Safeguards to Protect PHI Sample Clauses

Safeguards to Protect PHI. Business Associate agrees to use appropriate safeguards to prevent use or disclosure of PHI other than as provided for by this BA Agreement.
AutoNDA by SimpleDocs
Safeguards to Protect PHI a) BUSINESS ASSOCIATE agrees to implement and use appropriate safeguards, including protection of electronic data through administrative, physical and technical safeguards, to prevent use or disclosure of PHI other than as provided for by this BAA. “Appropriate safeguards” include, but are not limited to, physical, administrative and technical safeguards such as locking cabinets or rooms where PHI is housed, using computer passwords and other security measures to prevent unauthorized access to PHI in electronic format; implementing policies and procedures describing authorized access and use for BUSINESS ASSOCIATES workforce; and human resources policies and procedures to enforce these rules. b) BUSINESS ASSOCIATE will ensure that any of its agents, including, but not limited to any subcontractors that create, receive, maintain, or transmit PHI on behalf of the BUSINESS ASSOCIATE, will agree to the same restrictions and conditions that apply to the BUSINESS ASSOCIATE under the terms of this Agreement. c) BUSINESS ASSOCIATE will Report to PRACTICE any use or disclosure of protected health information not provided for by the Agreement of which it becomes aware, including breaches of unsecured protected health information as required by HIPAA Rules, and any security incident of which it becomes aware;

Related to Safeguards to Protect PHI

  • Suits to Protect the Collateral Subject to the provisions of Article 6 hereof, the Indenture Trustee in its sole discretion and without the consent of the Holders, on behalf of the Holders, may take all actions it deems necessary or appropriate in order to: (a) enforce any of the terms of the Security Documents; and (b) collect and receive any and all amounts payable in respect of the Secured Obligations of the Issuer hereunder. Subject to the provisions of the Security Documents, the Indenture Trustee shall have power (but not the obligation) to institute and to maintain such suits and proceedings as it may deem expedient to prevent any impairment of the Collateral by any acts which may be unlawful or in violation of any of the Security Documents or this Indenture, and such suits and proceedings as the Indenture Trustee, in its sole discretion, may deem expedient to preserve or protect its interests and the interests of the Holders in the Collateral (including power to institute and maintain suits or proceedings to restrain the enforcement of or compliance with any legislative or other governmental enactment, rule or order that may be unconstitutional or otherwise invalid if the enforcement of, or compliance with, such enactment, rule or order would impair the Lien on the Collateral or be prejudicial to the interests of the Holders or the Indenture Trustee).

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • Human and Financial Resources to Implement Safeguards Requirements The Borrower shall make available necessary budgetary and human resources to fully implement the EMP and the RP.

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Environmental and Social Safeguards All of the Projects will be implemented in compliance with the MCC Environmental Guidelines and the MCC Gender Policy, and any resettlement will be carried out in accordance with the World Bank’s Operational Policy on Involuntary Resettlement in effect as of July 2007 (“OP 4.12”) in a manner acceptable to MCC. In accordance with its policies, the Government will ensure that the Projects comply with all national environmental laws and regulations, licenses and permits, except to the extent such compliance would be inconsistent with this Compact. Specifically, the Government will: (a) cooperate with or complete, as the case may be, any ongoing environmental assessments, or if necessary undertake and complete any additional environmental assessments, social assessments, environmental management plans, environmental and social audits, resettlement policy frameworks, and resettlement action plans required under the laws of Indonesia, the MCC Environmental Guidelines, this Compact, the PIA, or any Supplemental Agreement, or as otherwise required by MCC, each in form and substance satisfactory to MCC; (b) ensure that Project-specific environmental and social management plans are developed and all relevant measures contained in such plans are integrated into project design, the applicable procurement documents and associated finalized contracts, in each case, in form and substance satisfactory to MCC; and (c) implement to MCC’s satisfaction appropriate environmental and social mitigation measures identified in such assessments or plans. Unless MCC agrees otherwise in writing, the Government will fund all necessary costs of environmental and social mitigation measures (including, without limitation, costs of resettlement) not specifically provided for, or that exceed the MCC Funding specifically allocated for such costs in, the Detailed Financial Plan for any Project. To maximize the positive social impacts of the Projects, address cross-cutting social and gender issues such as human trafficking, child and forced labor, and HIV/AIDS, and to ensure compliance with the MCC Gender Policy, the Government will: (x) develop a comprehensive social and gender integration plan which, at a minimum, identifies approaches for regular, meaningful and inclusive consultations with women and other vulnerable/underrepresented groups, consolidates the findings and recommendations of Project-specific social and gender analyses and sets forth strategies for incorporating findings of the social and gender analyses into final Project designs as appropriate (“Social and Gender Integration Plan”); and (y) ensure, through monitoring and coordination during implementation, that final Activity designs, construction tender documents and implementation plans are consistent with and incorporate the outcomes of the social and gender analyses and social and gender integration plan. To address gender concerns that impact women’s ability to participate across Projects, MCA- Indonesia will adopt a detailed workplan, subject to MCC approval, for gender work to be undertaken at the policy, institutional capacity building and community levels (the “Targeted Gender Activities”). Xxxxx XX sets forth the MCC Funding allocated for the performance of the Targeted Gender Activities. Prior to the second disbursement of MCC Funding for the Targeted Gender Activities, MCA-Indonesia shall have completed detailed action plans and provided evidence of demonstrated commitment of relevant stakeholders to addressing policy constraints identified in the workplan.

  • ACCESS TO PROTECTED HEALTH INFORMATION 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524. 7.2 If any Individual requests access to Protected Health Information directly from Business Associate or its agents or Subcontractors, Business Associate shall notify Covered Entity in writing within two (2) days of the receipt of the request. Whether access shall be provided or denied shall be determined by Covered Entity. 7.3 To the extent that Business Associate maintains Protected Health Information that is subject to access as set forth above in one or more Designated Record Sets electronically and if the Individual requests an electronic copy of such information, Business Associate shall provide the Individual with access to the Protected Health Information in the electronic form and format requested by the Individual, if it is readily producible in such form and format; or, if not, in a readable electronic form and format as agreed to by Covered Entity and the Individual.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Safeguards for Personal Information Supplier agrees to develop, implement, maintain, and use administrative, technical, and physical safeguards, as deemed appropriate by DXC, to preserve the security, integrity and confidentiality of, and to prevent intentional or unintentional non-permitted or violating use or disclosure of, and to protect against unauthorized access to or accidental or unlawful destruction, loss, or alteration of, the Personal Information Processed, created for or received from or on behalf of DXC in connection with the Services, functions or transactions to be provided under or contemplated by this Agreement. Such safeguards shall meet all applicable legal standards (including any encryption requirements imposed by law) and shall meet or exceed accepted security standards in the industry, such as ISO 27001/27002. Supplier agrees to document and keep these safeguards current and shall make the documentation available to DXC upon request. Supplier shall ensure that only Supplier’s employees or representatives who may be required to assist Supplier in meeting its obligations under this Agreement shall have access to the Personal Information.

  • Contractor and Employee Security Precautions The security aspects of working at the Correctional Facility are critical. The following security precautions are part of the site conditions and are a part of this Contract. All persons coming on the site in any way connected with this Work shall be made aware of them, and it is the (General) Contractor’s responsibility to check and enforce them.

  • Safeguards Monitoring and Reporting The Borrower shall do the following or cause the Project Executing Agency to do the following:

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!