Report Contents. To the extent such information is available Business Associate’s report will at least: (i) Identify the nature of the non-permitted or prohibited access, Use or Disclosure, including the date of the Breach and the date of discovery of the Breach; (ii) Identify the PHI accessed, used or disclosed, and provide an exact copy or replication of the PHI, as appropriate, in a format reasonably requested by Company, and to the extent available; (iii) Identify who caused the Breach and who received the PHI; (iv) Identify what corrective action Business Associate took or will take to prevent further Breaches; (v) Identify what Business Associate did or will do to mitigate any deleterious effect of the Breach; and (vi) Provide such other information, including a written report, as Company may reasonably request.
Appears in 5 contracts
Samples: Business Associate Agreement, Business Associate Agreement, Business Associate Agreement
Report Contents. To the extent such information is available Business Associate’s report will at least:
(i) Identify the nature of the non-permitted or prohibited access, Use or Disclosure, including the date of the Breach and the date of discovery of the Breach;
(ii) Identify the PHI accessed, used or disclosed, and provide an exact copy or replication of the PHI, as appropriate, in a format reasonably requested by Company, and to the extent available;
(iii) Identify the entity that and if applicable, the role of the individual, who caused the Breach and who received the PHI;
(iv) Identify what corrective action Business Associate took or will take to prevent further Breaches;
(v) Identify what Business Associate did or will do to mitigate any deleterious effect of the Breach; and
(vi) Provide such other information, including a written report, as Company may reasonably request.
Appears in 2 contracts
Report Contents. To the extent such information is available available, Business Associate’s report will at least:
(i) Identify the nature of the non-permitted or prohibited access, Use or Disclosure, including the date of the Breach and the date of discovery of the Breach;
(ii) Identify the PHI accessed, used or disclosed, and provide an exact copy or replication of the PHI, as appropriate, in a format reasonably requested by Company, and to the extent available;
(iii) Identify who caused the Breach and who received the PHI;
(iv) Identify what corrective action Business Associate took or will take to prevent further Breaches;
(viv) Identify what Business Associate did or will do to mitigate any deleterious effect of the Breach; and
(viv) Provide such other information, including a written report, as Company may reasonably request.
Appears in 1 contract
Samples: Pharmacy Benefit Management Services Agreement (Express Scripts Inc)