxxxxxx, X. Xxxxxxxxx, X. Xxx, X. Xxxxxx, and X. Xxxxxxxx. The VersaKey framework: Versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9), September 1999. [13] Xxxxx Xxxxx. Zero-knowledge undeniable signatures. In X.X. Xxxxxxx, editor, Advances in Cryptology – EUROCRYPT ’90, number 473 in Lecture Notes in Computer Science, pages 458–464. Springer-Verlag, Berlin Germany, May 1991.

  • Xxxxxxx and X Xxxx¨cker. A detailed account of Xxxxx Xxxxxx’ version of the standard model. IV. Rev. Math. Phys. 8 (1996) 205–228.

  • Advertising and Publicity No Credit Party shall issue or disseminate to the public (by advertisement, including without limitation any “tombstone” advertisement, press release or otherwise), submit for publication or otherwise cause or seek to publish any information describing the credit or other financial accommodations made available by the Lenders pursuant to this Agreement and the other Loan Documents without the prior written consent of the Administrative Agent. Nothing in the foregoing shall be construed to prohibit any Credit Party from making any submission or filing which it is required to make by applicable law or pursuant to judicial process; provided, that, (i) such filing or submission shall contain only such information as is necessary to comply with applicable law or judicial process and (ii) unless specifically prohibited by applicable law or court order, the Borrower shall promptly notify the Administrative Agent of the requirement to make such submission or filing and provide the Administrative Agent with a copy thereof.

Time is Money Join Law Insider Premium to draft better contracts faster.