Reporting Unauthorized Disclosures and Breaches Sample Clauses

Reporting Unauthorized Disclosures and Breaches. During the term of this BAA, BA shall notify CE within 24 hours of discovering a Breach of security; intrusion; or unauthorized acquisition, access, use or disclosure of CE’s PHI in violation of any applicable federal or state law, including security incidents. BA shall identify for the CE the individuals whose unsecured PHI has been, or is reasonably believed to have been, Breached so that CE can comply with any notification requirements if necessary. BA shall also indicate whether the PHI subject to the Breach; intrusion; or unauthorized acquisition, access, use or disclosure was encrypted or destroyed at the time. BA shall take prompt corrective action to cure any deficiencies that result in Breaches of security; intrusion; or unauthorized acquisition, access, use, and disclosure. BA shall fulfill all breach notice requirements unless CE notifies BA that CE will take over the notice requirements. BA shall reimburse CE for all costs incurred by CE that are associated with any mitigation, investigation and notice of Breach CE undertakes or provides under HIPAA, HITECH Act, and the Privacy and Security Rule as a result of a Breach of CE’s PHI caused by BA or BA’s subcontractor or agent. If the unauthorized acquisition, access, use or disclosure of CE’s PHI involves only Secured PHI, BA shall notify CE within 10 days of discovering the Breach but is not required to notify CE of the names of the individuals affected.
AutoNDA by SimpleDocs
Reporting Unauthorized Disclosures and Breaches. During the term of this BAA, BA shall notify CE within 24 hours of any suspected or actual Breach of security; intrusion; or unauthorized acquisition, access, use or disclosure of PHI in violation of any applicable federal or state law. BA shall identify for the CE the individuals whose unsecured PHI has been, or is reasonably believed to have been, Breached so that CE can comply with any notification requirements. BA shall also indicate whether the PHI subject to the suspected or actual Breach; intrusion; or unauthorized acquisition, access, use or disclosure was encrypted or destroyed at the time. BA shall take prompt corrective action to cure any deficiencies that result in Breaches of security; intrusion; or unauthorized acquisition, access, use, and disclosure. BA shall reimburse CE for all costs associated with any notice of Breach CE is required to provide under HIPAA, HITECH Act, and the Privacy and Security Rule. For purposes of this paragraph, BA is not an agent of CE.
Reporting Unauthorized Disclosures and Breaches. During the term of this contract, the contractor shall notify the state within three business days of discovering: (i) any use or disclosure of PHI not provided for in this agreement, including any use or disclosure of the state’s PHI in violation of any applicable federal or state law; (ii) any security incident of which contractor becomes aware; and/or (iii) any Breach of Unsecured PHI of which it becomes aware. The contractor shall identify for the state the individuals whose unsecured PHI has been, or is reasonably believed to have been, breached so that the state can comply with any notification requirements if necessary. The contractor shall also indicate whether the PHI subject to the breach; intrusion; or unauthorized acquisition, access, use or disclosure was encrypted or destroyed at the time. The contractor shall take prompt corrective action to cure any deficiencies that result in breaches of security; intrusion; or unauthorized acquisition, access, use, and disclosure. For the purposes of reporting under this provision, a reportable security incident shall not include unsuccessful or inconsequential incidents that do not represent a material threat to the confidentiality, integrity or availability of PHI (such as scans, pings or unsuccessful attempts to penetrate computer networks). If the unauthorized acquisition, access, use or disclosure of the state’s PHI involves only secured PHI, the contractor shall notify the state within 10 days of discovering the breach but is not required to notify the state of the names of the individuals affected.
Reporting Unauthorized Disclosures and Breaches. During the term of this BAA, BA shall notify CE within 15 days of discovering a Breach of security; intrusion; or unauthorized acquisition, access, use or disclosure of CE’s PHI in violation of any applicable federal or state law. BA shall identify for the CE the individuals whose unsecured PHI has been, or is reasonably believed to have been, Breached so that CE can comply with any notification requirements. BA shall also indicate whether the PHI subject to the Breach; intrusion; or unauthorized acquisition, access, use or disclosure was encrypted or destroyed at the time. BA shall make every reasonable effort to correct any deficiencies it caused that result in Breaches of security; intrusion; or unauthorized acquisition, access, use, and disclosure. If the unauthorized acquisition, access, use or disclosure of CE’s PHI involves only Secured PHI, BA shall notify CE within 30 days of discovering the Breach but is not required to notify CE of the names of the individuals affected.

Related to Reporting Unauthorized Disclosures and Breaches

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Authorized Disclosure Each Party may disclose Confidential Information belonging to the other Party to the extent such disclosure is reasonably necessary in the following situations:

  • Confidentiality and Disclosure of Offering Materials by Potential Investor Potential Investor acknowledges on behalf of itself and any and all Related Parties that the Offering Materials are considered confidential and proprietary information of Owner and/or JLL, and Potential Investor will not make (or cause or permit any Related Party to make) any Offering Materials available, or disclose any of the contents thereof, to any person without Owner’s or JLL’s prior written consent; provided, however, that the Offering Materials may be disclosed to the Potential Investor’s Representative (if any), the Potential Investor's partners, employees, legal counsel, advisors, institutional lenders and other capital sources (collectively the "Related Parties") as reasonably required for an evaluation of the Property. Such Related Parties shall be informed by Potential Investor of the confidential nature of the Offering Materials and the terms of this Agreement and shall be directed by Potential Investor to keep the Offering Materials and related information strictly confidential in accordance with this Agreement and to otherwise abide by the terms of this Agreement as if such party was the Potential Investor hereunder. In the event any Related Party shall take or omit to take any action which if taken or omitted to be taken by Potential Investor would constitute a breach of or a default under the terms hereof, the such act or omission by such Related Party shall be deemed to be a breach of the terms hereof by Potential Investor.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Confidentiality of Client Information ENP providers shall ensure that information about, or obtained from a participant’s records, shall be maintained in a confidential manner.

  • Confidentiality of Listing Information Verizon shall accord Reconex Listing Information the same level of confidentiality that Verizon accords its own listing information, and shall use such Listing Information solely for the purpose of providing directory-related services; provided, however, that should Verizon elect to do so, it may use or license Reconex Listing Information for directory publishing, direct marketing, or any other purpose for which Verizon uses or licenses its own listing information, so long as Reconex Customers are not separately identified as such; and provided further that Reconex may identify those of its Customers who request that their names not be sold for direct marketing purposes, and Verizon shall honor such requests to the same extent it does so for its own Customers. Verizon shall not be obligated to compensate Reconex for Verizon’s use or licensing of Reconex Listing Information.

Time is Money Join Law Insider Premium to draft better contracts faster.