Security of Protected Health Information Sample Clauses

Security of Protected Health Information. In accordance with the‌ HIPAA Security Rule, the Trustees and SASMI, with respect to the group health benefit operations of SASMI, directly or in relation to a Local Fund, will safeguard Electronic Protected Health Information by:
AutoNDA by SimpleDocs
Security of Protected Health Information. (a) Business Associate has implemented policies and procedures to ensure that its receipt, maintenance, or transmission of all PHI, either electronic or otherwise, on behalf of Covered Entity complies with the applicable administrative, physical, and technical safeguards required protecting the confidentiality, availability and integrity of PHI as required by the HIPAA Privacy Rules and Security Standards.
Security of Protected Health Information. Subscriber may not use the Service in any way that is illegal, fraudulent, or violates the provisions of the Health Insurance Portability and Accountability Act of 1996 and its later extensions and modifications, including the Health Information Technology for Economic and Clinical Health Act (collectively “HIPAA”). These provisions restrict all unauthorized hacking, testing, or assessment which is intended to bypass the security policies and controls of the software. Subscriber acknowledges that Psych Select is not responsible for violation of these laws or related regulations due to Subscriber's actions or circumstances outside of Psych Select's control. These actions and circumstances include, but are not limited to the failure of Subscriber or Subscriber's employees and agents to: (a) choose adequate account passwords, and to protect those passwords from unauthorized disclosure; (b) log out of the Service on any computer or other device; (c) authenticate the identity of any patient or staff member requesting access to patient or staff passwords; (d) ensure that staff members with access to passwords are aware of HIPAA and have agreed to be bound by them; (e) use tools provided within the Service to monitor log-in activity for security breaches; (f) guard any protected health information (as defined by HIPAA) (hereinafter "PHI") downloaded to Subscriber's own storage device in accordance with HIPAA; (g) ensure that all individuals who are granted access to PHI have a legitimate need for that information in order to conduct healthcare operations (as defined by HIPAA); (h) ensure that any device used to access PHI is free from software viruses and any other hardware or software methods for collecting and disseminating information to unauthorized individuals;
Security of Protected Health Information to be in force at the effective date of this BA Contract:
Security of Protected Health Information. (a) Sub-Business Associate agrees to implement appropriate administrative, physical, and technical safeguards to prevent the unauthorized use and disclosure of Protected Health Information, and to protect the confidentiality, integrity, and availability of Electronic Protected Health Information, as required by the HIPAA Rules. Without limiting the foregoing, Sub-Business Associate agrees to comply with the requirements of 45 CFR 164.308, 164.310, 164.312, and 164.316, as may be amended and interpreted in guidance from time to time.
Security of Protected Health Information. (a) Sub-Business Associate agrees to use appropriate safeguards to protect against any use or disclosure of Personal Information not provided for herein and to comply, where applicable, with Subpart C of 45 CFR Part 164 with respect to Electronic Protected Health Information. Without limiting the foregoing, Sub-Business Associate agrees to implement appropriate administrative, physical, and technical safeguards to prevent the unauthorized use and disclosure of Personal Information, and to protect the confidentiality, integrity, and availability of Electronic Personal Information against accidental or unlawful destruction, alteration, unauthorized or improper disclosure or access, including monitoring access to, use and disclosure of Personal Information whether in physical or electronic form. Sub-Business Associate will regularly test and monitor the effectiveness of its safeguards, controls, systems and procedures, and will periodically identify reasonably foreseeable internal and external risks to the security, confidentiality, integrity, and availability of the Personal Information, and ensure that these risks are addressed. Sub-Business Associate shall use secure user identification and authentication protocols, including, but not limited to unique user identification, use of appropriate access controls, and strict measures to protect identification and authentication processes.
Security of Protected Health Information. (a) Business Associate agrees to implement appropriate administrative, physical, and technical safeguards required by the HIPAA Rules.
AutoNDA by SimpleDocs
Security of Protected Health Information. (a) Business Associate agrees to use appropriate safeguards to protect against any use or disclosure of PHI not provided for herein and to comply, where applicable, with Subpart C of 45 CFR Part 164 with respect to Electronic PHI Without limiting the foregoing, Business Associate agrees it has implemented, documented and will maintain appropriate administrative, physical, and technical safeguards to protect against and prevent the unauthorized use and disclosure of PHI, and to protect the confidentiality, integrity, and availability of Electronic PHI.
Security of Protected Health Information. Business Associate will protect the PH1 from any Unauthorized Use using safeguards and security measures that comply with the Privacy Rule and other applicable laws and/or regulations. Without limiting the foregoing, Business Associate will use safeguards and security measure to protect the PH1 that are at least as stringent as the safeguards and security measures that Business Associate uses to protect its own information.
Security of Protected Health Information. Business Associate will protect the PHI from any Unauthorized Use using safeguards and security measures that comply with the Privacy and Security Rules and other applicable laws and/or regulations. Without limiting the foregoing, Business Associate will use safeguards and security measures to protect the PHI that are at least as stringent as the safeguards and security measures that Business Associate uses to protect its own information and that comply with the administrative, physical, and technical safeguards as prescribed by the Security Rule.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!