Common use of Reporting of Security Incidents Clause in Contracts

Reporting of Security Incidents. Business Associate shall report to Covered Entity any Security Incident affecting EPHI created, received, maintained, or transmitted by Business Associate on behalf of Covered Entity, of which Business Associate becomes aware. This Section constitutes notice to Covered Entity of routine and ongoing attempts to gain unauthorized access to Business Associate’s information systems (each an “Unsuccessful Attack”), including but not limited to pings, port scans, and denial of service attacks, for which no additional notice shall be required provided that no such incident results in unauthorized access to Electronic PHI.

Appears in 8 contracts

Samples: Professional Services, Contract, Contract for Chemical Dependency Treatment Services

AutoNDA by SimpleDocs

Reporting of Security Incidents. Business Associate shall report to Covered Entity any Security Incident affecting EPHI ePHI created, received, maintained, or transmitted by Business Associate on behalf of Covered Entity, of which Business Associate becomes aware. This Section constitutes notice to Covered Entity of routine and ongoing attempts to gain unauthorized access to Business Associate’s 's information systems (each an "Unsuccessful Attack"), including but not limited to pings, port scans, and denial of service attacks, for which no additional notice shall be required provided that no such incident results in unauthorized access to Electronic PHIePHI.

Appears in 4 contracts

Samples: Client Services Agreement, Client Services Agreement, Client Services Agreement

AutoNDA by SimpleDocs

Reporting of Security Incidents. Business Associate shall report to Covered Entity any Security Incident affecting EPHI created, received, maintained, maintained or transmitted by Business Associate on behalf of Covered Entity, of which Business Associate becomes aware. This Section constitutes notice to Covered Entity of routine and ongoing attempts to gain unauthorized access to Business Associate’s information systems (each an “Unsuccessful Attack”), including but not limited to pings, port scans, and denial of service attacks, for which no additional notice shall be required provided that no such incident results in unauthorized access to Electronic PHI.

Appears in 1 contract

Samples: Hipaa Business Associate Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!