Reporting Security Incidents and Unauthorized Use or Disclosure Sample Clauses

Reporting Security Incidents and Unauthorized Use or Disclosure. GA agrees to report to Company’s Privacy Office any successful security incident of which it becomes aware and any use or disclosure of the Protected Health Information not provided for by the Agreement. Such report shall be made as soon as possible, but in no event later than three business days following the date that GA becomes aware of such successful security incident or unauthorized use or disclosure. GA shall take action(s) requested by Company to mitigate any such unauthorized use or disclosure. GA will report any security incident that is attempted but not successful of which it becomes aware only upon receipt of a written request from Company.
AutoNDA by SimpleDocs

Related to Reporting Security Incidents and Unauthorized Use or Disclosure

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Data Disclosure Under Minnesota Statute § 270C.65, Subdivision 3 and other applicable law, the Contractor consents to disclosure of its social security number, federal employer tax identification number, and/or Minnesota tax identification number, already provided to the State, to federal and state agencies and state personnel involved in the payment of state obligations. These identification numbers may be used in the enforcement of federal and state laws which could result in action requiring the Contractor to file state tax returns, pay delinquent state tax liabilities, if any, or pay other state liabilities.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Proprietary or Confidential Information of City Contractor understands and agrees that, in the performance of the work or services under this Agreement or in contemplation thereof, Contractor may have access to private or confidential information which may be owned or controlled by City and that such information may contain proprietary or confidential details, the disclosure of which to third parties may be damaging to City. Contractor agrees that all information disclosed by City to Contractor shall be held in confidence and used only in performance of the Agreement. Contractor shall exercise the same standard of care to protect such information as a reasonably prudent contractor would use to protect its own proprietary data.

  • Restricting on disclosure and use of the Confidential Information 5.1 The Receiving Party undertakes not to use the Confidential Information for any purpose other than:

Time is Money Join Law Insider Premium to draft better contracts faster.