Security Rule Compliance Sample Clauses

Security Rule Compliance. Business Associate shall establish, implement and maintain appropriate administrative, physical and technical safeguards in accordance with Subpart C of 45 C.F.R. Part 164 (the “Security Rule”) that reasonably and appropriately protect the confidentiality, integrity, and availability of any ePHI that it creates, receives, maintains, or transmits on behalf of Covered Entity and to prevent the use or disclosure of ePHI in any manner other than as permitted by this Agreement.
AutoNDA by SimpleDocs
Security Rule Compliance. Business associate shall comply with the Security Rule’s administrative, physical and technical safeguard requirements as set forth in 45 CFR Part 164 Sections 164.308, 164.310, 164.312, and 164.316.
Security Rule Compliance. Business Associate shall comply with the Security Rule requirements set forth in 45 C.F.R. §§164.308, 164.310, 164.312, 164.314, and 164.316, all of which are hereby incorporated into the Agreement. Business Associate shall also comply with all other provisions of the Security Rule not specifically stated in this Agreement. Business Associate represents and warrants that it has implemented, and during the term of this Agreement shall maintain, comprehensive written privacy and security policies and procedures and the necessary administrative, technical, and physical safeguards appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. As needed to continue the provision of reasonable and appropriate protection of PHI, Business Associate shall review and modify its security measures implemented pursuant to the Security Rule and any associated policies and procedures. Business Associate shall update documentation of such security measures in accordance with 45 C.F.R. §164.316.
Security Rule Compliance. Vendor shall comply with the Security Rule’s administrative, physical and technical safeguard requirements. As part of compliance with the Security Rule, Vendor shall develop and implement written security policies and procedures with respect to the electronic PHI they handle. By signing this Amendment, the Vendor assures and acknowledges compliance with the requirements of HITECH including meeting the administrative, physical and technical safeguard requirements of the HIPAA Security Rule. (45 C.F.R. Part 160, 162, 164.) Vendor also assures and acknowledges that the electronic PHI they transmit is encrypted and that it will adopt internal procedures for reporting breaches and mitigating potential damages.
Security Rule Compliance. The Agency shall comply with the Security Rule‟s administrative, physical and technical safeguard requirements. As part of compliance with the Security Rule, the Agency shall develop and implement written security policies and procedures with respect to the electronic PHI they handle. By signing this Agreement, the Agency assures and acknowledges compliance with the requirements of HITECH including meeting the administrative, physical and technical safeguard requirements of the HIPAA Security Rule. (45 CFR Part 160, 162, 164.) The Agency also assures and acknowledges that the electronic PHI they transmit is encrypted and that it will adopt internal procedures for reporting breaches and mitigating potential damages.
Security Rule Compliance. Business Associate shall comply with applicable provisions of the Security Rule (45 CFR 164.306, 308, 310, 312, 316 and any amendments thereto) as required by the HITECH Act, including developing and implementing written information security policies and procedures and otherwise meeting the Security Rule documentation requirements. Business Associate acknowledges that it is subject to civil and criminal enforcement for failure to comply with the Privacy Rule and Security Rule.
Security Rule Compliance. Comply with the Security Rule to maintain the security of, and prevent any unauthorized use and/or disclosure of, electronic Protected Health Information. Business Associate shall maintain and implement a comprehensive information privacy and security program that complies with HITECH, HIPAA, and the regulations and guidance issued thereunder by the U.S. Department of Health and Human Services (“HHS”). Without limitation, this includes administrative, technical and physical safeguards that are appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities involving Protected Health Information. Business Associate shall comply with the HHS guidance to render unsecured PHI unusable, unreadable, or indecipherable to unauthorized individuals, with respect to ePHI in motion and at rest, and destruction of PHI. In addition, in the event that the Agreement contains specific requirements regarding information and data security, Business Associate will comply with all such provisions of the Agreement.
AutoNDA by SimpleDocs

Related to Security Rule Compliance

  • Child Abuse Reporting Requirement Grantee will:

  • PCI Compliance A. The Acquiring Bank will provide The Merchant with appropriate training on PCI PED and/or DSS rules and regulations in respect of The Merchants obligations. Initial training will be provided and at appropriate intervals as and when relevant changes are made to such rules and regulations.

  • ADDITIONAL REPORTING REQUIREMENTS Contractor agrees to submit written quarterly reports to H-GAC detailing all transactions during the previous three (3) month period. Reports must include, but are not limited, to the following information:

  • Standards Compliance DNS. Registry Operator shall comply with relevant existing RFCs and those published in the future by the Internet Engineering Task Force (IETF), including all successor standards, modifications or additions thereto relating to the DNS and name server operations including without limitation RFCs 1034, 1035, 1123, 1982, 2181, 2182, 2671, 3226, 3596, 3597, 4343, and 5966. DNS labels may only include hyphens in the third and fourth position if they represent valid IDNs (as specified above) in their ASCII encoding (e.g., “xn--ndk061n”).

  • CERTIFICATION REGARDING DRUG-FREE WORKPLACE REQUIREMENTS The undersigned (authorized official signing for the contracting organization) certifies that the contractor will, or will continue to, provide a drug-free workplace in accordance with 45 CFR Part 76 by:

  • SECURITY CLEARANCE REQUIREMENTS ‌ The OCO must tailor security requirements (both facility and employee), clauses, provisions, and other applicable terms and conditions specific to each task order’s solicitation and award. Only those Contractors that meet the required security clearance levels on individual task order solicitations are eligible to compete for such task orders. In general, all necessary facility and employee security clearances shall be at the expense of the Contractor. In some cases, Government offices that conduct background investigations do not have a means for accepting direct compensation from Contractors and instead charge customer agencies for the background investigations. In these cases, the Contractor shall be flexible in establishing ways of reimbursing the Government for these expenses. The individual task order should specify the terms and conditions for reimbursement, if any, for obtaining security clearances. The Contractor shall comply with all security requirements in task orders awarded under XXXXX.

  • CONTRACT COMPLIANCE REQUIREMENT The HUB requirement on this Contract is 0%. The student engagement requirement of this Contract is 0 hours. The Career Education requirement for this Contract is 0 hours. Failure to achieve these requirements may result in the application of some or all of the sanctions set forth in Administrative Policy 3.10, which is hereby incorporated by reference.

  • General Reporting Requirements The MA-PD Sponsor agrees to submit to information to CMS according to 42 CFR §§423.505(f), 423.514, and the “Final Medicare Part D Reporting Requirements,” a document issued by CMS and subject to modification each program year.

  • Federal Medicaid System Security Requirements Compliance Party shall provide a security plan, risk assessment, and security controls review document within three months of the start date of this Agreement (and update it annually thereafter) in order to support audit compliance with 45 CFR 95.621 subpart F, ADP System Security Requirements and Review Process.

Time is Money Join Law Insider Premium to draft better contracts faster.