Reports on Security Incidents Sample Clauses

Reports on Security Incidents. In addition to following the breach notification requirements in section 13402 of the Health Information Technology for Economic and Clinical Health Act of 2009 (“HITECH Act”), as amended, and related regulations, the Privacy Rule, the Security Rule, agency guidance and other applicable federal and state laws, Business Associate shall report to _______________at ____________, within two (2) days of discovery any security incident of which it becomes aware. At the sole expense of Business Associate, Business Associate shall comply with all federal and state breach notification requirements, including those applicable to Business Associate and those applicable to Covered Entity. Business Associate shall indemnify the Covered Entity for costs associated with any incident involving the acquisition, access, use or disclosure of Unsecured PHI in a manner not permitted under federal or state law and agency guidance. For purposes of the security incident reporting requirement, inconsequential unsuccessful incidents that occur on a daily basis, such as scans, “pings,” or other unsuccessful attempts to penetrate computer networks or servers containing electronic PHI maintained by Business Associate, need not be reported in accordance with this section, but may instead be reported in the aggregate on a monthly basis. Subcontractors and Agents. At any time PHI is provided or made available to Business Associate subcontractors or agents, Business Associate shall provide only the minimum necessary PHI for the purpose of the covered transaction and shall first enter into a subcontract or contract with the subcontractor or agent that contains substantially the same terms, conditions and restrictions on the use and disclosure of PHI as contained in this Agreement.
AutoNDA by SimpleDocs
Reports on Security Incidents. In addition to following the breach notification requirements in section 13402 of the Health Information Technology for Economic and Clinical Health Act of 2009 (“HITECH Act”), as amended, and related regulations, the Privacy Rule, the Security Rule, agency guidance and other applicable federal and state laws, Business Associate shall report to at , within two (2) days of discovery any security incident of which it becomes aware. At the sole expense of Business Associate, Business Associate shall comply with all federal and state breach notification requirements, including those applicable to Business Associate and those applicable to Covered Entity. Business Associate shall indemnify the Covered Entity for costs associated with any incident involving the acquisition, access, use or disclosure of Unsecured PHI in a manner not permitted under federal or state law and agency guidance. For purposes of the security incident reporting requirement, inconsequential unsuccessful incidents that occur on a daily basis, such as scans, “pings,” or other unsuccessful attempts to penetrate computer networks or servers containing electronic PHI maintained by Business Associate, need not be reported in accordance with this section, but may instead be reported in the aggregate on a monthly basis.
Reports on Security Incidents. In addition to following the breach notification requirements in section 13402 of the Health Information Technology for Economic and Clinical Health Act of 2009 (“HITECH Act”), as amended, and related regulations, the Privacy Rule, the Security Rule, agency guidance and other applicable federal and state laws, Business Associate shall report to the Regional Program Manager at PA Department of Corrections, 0000 Xxxxxxxxxx Xxxxxxx, Xxxxxxxxxxxxx, XX 00000 within two (2) days of discovery any security incident of which it becomes aware. At the sole expense of Business Associate, Business Associate shall comply with all federal and state breach notification requirements, including those applicable to Business Associate and those applicable to the DOC. Business Associate shall indemnify the DOC for costs associated with any incident involving the acquisition, access, use or disclosure of Unsecured PHI in a manner not permitted under federal or state law and agency guidance. For purposes of the security incident reporting requirement, inconsequential unsuccessful incidents that occur on a daily basis, such as scans, “pings,” or other unsuccessful attempts to penetrate computer networks or servers containing electronic PHI maintained by Business Associate, need not be reported in accordance with this section, but may instead be reported in the aggregate on a monthly basis.

Related to Reports on Security Incidents

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Statements, Confirmations and Notices of Adverse Claims (a) The Account Holder will send copies of all statements and confirmations for each Account simultaneously to the Secured Party and the Grantor. (b) When the Account Holder knows of any claim or interest in any Account or any property (including, without limitation, funds and financial assets) credited to any Account other than the claims and interests of the parties referred to in this Agreement, the Account Holder will promptly notify the Secured Party and the Grantor of such claim or interest.

  • Servicer to Maintain Perfection and Priority The Servicer covenants that, in order to evidence the interests of CNHCR and Issuing Entity under this Agreement, Servicer shall take such action, or execute and deliver such instruments as may be necessary or advisable (including, without limitation, such actions as are requested by Issuing Entity) to maintain and perfect, as a first priority interest, Issuing Entity’s security interest in the Receivables. Servicer shall, from time to time and within the time limits established by law, prepare and present to Issuing Entity for Issuing Entity to authorize the Servicer to file all financing statements, amendments, continuations, financing statements in lieu of a continuation statement, terminations, partial terminations, releases or partial releases, or any other filings necessary or advisable to continue, maintain and perfect the Issuing Entity’s security interest in the Receivables as a first-priority interest (each a “Filing”). Issuing Entity shall promptly authorize in writing Servicer to, and Servicer shall, effect such Filing under the Uniform Commercial Code without the signature of CNHCR or Issuing Entity where allowed by applicable law.

  • Perfection, Etc Subject to the Legal Reservations and Section 5.03, each Collateral Document delivered pursuant to this Agreement will, upon execution and delivery thereof, be effective to create in favor of the Collateral Agent for the benefit of the Secured Parties, legal, valid and enforceable Liens on, and security interests in, the Collateral described therein to the extent intended to be created thereby, except as to enforcement, as may be limited by applicable domestic bankruptcy, insolvency, fraudulent conveyance, reorganization (by way of voluntary arrangement, schemes of arrangements or otherwise), moratorium and other similar laws relating to or affecting creditors’ rights generally, general equitable principles (whether considered in a proceeding in equity or at law) and (a) when financing statements are filed in the offices of the Secretary of State of each Loan Party’s jurisdiction of organization or formation and applicable documents are filed and recorded as applicable in the United States Copyright Office or the United States Patent and Trademark Office and (b) upon the taking of possession or control by the Collateral Agent of such Collateral with respect to which a security interest may be perfected only by possession or control (which possession or control shall be given to the Collateral Agent to the extent possession or control by the Collateral Agent is required by the applicable Collateral Document) the Liens created by the Collateral Documents shall constitute fully perfected Liens so far as possible under relevant law on, and security interests in (to the extent intended to be created thereby and required to be perfected under the Loan Documents), all right, title and interest of the grantors in such Collateral in each case free and clear of any Liens other than Liens permitted hereunder.

  • Financing Statements and Other Filings; Maintenance of Perfected Security Interest The UCC financing statements (including fixture filings) prepared by the Collateral Agent based upon the information provided to the Collateral Agent in the Perfection Certificate for filing (and which UCC financing statements the Pledgors have been given an opportunity to review prior to filing) in each governmental, municipal or other office specified in Schedule 6 of this Agreement (or specified by notice from the applicable Pledgor to the Collateral Agent after the Closing Date in the case of filings, recordings or registrations required by Section 6.11 of the Credit Agreement), and the filings required to be made pursuant to the last sentence of this Section 3.3 in the United States Patent and Trademark Office or United States Copyright Office in order to perfect the security interest in Pledged Collateral consisting of Patents, Trademarks and Copyrights, are all the filings, recordings and registrations necessary to establish a legal, valid and perfected security interest in favor of the Collateral Agent in respect of all Pledged Collateral in which a security interest may be perfected by such filings, recordings or registrations. Each Pledgor represents and warrants that, as of the Closing Date, an appropriate Copyright Security Agreement, Trademark Security Agreement and Patent Security Agreement, as applicable, containing a description of all Intellectual Property Collateral consisting of Patents (and Patents for which applications are pending), registered Trademarks (and Trademarks for which registration applications are pending) or registered Copyrights (and Copyrights for which registration applications are pending), as applicable, have been delivered to the Collateral Agent for recording by the United States Patent and Trademark Office or United States Copyright Office. Each Pledgor agrees that at the sole cost and expense of the Pledgors, such Pledgor will maintain the security interest created by this Agreement in the Pledged Collateral as a perfected first priority security interest subject only to Permitted Liens.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!