Reporting of Improper Use or Disclosure. Associate shall report to CE in writing any use or disclosure of Protected Information other than as provided for by this Contract within five (5) business days of becoming aware of such use or disclosure.
Reporting of Improper Use or Disclosure. Contractor to notify the Division in writing immediately upon discovery of any use or disclosure of confidential information not provided for by Agreement.
Reporting of Improper Use or Disclosure. Business Associate shall report to Covered Entity in writing any use or disclosure of PHI not permitted by this BAA within five (5) days of becoming aware of such use or disclosure.
Reporting of Improper Use or Disclosure. Associate shall notify the compliance office of CE in writing of any use or disclosure of Protected Information otherwise than as provided for by the Contract and this Addendum within five (5) days of becoming aware of such use or disclosure. [45 CFR § 164.504(e)(2)(ii)(C)]. Such notice shall be sent to: DPH Compliance Office, 0000 Xxxxxx-xxxxx Xxxxxx, Xxx Xxxxxxxxx, XX 00000 or can be sent via e- mail to XXX_Xxxxxxx@xxxxx.xxx.
Reporting of Improper Use or Disclosure. Business Associate shall report to Covered Entity any use or disclosure of PHI not permitted by the Enrollment Agreement or this Agreement of which it becomes aware, including Breaches of Unsecured PHI as required at 45 CFR § 164.410, and any successful Security Incident of which it becomes aware. This reporting shall occur without unreasonable delay and in no case more than sixty (60) days after discovery of the Breach or other inappropriate use or disclosure of PHI. The parties acknowledge and agree that this Section constitutes notice by Business Associate to Covered Entity of the ongoing existence and occurrence of attempted but unsuccessful Security Incidents for which no further notice to Covered Entity shall be required. Such unsuccessful Security Incidents shall include, but not be limited to, pings and other broadcast attacks on Business Associate's firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use, or disclosure of Covered Entity’s electronic PHI.
Reporting of Improper Use or Disclosure. Business Associate shall report to Covered Entity any use or disclosure of PHI not provided for by the Agreement and this Agreement within five (5) days of becoming aware of such use or disclosure. Business Associate shall report to Covered Entity any Security Incident within five (5) days of becoming aware of such incident. Business Associate shall notify Covered of any Breach of Unsecured PHI as soon as practicable, and no later than thirty (30) days after discovery of such Breach. Business Associate’s notification to Covered Entity of a Breach shall include: (i) the identification of each individual whose Unsecured PHI has been, or is reasonably believed by Business Associate to have been, accessed, acquired or disclosed during the Breach; and (ii) any particulars regarding the Breach that Covered Entity would need to include in its notification, as such particulars are identified in 42 U.S.C. § 17932 and 45 C.F.R. § 164.404, and identify a contact person for more information when reporting.
Reporting of Improper Use or Disclosure. Business Associate shall report to Covered Entity, as soon as reasonably practicable, any use or disclosure of PHI not provided for by this Agreement of which it becomes aware, including breaches of Unsecured Protected Health Information (as defined in the Privacy and Security Rules). Knowledge of any improper use or disclosure by an agent or subcontractor of Business Associate shall not be imputed to Business Associate unless and until such agent or subcontractor shall have reported such improper use or disclosure to the Business Associate representative responsible for the Covered Entity engagement. With respect to Electronic PHI, Business Associate shall, as soon as reasonably practicable, report to Covered Entity any Security Incident. The parties acknowledge and agree that this Section 3.b. constitutes notice by Business Associate to Covered Entity of the ongoing existence and occurrence of attempted but Unsuccessful Security Incidents (as defined herein) for which no additional notice to Covered Entity shall be required. “Unsuccessful Security Incidents” shall include, but not be limited to, pings and other broadcast attacks on Business Associate’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of PHI.
Reporting of Improper Use or Disclosure. Business Associate shall promptly report to Cisco any use or disclosure of PHI not provided for by the Attachment of which it becomes aware, including breaches of Unsecured Protected Health Information (as defined in the Privacy and Security Rules). In addition, Business Associate shall promptly report to Cisco any Security Incident. If Cisco determines that such use or disclosure may constitute a Breach of Unsecured Protected Health Information, Business Asso- ciate agrees to provide Cisco written notification of the Breach that includes the following information within three (3) days: (1) a brief description of the incident, including the date of the Breach and the date of the discovery of the Breach; (2) the identification of each individual whose Unsecured PHI was breached; (3) a description of the types of Unsecured PHI that were involved in the Breach; (4) any steps individuals should take to protect themselves from potential harm resulting from the Breach; and (5) a brief description of actions that Business Associate is undertaking to investigate the Breach, to mitigate harm to individuals, and to protect against any further breaches.
Reporting of Improper Use or Disclosure. (i) Business Associate shall immediately, but in any event no later than twenty-four (24) hours after discovery, notify Client in writing of:
Reporting of Improper Use or Disclosure. Associate shall report in writing to CE Representative, identified in Section 15. b, any use or disclosure of Protected Information in violation of the Privacy Rule within three (3) days of becoming aware of such use or disclosure.