Reporting of Improper Disclosures Sample Clauses

Reporting of Improper Disclosures. To report to DHCS and the CDA MSSP Branch Chief or Operations Manager within 24 hours during a work week, of discovery by Business Associate that PHI has been used or disclosed other than as provided for by this Agreement.
AutoNDA by SimpleDocs
Reporting of Improper Disclosures. To report to DHCS within twenty-four (24) hours during a work week, of discovery by PEDI Liaison that PHI has been used or disclosed other than as provided for by this Agreement.
Reporting of Improper Disclosures. To report to DHCS and the CDA MSSP Branch Chief or Operations Manager within twenty-four
Reporting of Improper Disclosures. To report to DHS/CDA within twenty-four (24) hours during a work week, of discovery by Business Associate that PHI has been used or disclosed other than as provided for by this Agreement and this Exhibit.
Reporting of Improper Disclosures. Business Associate shall track all disclosures of PHI to third parties, including those made to Business Associate’s subcontractors, affiliates, agents, and representatives, other than those disclosures that meet the exception criteria of HIPAA and the HITECH Act. Business Associate shall report to Covered Entity any instance of unauthorized or improper use or disclosure of any PHI regarding the terms and conditions of this Addendum or applicable federal and state laws as soon as practicable, but in no event later than two (2) business days of the date on which Business Associate becomes aware of such use or disclosure. In the event of an improper use or disclosure of PHI, Business Associate shall, in consultation with Covered Entity, mitigate, to the extent practical, any harmful effect of such improper use or disclosure that is known to Business Associate.
Reporting of Improper Disclosures. Broker shall report to TRUST or TRUST’s Administrator any unauthorized or improper use or disclosure of Protected Health Information within one (1) business day of the date on which Broker becomes aware of such use of disclosure. Broker shall report such uses or disclosures to TRUST or TRUST’s Administrator by telephone and in writing to: TRUST Privacy Office. In the event that the telephone notice is received by TRUST or TRUST’s Administrator through an automated recording device, the notice must include the name and telephone number of the appropriate contact person of the Broker and the reason for the call. Broker shall mitigate, to the extent practicable, any harmful effect that is known to Broker of a use or disclosure of Protected Health Information by Broker in violation of this Appendix.

Related to Reporting of Improper Disclosures

  • Reporting of Disclosures The MCP agrees to promptly report to ODM any inappropriate use or disclosure of PHI not in accordance with this Agreement or applicable law, including a breach of unsecured PHI as required at 45 CFR 164.410 and any security incident the MCP has knowledge of or reasonably should have knowledge of under the circumstances.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Data Disclosure Under Minnesota Statute § 270C.65, Subdivision 3 and other applicable law, the Contractor consents to disclosure of its social security number, federal employer tax identification number, and/or Minnesota tax identification number, already provided to the State, to federal and state agencies and state personnel involved in the payment of state obligations. These identification numbers may be used in the enforcement of federal and state laws which could result in action requiring the Contractor to file state tax returns, pay delinquent state tax liabilities, if any, or pay other state liabilities.

  • NEPOTISM DISCLOSURE A. In this section the term “relative” means:

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Confidential Information and Privacy (a) All non-public, confidential or proprietary information of Service Provider or Customer, as applicable, including, but not limited to, trade secrets, technology, inventions, samples, research, product designs, business plans, implementation plans, processes, document templates, information pertaining to business operations, methodologies, and strategies, and information pertaining to customers, pricing, and marketing (collectively, "Confidential Information"), disclosed by Service Provider or Customer (in such role the “Disclosing Party”) or Disclosing Party’s officers, directors or employees, whether disclosed orally or disclosed or accessed in written, electronic or other form or media, and whether or not marked, designated or otherwise identified as "confidential," in connection with the provision of the Services and this Agreement is confidential, and shall not be disclosed or copied by recipient Customer or Service Provider (in such role the “Recipient”), or Recipient’s officers, directors or employees, without the prior written consent of the Disclosing Party. Confidential Information does not include information that is:

  • CONFIDENTIAL & PROPRIETARY INFORMATION The parties may provide technical information, documentation and expertise to each other that is either (1) marked as being confidential or, (2) if delivered in oral form is summarized in writing within 10 working days and identified as being confidential (“Confidential Information”). The receiving party shall for a period of five (5) years from the date of disclosure (i) hold the disclosing party’s Confidential Information in strict confidence, and (ii), except as previously authorized in writing by the disclosing party, not publish or disclose the disclosing party’s Confidential Information to anyone other than the receiving party’s employees on a need-to-know basis, and (iii) use the disclosing party’s Confidential Information solely for performance of this Contract. The foregoing requirement shall not apply to any portion of a party’s Confidential Information which (a) becomes publicly known through no wrongful act or omission on the part of the receiving party; (b) is already known to the receiving party at the time of the disclosure without similar nondisclosure obligations; (c) is rightfully received by the receiving party from a third party without similar nondisclosure obligations; (d) is approved for release by written authorization of the disclosing party; (e) is clearly demonstrated by the receiving party to have been independently developed by the receiving party without access to the disclosing party’s Confidential Information; or (f) is required to be disclosed by order of a court or governmental body or by applicable law, provided that the party intending to make such required disclosure shall promptly notify the other party of such intended disclosure in order to allow such party to seek a protective order or other remedy.

  • Return of Proprietary Information The Executive acknowledges and agrees that all the Proprietary Information used or generated during the course of working for the Company Group is the property of the Company Group. The Executive agrees to deliver to the Company Group all documents and other tangibles (including diskettes and other storage media) containing the Proprietary Information at any time upon request by the Board of Trustees during his employment and immediately upon termination of his employment.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!