Report Incidents Involving PHI Sample Clauses

Report Incidents Involving PHI. To report to DBHDD any incident of acquisition, access, use or disclosure of PHI that is not provided for by this Agreement, including any such incident that compromises the security or privacy of the PHI, of which it becomes aware. Business Associate also agrees to report to DBHDD any Security Incident related to Electronic PHI of which Business Associate becomes aware. Business Associate agrees to make such report to DBHDD in writing in such form as DBHDD may require within five (5) business days after Business Associate discovers the incident, as defined in 45 C.F.R. § 164.410 . Business Associate is deemed to have discovered an incident as of the first day an incident is known, or by exercising reasonable diligence would have been known, or by exercising reasonable diligence would have been known, to any person involved in the incident, who is an employee, officer, or other agent of Business Associate. If a law enforcement official informs Business Associate that any such reporting would impede a criminal investigation or harm national security, Business Associate shall inform DBHDD in writing and provide copies of any relevant information from law enforcement, and shall comply with the provisions of 45 CFR § 164.412. DBHDD Policy 23-102, “Reporting and Notification of Breaches of Confidentiality,” is available at xxxxx://xxxxxxx.xxxxxxxxxx.xxx/.
AutoNDA by SimpleDocs

Related to Report Incidents Involving PHI

  • Reporting Incidents The Interconnection Parties shall report to each other in writing as soon as practical all accidents or occurrences resulting in injuries to any person, including death, and any property damage arising out of the Interconnection Service Agreement.

  • Data Incidents Merchant must report all instances of a Data Incident (as defined in the American Express Merchant Operating Guide) immediately to ISO after discovery of the incident. Merchant must ensure data quality and that Transaction Data and customer information is processed promptly, accurately, and completely, and complies with the American Express Technical Specifications. THE FOLLOWING SERVICES ARE PROVIDED BY ISO ONLY. Bank shall not have any obligation or liability of any nature in connection with such services. PART THREE

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • Cyber incident damage assessment activities If DoD elects to conduct a damage assessment, the Contracting Officer will request that the Contractor provide all of the damage assessment information gathered in accordance with paragraph (e) of this clause.

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where InterGlobe has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to InterGlobe. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for InterGlobe (e.g. hairpinning):

  • Reporting on Utilization of Subject Inventions 1. The Performer agrees to submit, during the term of the Agreement, an annual report on the utilization of a subject invention or on efforts at obtaining such utilization that are being made by the Performer or its licensees or assignees. Such reports shall include information regarding the status of development, date of first commercial sale or use, gross royalties received by the Performer, and such other data and information as the agency may reasonably specify. The Performer also agrees to provide additional reports as may be requested by DARPA in connection with any march-in proceedings undertaken by DARPA in accordance with Paragraph I of this Article. DARPA agrees it shall not disclose such information to persons outside the Government without permission of the Performer, unless required by law.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

  • Professional Development; Adverse Consequences of School Exclusion; Student Behavior The Board President or Superintendent, or their designees, will make reasonable efforts to provide ongoing professional development to Board members about the adverse consequences of school exclusion and justice-system involvement, effective classroom management strategies, culturally responsive discipline, appropriate and available supportive services for the promotion of student attendance and engagement, and developmentally appropriate disciplinary methods that promote positive and healthy school climates, i.e., Senate Bill 100 training topics. Board Self-Evaluation The Board will conduct periodic self-evaluations with the goal of continuous improvement. New Board Member Orientation The orientation process for newly elected or appointed Board members includes:

  • Reportable Events Involving the Xxxxx Law Notwithstanding the reporting requirements outlined above, any Reportable Event that involves solely a probable violation of section 1877 of the Social Security Act, 42 U.S.C. §1395nn (the Xxxxx Law) should be submitted by Practitioner to CMS through the self-referral disclosure protocol (SRDP), with a copy to the OIG. If Practitioner identifies a probable violation of the Xxxxx Law and repays the applicable Overpayment directly to the CMS contractor, then Practitioner is not required by this Section III.G to submit the Reportable Event to CMS through the SRDP.

Time is Money Join Law Insider Premium to draft better contracts faster.