Reporting of Breaches. As soon as a Breach of confidentiality or security is discovered or known by a party hereto, HEALTHeLINK and the Participant shall report to the other, in accordance with the Policies and Procedures. For purposes of this Section 10.2, “
Reporting of Breaches. Business Associate agrees to notify Covered Entity without unreasonable delay and in no case later than 60 calendar days after the discovery of any Breach of Unsecured Protected Health Information. A Breach shall be treated as discovered by Business Associate as of the first day on which the Breach (i) is known to an employee, officer, or other agent of Business Associate (except the person committing the Breach), or (ii) by exercising reasonable diligence, would have been known to an employee, officer, or other agent of Business Associate (except the person committing the Breach). The notice shall include, to the extent possible, the identification of each individual whose unsecured Protected Health Information has been, or is reasonably believed by Business Associate to have been, accessed, acquired, used or disclosed during the Breach, as well as any other available information set forth in 45 C.F.R. §164.410(c)(2). Business Associate shall supplement its notice as facts become available.
Reporting of Breaches. Business Associate must immediately report to Covered Entity as soon as practicable, but not later than five (5) business days, after becoming aware of any Breach or reasonably suspected Breach of Unsecured Protected Health Information. Notwithstanding the foregoing, for a Covered Entity that contracts with CMS to provide Qualified Health Plan(s), Business Associate must report to the Covered Entity any Breach or reasonably suspected Breach of Unsecured Protected Health Information in the time periods necessary for Covered Entity to report the matter to CMS in accordance with the Covered Entity’s agreement with CMS. In all cases, Business Associate will provide Covered Entity with all information related to the Breach or suspected Breach, including but not limited to the content requirements in 45 CFR §164.410. Business Associate will make members of its Workforce available and will cooperate with Covered Entity in any investigation related to a Breach.
Reporting of Breaches. Business Associate will report to Customer any Breach of Customer's Unsecured PHI that Business Associate may discover to the extent required by 45 C.F.R. § 164.410. Business Associate will make such report without unreasonable delay, and in no case later than four (4) hours after discovery of such Breach. Business Associate undertakes no obligation to report network security related incidents which occur on its managed network but does not directly involve Customer's use of Hosting and communication Services.
Reporting of Breaches. Persons covered under the paragraph ‘Coverage’ must reasonably report breaches of infringing workplace behaviour as follows: For breaches by: ▪ an employee (other than the General Manager) or other workers, the report must go to the reporting person’s applicable manager/supervisor and/or ▪ the General Manager the report must go to the Mayor (or if unavailable to the next appropriately delegated Councillor) and as otherwise required or permitted by applicable laws. Persons covered under the paragraph ‘Coverage’ who engage in infringing workplace behaviour may (as is appropriate) be subject to appropriate disciplinary action in accordance with the Disciplinary Policy and Procedure (employees) or removal from the workplace or termination of services (workers, other than employees and other persons at the workplace). Infringing workplace behaviour may also amount to breaches of applicable laws: ▪ exposing individuals to legal proceedings and ▪ making Council vicariously liable for the conduct of others
Reporting of Breaches. In the event of a Breach (as hereinafter defined) of any Unsecured (as hereinafter defined) PHI that Business Associate accesses, maintains, retains, modifies, records, stores, destroys, or otherwise holds or uses on behalf of Covered Entity, Business Associate shall report such Breach to Covered Entity immediately, but in no event more than two (2) days after discovering the Breach. “Breach” shall mean the unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of such information. “Unsecured” shall mean PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified by the Secretary from time to time. Notice of a Breach shall include all information known to the Business Associate within two (2) business days of discovering the Breach, including the scope of the Breach (e.g. the numbers of individuals affected and PHI elements included), the date of the Breach, the circumstances surrounding the Breach, and the Business Associate’s plans to investigate and mitigate the Breach. During its investigation, the Business Associate shall provide updates on the status and findings to Covered Entity’s Privacy Official. Upon the conclusion of its investigation, Business Associate shall provide a written report to Covered Entity which shall include, at a minimum: (i) the identification of each individual whose PHI has been, or is reasonably believed to have been, accessed, acquired, or disclosed during the Breach, (ii) the date of the Breach, if known, (iii) the scope of the Breach, and (iv) a description of the Business Associate’s response to the Breach. In the event of a Breach, Business Associate shall, in consultation with Covered Entity, mitigate, to the extent practical, any harmful effect of such Breach that is known to Business Associate.
Reporting of Breaches. 8.1. In the event of a Breach of any Unsecured PHI that Talshir accesses, maintains, retains, modifies, records, stores, destroys, or otherwise holds or uses on behalf of the Customer, Talshir shall report such Breach to the Customer as soon as practicable, but in no event later than 48 hours after the date the Breach is discovered by Xxxxxxx.
8.2. Notice of a Breach shall include, at least: (i) the identification of each Individual whose PHI has been, or is reasonably believed to have been, accessed, acquired, or disclosed during the Breach; (ii) the date of the Breach, if known, and the date of discovery of the Breach; (iii) the scope of the Breach; (iv) Talshir’s response to the Breach; and (v) any other information the Customer reasonably requests in order to assess the nature and scope of the breach and accompanying mitigation measures.
8.3. In the event of a Breach, Talshir shall, in consultation with the Customer, mitigate, to the extent practicable, any harmful effect of such Breach that is known to Talshir.
Reporting of Breaches. A Party shall immediately (an in no case later than forty-eight (48) hours after being notified or becoming aware of a breach) report to the other Party any actual or suspected breaches of security or unauthorized access to the other Party’s Confidential Information including, with respect to the licensed APIs, that the Party detects or becomes aware of. Licensee shall report such information to the following email addresses: xxx@xxxxxx.xxx , and Topcon shall report such information to the email address supplied by Licensee in the Request Form. In the event of a security breach, Parties will work together to formulate a plan to rectify all security breaches involving a Party’s Confidential Information including the API. In the event of an actual or suspected security breach, the Party sustaining the actual or suspected breach shall promptly provide the other Party a written report regarding the Party’s internal investigation regarding any security breach, which report shall contain sufficient detail in order to allow the other Party to act in order to prevent continuing or further unauthorized access. Subject to the Party’s compliance with applicable law, the Party agrees not to notify any regulatory authority nor any customer on behalf of the other Party unless the other Party specifically requests in writing that the Party do so.
Reporting of Breaches. Aptible will report to you any Breach (as defined by 45 CFR § 164.402) of your Unsecured PHI that Aptible may discover to the extent required by 45 CFR § 164.410, including Breaches of your Unsecured PHI by our subcontractors. Aptible will make such report without unreasonable delay, and in no case later than two (2) calendar days after our discovery of such Breach.
Reporting of Breaches. As soon as a Breach of Confidentiality or security is discovered or known by a party hereto, RHIO and the Participant shall report to the other, in accordance with the SHIN-NY Policy Guidance and the Policies and Procedures. For purposes of this Section 11.2, “