Security Incidents and/or Unauthorized Use or Disclosure Sample Clauses

Security Incidents and/or Unauthorized Use or Disclosure. Business Associate shall report to Covered Entity a successful Security Incident or any Use and/or Disclosure of PHI other than as provided for by this BA Agreement or permitted by applicable law within a reasonable time of becoming aware of such Security Incident and/or unauthorized Use or Disclosure (but not later than ten (10) days thereafter), in accordance with the notice provisions set forth herein. Business Associate shall take (i) prompt action to cure any such deficiencies as reasonably requested by Covered Entity; and (ii) any action pertaining to such Security Incident and/or unauthorized Use or Disclosure required by applicable federal and state laws and regulations. If such successful Security Incident or unauthorized Use or Disclosure results in a Breach as defined in the HITECH Act, then Business Associate shall comply with the requirements of Section 3.b below.
AutoNDA by SimpleDocs
Security Incidents and/or Unauthorized Use or Disclosure. Business Associate shall report to Covered Entity a successful Security Incident or any Use and/or Disclosure of PHI other than as provided for by this BA Agreement or permitted by applicable law within a reasonable time of becoming aware of such Security Incident and/or unauthorized Use or Disclosure (but not later than ten (10) days thereafter), in accordance with the notice provisions set forth herein. Business Associate shall take (i) prompt action to cure any such deficiencies as reasonably requested by Covered Entity; and (ii) any action pertaining to such Security Incident and/or unauthorized Use or Disclosure required by applicable federal and state laws and regulations. If such successful Security Incident or unauthorized Use or Disclosure results in a Breach as defined in the HITECH Act, then Covered Entity shall comply with the requirements of Section 3.b below. The Parties acknowledge and agree that this Section constitutes notice by Business Associate to Covered Entity of the ongoing existence and occurrence of attempted but Unsuccessful Security Incidents as defined herein. “Unsuccessful Security Incidents” will include, but not be limited to, pings and other broadcast attacks on Business Associate’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of PHI.

Related to Security Incidents and/or Unauthorized Use or Disclosure

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.

  • NOXIOUS WEEDS DISCLOSURE Buyers of property in the State of Montana should be aware that some properties contain noxious weeds. The laws of the State of Montana require owners of property within this state to control, and to the extent possible, eradicate noxious weeds. For information concerning noxious weeds and your obligations as an owner of property, contact either your local County extension agent or Weed Control Board.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Proprietary or Confidential Information of City Contractor understands and agrees that, in the performance of the work or services under this Agreement or in contemplation thereof, Contractor may have access to private or confidential information which may be owned or controlled by City and that such information may contain proprietary or confidential details, the disclosure of which to third parties may be damaging to City. Contractor agrees that all information disclosed by City to Contractor shall be held in confidence and used only in performance of the Agreement. Contractor shall exercise the same standard of care to protect such information as a reasonably prudent contractor would use to protect its own proprietary data.

Time is Money Join Law Insider Premium to draft better contracts faster.