Reporting of Improper Access, Use or Disclosure; Security Incident; Breach Sample Clauses

Reporting of Improper Access, Use or Disclosure; Security Incident; Breach. Business Associate shall report to Covered Entity in writing of any access, Use or Disclosure of PHI not permitted by this Agreement, the Underlying Agreement or applicable federal or state law, any Security Incident (as defined at 45 CFR §164.304) and any Breach of Unsecured PHI of which it becomes aware or discovers without unreasonable delay and in no event later than sixty (60) days of discovery. In the event of a Breach of Unsecured PHI, written notice shall include, to the extent possible: (a) the date of discovery of the Breach; (b) a listing of the identification of individuals whose Unsecured PHI has been, or is reasonably believed by Business Associate to have been accessed, acquired, Used or Disclosed during the Breach; (c) a general description of the nature of the Breach; and (d) any other available information that Covered Entity is required to provide pursuant to 45 CFR §164.404(c). Business Associate shall provide Covered Entity with updates of information concerning the details of such unauthorized access, Use or Disclosure, Security Incident or Breach and the final results of any Risk Assessment conducted by Business Associate, in the event of a Breach of Unsecured PHI.
AutoNDA by SimpleDocs

Related to Reporting of Improper Access, Use or Disclosure; Security Incident; Breach

  • CONFIDENTIALITY AND NON-DISCLOSURE; SECURITY BREACH REPORTING 2.1 For purposes of this Contract, confidential information will not include information or material which (a) enters the public domain (other than as a result of a breach of this Contract); (b) was in the receiving party’s possession prior to its receipt from the disclosing party; (c) is independently developed by the receiving party without the use of confidential information; (d) is obtained by the receiving party from a third party under no obligation of confidentiality to the disclosing party; or (e) is not exempt from disclosure under applicable State law.

  • WHO WILL REVIEW THE INFORMATION DISCLOSED ON THE RELATIONSHIP DISCLOSURE FORM AND ANY UPDATES? The information disclosed on this form and any updates will be a public record as defined by Chapter 119, Florida Statutes, and may therefore be inspected by any interested person. Also, the information will be made available to the Mayor and the BCC members. This form and any updates will accompany the information for the applicant’s project or item. However, for development-related items, if an applicant discloses the existence of one or more of the relationships described above and the matter would normally receive final consideration by the Concurrency Review Committee or the Development Review Committee, the matter will be directed to the BCC for final consideration and action following committee review.

  • Unbundled Network Terminating Wire (UNTW) 2.8.3.1 UNTW is unshielded twisted copper wiring that is used to extend circuits from an intra-building network cable terminal or from a building entrance terminal to an individual End User’s point of demarcation. It is the final portion of the Loop that in multi-subscriber configurations represents the point at which the network branches out to serve individual subscribers.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Meaning of Confidential Information For the purposes of this Contract, the term “Confidential Information” means all information and documentation of a party that: (a) has been marked “confidential” or with words of similar meaning, at the time of disclosure by such party; (b) if disclosed orally or not marked “confidential” or with words of similar meaning, was subsequently summarized in writing by the disclosing party and marked “confidential” or with words of similar meaning; and, (c) should reasonably be recognized as confidential information of the disclosing party. The term “Confidential Information” does not include any information or documentation that was: (a) subject to disclosure under the Michigan Freedom of Information Act (FOIA); (b) already in the possession of the receiving party without an obligation of confidentiality; (c) developed independently by the receiving party, as demonstrated by the receiving party, without violating the disclosing party’s proprietary rights; (d) obtained from a source other than the disclosing party without an obligation of confidentiality; or, (e) publicly available when received, or thereafter became publicly available (other than through any unauthorized disclosure by, through, or on behalf of, the receiving party). For purposes of this Contract, in all cases and for all matters, State Data is deemed to be Confidential Information.

  • How to Request an External Appeal If you remain dissatisfied with our medical appeal determination, you may request an external review by an outside review agency. In accordance with §27-18.9-8, your external appeal will be reviewed by one of the external independent review organizations (IRO) approved by the Office of the Health Insurance Commissioner. The IRO is selected using a rotational method. Your claim does not have to meet a minimum dollar threshold in order for you to be able to request an external appeal. To request an external appeal, submit a written request to us within four (4) months of your receipt of the medical appeal denial letter. We will forward your request to the outside review agency within five (5) business days, unless it is an urgent appeal, and then we will send it within two (2) business days. We may charge you a filing fee up to $25.00 per external appeal, not to exceed $75.00 per plan year. We will refund you if the denial is reversed and will waive the fee if it imposes an undue hardship for you. Upon receipt of the information, the outside review agency will notify you of its determination within ten (10) calendar days, unless it is an urgent appeal, and then you will be notified within seventy-two (72) hours. The determination by the outside review agency is binding on us. Filing an external appeal is voluntary. You may choose to participate in this level of appeal or you may file suit in an appropriate court of law (see Legal Action, below). Once a member or provider receives a decision at one of the several levels of appeals noted above, (reconsideration, appeal, external), the member or provider may not ask for an appeal at the same level again, unless additional information that could affect such decisions can be provided.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to CBB a non-exclusive license to use Verizon OSS Information.

  • Contact in Event of Unauthorized Transfer If you believe your Card and/or access code has been lost or stolen or that someone has transferred or may transfer money from your account without your permission, either call us immediately at:

  • CENTURYLINK OSS INFORMATION 57.1 Subject to the provisions of this Agreement and Applicable Law, CLEC shall have a limited, revocable, non-transferable, non-exclusive right to use CenturyLink OSS Information during the term of this Agreement, for CLEC’s internal use for the provision of Telecommunications Services to CLEC End Users in the State.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!