Reporting of Security Incidents. Within two (2) business days of discovery, Business Associate will report to the Covered Entity any Security Incident that involves the (1) unpermitted acquisition, access, use, or disclosure of PHI; and/or (2)(a) modification or destruction of Electronic PHI or (b) interference with system operations in an information system containing Electronic PHI. For any other type of Security Incident, Business Associate shall report such incident to Covered Entity upon request. Such reports shall include a description of the incident, identification of any Individuals affected (if any), and the types of PHI involved (if any). The day the Security Incident is discovered or would have been discovered with the exercise of reasonable diligence will be considered the first business day of the reporting period.
Appears in 8 contracts
Samples: Confidentiality Business Associate Agreement, Business Associate Agreement, And Confidentiality Business Associate Agreement
Reporting of Security Incidents. Within two (2) business days Business Days of discovery, Business Associate will report to the Covered Entity any Security Incident that involves the (1) unpermitted acquisition, access, use, or disclosure of PHI; and/or (2)(a) modification or destruction of Electronic PHI or (b) interference with system operations in an information system containing Electronic PHI. For any other type of Security Incident, Business Associate shall report such incident to Covered Entity upon request. Such reports shall include a description of the incident, identification of any Individuals affected (if any), and the types of PHI involved (if any). The day the Security Incident is discovered or would have been discovered with the exercise of reasonable diligence will be considered the first business day Business Day of the reporting period.
Appears in 7 contracts
Samples: Business Associate Agreement, , and Confidentiality Business Associate Agreement, Business Associate Agreement
Reporting of Security Incidents. Within two (2) business days Business Days of discovery, Business Associate will shall report to the Covered Entity any Security Incident that involves the (1) unpermitted acquisition, access, use, or disclosure of PHI; and/or (2)(a2) modification or destruction of Electronic PHI or PHI; (b3) interference with system operations in an information system containing Electronic PHI. For any other type of Security Incident, Business Associate shall report such incident to Covered Entity upon request. Such reports shall include a description of the incident, identification of any Individuals affected (if any)affected, and the types of PHI involved (if any). The day the Security Incident is discovered or would have been discovered with the exercise of reasonable diligence will be considered the first business day Business Day of the reporting period.
Appears in 3 contracts
Samples: Business Associate Agreement, , and Confidentiality Business Associate Agreement, Business Associate Agreement
Reporting of Security Incidents. Within two (2) business days Business Days of discovery, Business Associate will report to the Covered Entity any Security Incident that involves the (1) unpermitted acquisition, access, use, or disclosure of PHI; and/or and / or (2)(a) modification or destruction of Electronic PHI or (b) interference with system operations in an information system containing Electronic PHI. For any other type of Security Incident, Business Associate shall report such incident to Covered Entity upon request. Such reports shall include a description of the incident, identification of any Individuals affected (if any), and the types of PHI involved (if any). The day the Security Incident is discovered or would have been discovered with the exercise of reasonable diligence will be considered the first business day Business Day of the reporting period.
Appears in 1 contract
Samples: www.myflorida.com
Reporting of Security Incidents. Within two (2) business days Business Days of discovery, Business Associate will report to the Covered Entity any Security Incident that involves the (1) unpermitted acquisition, access, use, or disclosure of PHI; and/or (2)(a) modification or destruction of Electronic PHI or (b) interference with system operations in an information system containing Electronic PHI. For any other type of Security Incident, Business Associate shall report such incident to Covered Entity upon request. Such reports shall include a description of the incident, identification of any Individuals affected (if any), and the types of PHI involved (if any). The day the Security Incident is discovered or would have been discovered with the exercise of reasonable diligence will be considered the first business day (1st) Business Day of the reporting period.
Appears in 1 contract