Common use of Safeguards and Appropriate Use of Protected Health Information Clause in Contracts

Safeguards and Appropriate Use of Protected Health Information. Customer is responsible for implementing appropriate privacy and security safeguards to protect its Protected Health Information in compliance with HIPAA. Without limitation, it is Customer’s obligation to not include Protected Health Information in: (i) information Customer submits to technical support personnel through a technical support request or to community support forums; or (ii) Customer’s address book or directory information.

Appears in 4 contracts

Samples: Imanage Cloud Services Agreement, Imanage Cloud Services Agreement, Cloud Services Agreement

AutoNDA by SimpleDocs

Safeguards and Appropriate Use of Protected Health Information. Customer is responsible for implementing appropriate privacy and security safeguards to protect its Protected Health Information in compliance with HIPAA. Without limitation, it . It is Customer’s obligation to not include exclude Protected Health Information in: (i) from information Customer submits to technical support personnel through a technical support request or request. Customer is solely responsible for ensuring the Protected Health Information it transmits via Zoom may be legally disclosed to community support forums; or (ii) Customer’s address book or directory informationthe communications recipient(s).

Appears in 3 contracts

Samples: Business Associate Agreement, Business Associate Agreement, Business Associate Agreement

AutoNDA by SimpleDocs

Safeguards and Appropriate Use of Protected Health Information. Customer is responsible for implementing appropriate privacy and security safeguards to protect its Protected Health Information PHI in compliance with HIPAA. Without limitation, it is Customer’s obligation to not to: i. Not include Protected Health Information PHI in: (ia) information Customer submits to technical support personnel through a technical support request or to community support forums; or and (iib) Customer’s address book or directory information. ii. Implement privacy and security safeguards in the systems, applications, and software Customer controls, configures, and uploads into the Business Associate’s Software.

Appears in 1 contract

Samples: Business Associate Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!