Reporting of Unauthorized Disclosures or Misuse of PHI Sample Clauses

Reporting of Unauthorized Disclosures or Misuse of PHI. Business Associate shall report to the Covered Entity any use or disclosure of PHI not authorized by this Agreement or in writing by the Covered Entity. Business Associate shall make the report to the Covered Entity’s Privacy Official not less than one (1) business day after Business Associate learns of such use or disclosure. Business Associate’s report shall identify: (i) the nature of the unauthorized use or disclosure, (ii) the PHI used or disclosed, (iii) who made the unauthorized use or received the unauthorized disclosure, (iv) what Business Associate has done or shall do to mitigate any deleterious effect of the unauthorized use or disclosure, and (v) what corrective action Business Associate has taken or shall take to prevent future similar unauthorized use or disclosure. Business Associate shall provide such other information, including a written report, as reasonably requested by the Covered Entity’s Privacy Official, or his or her designee.
AutoNDA by SimpleDocs
Reporting of Unauthorized Disclosures or Misuse of PHI. Business Associate shall report to Covered Entity any use or disclosure of PHI not authorized by this Addendum or in writing by Covered Entity. Business Associate shall make the report to Covered Entity’s Privacy Official not less than one (1) business day after Business Associate learns of such use or disclosure. Business Associate’s report shall identify: (i) the nature of the unauthorized use or disclosure,
Reporting of Unauthorized Disclosures or Misuse of PHI. NFP shall report to County any unauthorized acquisition, access, use or disclosure of PHI. NFP shall make the report to County within ten (10) business days after NFP confirms the existence of such use or disclosure. NFP’s report shall identify: (i) each individual protected by this Exhibit whose PHI has been, or is reasonably believed by NFP to have been, accessed, acquired or disclosed,
Reporting of Unauthorized Disclosures or Misuse of PHI. BA shall ensure compliance with the HIPAA Standards for Privacy of Individually Identifiable Health Information, 45 C.F.R. Part 160 and Part 164 (the “Privacy Rule”). Without limiting the generality of the foregoing, XX agrees that it will, in accordance with HIPAA, comply with the following: BA agrees to not use or disclose personal health information PHI other than as permitted or required by this Attachment, the Contract or as Required By Law. XX agrees to use appropriate safeguards to prevent use or disclosure of PHI other than as provided for by this Attachment and the Contract. BA shall implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of EPHI that it creates, receives, maintains or transmits on behalf of the Covered Entity. XX agrees to mitigate, to the extent practicable, any harmful effect that is known to BA of a use or disclosure of PHI by BA in violation of the requirements of this Attachment, the Contract and HIPAA. XX agrees to report to Covered Entity any use or disclosure of PHI not provided for by this Attachment and the Contract of which it becomes aware, within seven (7) business days. XX agrees to ensure that any agent, including a subcontractor, to whom it provides PHI and/or EPHI received from, or created or received by BA on behalf of Covered Entity, agrees to the same restrictions and conditions that apply through this Attachment and the Contract to BA with respect to such information. BA agrees to provide access, at the written request of Covered Entity, within ten
Reporting of Unauthorized Disclosures or Misuse of PHI. Contractor shall report to City any unauthorized acquisition, access, use or disclosure (“Breach”) of PHI. Contractor shall make the written report to City’s Privacy Official as soon as possible but not more than ten (10) calendar days after Contractor learns of such breach. Contractor’s written report shall identify: (i) the identity of each individual protected by this BAA whose PHI has been, or is reasonably believed by Contractor to have been accessed, acquired or disclosed, (ii) the date and nature of the breach, (iii) the PHI used or disclosed, (iv) who made the unauthorized use or received the unauthorized disclosure, (v) what Contractor has done or shall do to mitigate any deleterious effect of the breach, and (vi) what corrective action Contractor has taken or shall take to prevent future similar unauthorized use or disclosure. Contractor shall provide such other information, as reasonably requested by City’s Privacy Official.

Related to Reporting of Unauthorized Disclosures or Misuse of PHI

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Authorized Disclosure Each Party may disclose Confidential Information belonging to the other Party to the extent such disclosure is reasonably necessary in the following situations:

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Reporting Unauthorized Transactions You should notify us immediately if you believe your Access Codes or any Access Devices have been lost or stolen, that someone has gained access to the Security Procedure, or that someone has transferred or may transfer money from your Account without your permission or if you suspect any fraudulent activity on your Account. To notify us, call us at the number provided in Section 9.6 between 8:00 a.m. to 4:30 p.m. Central Time during a Business Day.

  • Permitted Uses and Disclosures of Protected Health Information Business Associate:

  • Use and Disclosure of Protected Health Information The Business Associate must not use or further disclose protected health information other than as permitted or required by the Contract or as required by law. The Business Associate must not use or further disclose protected health information in a manner that would violate the requirements of HIPAA Regulations.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • CONFIDENTIALITY/SAFEGUARDING OF INFORMATION The CONTRACTOR shall not use or disclose any information concerning the AGENCY, or information that may be classified as confidential, for any purpose not directly connected with the administration of this contract, except with prior written consent of the AGENCY, or as may be required by law.

Time is Money Join Law Insider Premium to draft better contracts faster.