Reporting of Security Incidents, Unauthorized Use and Disclosure of PHI, and Breaches of Unsecured PHI Sample Clauses

Reporting of Security Incidents, Unauthorized Use and Disclosure of PHI, and Breaches of Unsecured PHI. (i) The Client acknowledges that Wildcard Dental has no ability or authority to determine or verify the purpose of any transactions or activities conducted by any of the Client’s Users involving the Services, and does not have the ability or authority to obtain the information necessary for the determination whether any given transaction or disclosure by a User was unauthorized and therefore may have been an Unauthorized Use, Disclosure or Breach.
AutoNDA by SimpleDocs

Related to Reporting of Security Incidents, Unauthorized Use and Disclosure of PHI, and Breaches of Unsecured PHI

  • Use and Disclosure of Protected Health Information The Business Associate must not use or further disclose protected health information other than as permitted or required by the Contract or as required by law. The Business Associate must not use or further disclose protected health information in a manner that would violate the requirements of HIPAA Regulations.

  • Identification and Disclosure of Privacy and Security Offices Business Associate and Subcontractors shall provide, within ten (10) days of the execution of this agreement, written notice to the Covered Entity’s contract/grant manager the names and contact information of both the HIPAA Privacy Officer and HIPAA Security Officer. This information must be updated any time either of these contacts changes.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.

  • Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.

  • Amendment of Protected Health Information 8.1 To the extent Covered Entity determines that any Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within ten (10) business days after receipt of a written request from Covered Entity, make any amendments to such Protected Health Information that are requested by Covered Entity, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.526. 8.2 If any Individual requests an amendment to Protected Health Information directly from Business Associate or its agents or Subcontractors, Business Associate shall notify Covered Entity in writing within five (5) days of the receipt of the request. Whether an amendment shall be granted or denied shall be determined by Covered Entity.

  • Preservation and Disclosure of Securityholders Lists (a) The Trustee shall preserve, in as current a form as is reasonably practicable, all information as to the names and addresses of the Holders of each series of Securities (i) contained in the most recent list furnished to it as provided in Section 4.1, and (ii) received by it in the capacity of registrar or paying agent for such series, if so acting. The Trustee may destroy any list furnished to it as provided in Section 4.1 upon receipt of a new list so furnished. (b) In case three or more Holders of Securities (hereinafter referred to as "applicants") apply in writing to the Trustee and furnish to the Trustee reasonable proof that each such applicant has owned a Security for a period of at least six months preceding the date of such application, and such application states that the applicants desire to communicate with other Holders of Securities of a particular series (in which case the applicants must all hold Securities of such series) or with Holders of all Securities with respect to their rights under this Indenture or under such Securities and such application is accompanied by a copy of the form of proxy or other communication which such applicants propose to transmit, then the Trustee shall, within five Business Days after the receipt of such application, at its election, either (i) afford to such applicants access to the information preserved at the time by the Trustee in accordance with the provisions of subsection (a) of this Section 4.2, or (ii) inform such applicants as to the approximate number of Holders of Securities of such series or of all Securities, as the case may be, whose names and addresses appear in the information preserved at the time by the Trustee, in accordance with the provisions of subsection (a) of this Section 4.2, and as to the approximate cost of mailing to such Securityholders the form of proxy or other communication, if any, specified in such application. If the Trustee shall elect not to afford to such applicants access to such information, the Trustee shall, upon the written request of such applicants, mail to each Securityholder of such series or all Holders of Securities, as the case may be, whose name and address appears in the information preserved at the time by the Trustee in accordance with the provisions of subsection (a) of this Section 4.2 a copy of the form of proxy or other communication which is specified in such request, with reasonable promptness after a tender to the Trustee of the material to be mailed and of payment, or provision for the payment, of the reasonable expenses of mailing, unless within five days after such tender, the Trustee shall mail to such applicants and file with the Commission, together with a copy of the material to be mailed, a written statement to the effect that, in the opinion of the Trustee, such mailing would be contrary to the best interests of the Holders of Securities of such series or of all Securities, as the case may be, or would be in violation of applicable law. Such written statement shall specify the basis of such opinion. If the Commission, after opportunity for a hearing upon the objections specified in the written statement so filed, shall enter an order refusing to sustain any of such objections or if, after the entry of an order sustaining one or more of such objections, the Commission shall find, after notice and opportunity for hearing, that all the objections so sustained have been met, and shall enter an order so declaring, the Trustee shall mail copies of such material to all such Securityholders with reasonable promptness after the entry of such order and the renewal of such tender; otherwise the Trustee shall be relieved of any obligation or duty to such applicants respecting their application. (c) Each and every Holder of Securities, by receiving and holding the same, agrees with the Issuer and the Trustee that neither the Issuer nor the Trustee nor any agent of the Issuer or the Trustee shall be held accountable by reason of the disclosure of any such information as to the names and addresses of the Holders of Securities in accordance with the provisions of subsection (b) of this Section 4.2, regardless of the source from which such information was derived, and that the Trustee shall not be held accountable by reason of mailing any material pursuant to a request made under such subsection (b).

  • Preservation and Disclosure of Lists The Trustee shall preserve, in as current a form as is reasonably practicable, all information as to the names and addresses of the Holders contained in the most recent list furnished to it as provided in Section 5.01 or maintained by the Trustee in its capacity as Note Registrar, if so acting. The Trustee may destroy any list furnished to it as provided in Section 5.01 upon receipt of a new list so furnished.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Use and Disclosure of PHI Business Associate is limited to the following permitted and required uses or disclosures of PHI: a. Duty to Protect PHI. Business Associate shall protect PHI from, and shall use appropriate safeguards, and comply with Subpart C of 45 CFR Part 164 (Security Standards for the Protection of Electronic Protected Health Information) with respect to EPHI, to prevent the unauthorized Use or disclosure of PHI other than as provided for in this Contract or as required by law, for as long as the PHI is within its possession and control, even after the termination or expiration of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!