Security Safeguards and Policies Sample Clauses

Security Safeguards and Policies. Business Associate shall implement Administrative, Physical, and Technical Safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the Electronic PHI that it creates, receives, maintains, or transmits on behalf of the Covered Entity as required by the Security Rule. This includes specifically, but is not limited to, the utilization of technology commercially available at the time to the Business Associate to protect the Covered Entity’s PHI against any reasonably anticipated threats or hazards. The Business Associate understands that it has an affirmative duty to perform a regular review or assessment of security risks, conduct active risk management and supply best efforts to assure that only authorized persons and devices access its computing systems and information storage, and that only authorized transactions are allowed. The Business Associate will maintain appropriate documentation of its compliance with the Security Rule.
AutoNDA by SimpleDocs
Security Safeguards and Policies. BA agrees to implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the EPHI that it creates, receives, maintains, or transmits on behalf of FHKC as required by the Security Rule. The BA will maintain appropriate documentation of its compliance with the Security Rule. These safeguards include: • Annual training to relevant employees, contractors, and subcontractors on preventing improper Access, acquisition, Use, or Disclosure of PHI, updated as appropriate; • Adopting policies and procedures regarding the safeguarding of PHI, updated and enforced as necessary; and • Implementing appropriate technical and physical safeguards to protect PHI, including access controls, transmission security, workstation security, etc.
Security Safeguards and Policies. Business Associate shall implement Administrative, Physical, and Technical Safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the Electronic PHI that it creates, receives, maintains, or transmits on behalf of the Covered Entity as required by the Security Rule. This includes specifically, but is not limited to, the utilization of
Security Safeguards and Policies. Business Associate shall implement Administrative, Physical, and Technical Safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the Electronic PHI that it creates, receives, maintains, or transmits on behalf of the Covered Entity as required by the Security Rule. This includes specifically, but is not limited to, the utilization of technology commercially available at the time to the Business Associate Business Associate understands that it has an affirmative duty to perform a regular review or assessment of security risks, conduct active risk management and supply best efforts to assure that only authorized persons and devices access its computing systems and information storage, and that only authorized transactions are allowed. The Business Associate will maintain appropriate documentation of its compliance with the Security Rule.
Security Safeguards and Policies. Business Associate shall implement Administrative, Physical, and Technical Safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the Electronic PHI that it creates, receives, maintains, or transmits on behalf of the Covered Entity as required by the Security Rule. This includes specifically, but is not limited to, the utilization of technology commercially available at the time to the Business Associate to pr any reasonably anticipated threats or hazards. The Business Associate understands that it has an affirmative duty to perform a regular review or assessment of security risks, conduct active risk management and supply best efforts to assure that only authorized persons and devices access its computing systems and information storage, and that only authorized transactions are allowed. The Business Associate will maintain appropriate documentation of its compliance with the Security Rule.
Security Safeguards and Policies. [EQRO] agrees to implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the EPHI that it creates, receives, maintains, or transmits on behalf of FHKC as required by the Security Rule. The [EQRO] will maintain appropriate documentation of its compliance with the Security Rule. These safeguards include: Annual training to relevant employees, contractors, and subcontractors on preventing improper Access, acquisition, Use, or Disclosure of PHI, updated as appropriate; Adopting policies and procedures regarding the safeguarding of PHI, updated and enforced as necessary; and Implementing appropriate technical and physical safeguards to protect PHI, including access controls, transmission security, workstation security, etc.
Security Safeguards and Policies. [VENDOR] agrees to implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the EPHI that it creates, receives, maintains, or transmits on behalf of FHKC as required by the Security Rule. The [VENDOR] will maintain appropriate documentation of its compliance with the Security Rule. These safeguards include: Annual training to relevant employees, contractors, and subcontractors on preventing improper Access, acquisition, Use, or Disclosure of PHI, updated as appropriate; Adopting policies and procedures regarding the safeguarding of PHI, updated and enforced as necessary; and Implementing appropriate technical and physical safeguards to protect PHI, including access controls, transmission security, workstation security, etc.
AutoNDA by SimpleDocs
Security Safeguards and Policies. Business Associates shall implement and maintain information security policies that comply with the HIPAA Security Rule. Business Associate shall implement Administrative, Physical, and Technical Safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of the Electronic PHI that it creates, receives, maintains, or transmits on behalf of Covered Entity as required by the Security Rule. This includes specifically, but is not limited to, the utilization of technology commercially available to Business Associate to protect Covered Entity’s PHI against any reasonably anticipated threats or hazards. Business Associate understands that it has an affirmative duty to perform a regular review or assessment of security risks, conduct active risk management, and supply best efforts to assure that only authorized persons, entities, programs, or applications, and devices access its computing systems and information storage, and that only authorized transactions are allowed. Business Associate will maintain appropriate documentation of its compliance with the Security Rule.

Related to Security Safeguards and Policies

  • Compliance with Laws and Policies 5.1 Each Party shall, at its own expense, comply with the Applicable Laws and Regulations relating to its activities under this Agreement, as they may change from time to time, and with any conditions binding on it in any applicable licences, registrations, permits and approvals.

  • Safeguards Business Associate, its Agent(s) and Subcontractor(s) shall implement and use appropriate safeguards to prevent the use or disclosure of PHI other than as provided for by this Agreement. With respect to any PHI that is maintained in or transmitted by electronic media, Business Associate or its Subcontractor(s) shall comply with 45 CFR sections 164.308 (administrative safeguards), 164.310 (physical safeguards), 164.312 (technical safeguards) and 164.316 (policies and procedures and documentation requirements). Business Associate or its Agent(s) and Subcontractor(s) shall identify in writing upon request from Covered Entity all of the safeguards that it uses to prevent impermissible uses or disclosures of PHI.

  • COMPLIANCE WITH POLICIES AND PROCEDURES During the period that Executive is employed with the Company hereunder, Executive shall adhere to the policies and standards of professionalism set forth in the policies and procedures of the Company and IAC as they may exist from time to time.

  • Compliance With Insurance Requirements Borrower will comply with all Insurance requirements and will not permit any condition to exist on the Mortgaged Property that would invalidate any part of any Insurance coverage required under this Loan Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!