Specially Protected Information Sample Clauses

Specially Protected Information. We apply the standards of the Privacy Rule in permitting access to the System. You acknowledge that other federal and state laws impose additional restrictions on the use and disclosure of certain types of health information, or health information pertaining to certain classes of individuals. You agree that you are solely responsible for ensuring that Your Health Information may properly be disclosed for the purposes set forth in section 4.1, subject only to the restrictions of the Privacy Rule. In particular, you will:
AutoNDA by SimpleDocs
Specially Protected Information. We apply the standards of the Privacy Rule in permitting access to the WellWink Programs and Services. You acknowledge that other federal and state laws, rules and regulations impose additional restrictions on the use and disclosure of certain types of health information, or health information pertaining to certain classes of individuals. You agree that you are solely responsible for ensuring that Your Health Information may properly be disclosed for the purposes set forth in section 17(a) & (b), subject only to the restrictions of the Privacy Rule. In particular, you will: not make available through the Programs and Services any information subject to any restriction on use or disclosure (whether arising from your agreement with the individual or under law), other than the general restrictions contained in the Privacy Rule; obtain any necessary consents, authorizations or releases from individuals required for making their health information available through the Programs and Services for the purpose set forth in section 17(a) & (b); include such statements (if any) in your notice of privacy practices as may be required in connection with your use of the Programs and Services; not place in the Programs any information that the you know or have reason to believe is false or materially inaccurate.
Specially Protected Information. Straumann applies the standards of the Privacy Rule and Personal Information Protection and Electronic Documents Act (PIPEDA) in permitting access to the Services. User acknowledges that other federal, state, and local laws and regulations impose additional restrictions on the use and disclosure of certain types of health information, or health information pertaining to certain classes of individuals. User agrees that it is solely responsible for ensuring that User Health Information may properly be disclosed for the Permitted Use, subject to the restrictions of the Privacy Rule and Personal Information Protection and Electronic Documents Act (PIPEDA) and applicable laws and regulations, including those that may be more restrictive than the Privacy Rule and Personal Information Protection and Electronic Documents Act (PIPEDA). In particular, User will: not make available to other users through the Services any information in violation of any restriction on use or disclosure (whether arising from User’s agreement with such users or under law); obtain all necessary consents, authorizations or releases from individuals required for making their health information available through the Services for the Permitted Use; include such statements (if any) in User notice of privacy practices as may be required in connection with User’s use of the Services; and not place in the Services any information that User knows or have reason to believe is false or materially inaccurate.

Related to Specially Protected Information

  • Protected Information 5.3.1 In this Section "

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Excluded Information For purposes of this Agreement, the term “confidential and proprietary information” shall not include (i) information already known or independently developed by the recipient without the use of any confidential and proprietary information, or (ii) information known to the public through no wrongful act of the recipient.

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Requested Information with reasonable promptness, such other data and information relating to the business, operations, affairs, financial condition, assets or properties of the Company or any of its Subsidiaries or relating to the ability of the Company to perform its obligations hereunder and under the Notes as from time to time may be reasonably requested by any such holder of Notes.

  • Permitted Uses and Disclosures of Protected Health Information Business Associate:

  • Business Information All Business Information shall be owned jointly by the Members as their Ownership Interests are determined pursuant to this Agreement. Both before and after the termination of the Company, all Business Information may be used by either Member for any purpose, whether or not competitive with the Business, without consulting with, or obligation to, the other Member. Except as provided in Sections 13.3 and 13.4, or with the prior written consent of the other Member, each Member shall keep confidential and not disclose to any third party or the public any portion of the Business Information that constitutes Confidential Information.

  • Confidential Business Information CARB may have based this penalty in part on confidential business information provided by Xxxxx or confidential settlement communications.

  • Information Disclosure We will disclose information to third parties about your account or the transactions you make: (1) when it is necessary for completing transactions, or (2) in order to verify the existence and condition of your account for a third party, such as a credit bureau or merchant, or (3) in order to comply with government agency or court orders, or (4) if you give us your written permission.

  • De-identified Information De-identified Information may be used by the Operator only for the purposes of development, product improvement, to demonstrate or market product effectiveness, or research as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Operator agrees not to attempt to re-identify De-identified Information and not to transfer De-identified Information to any party unless (a) that party agrees in writing not to attempt re- identification, and (b) prior written notice has been given to LEA who has provided prior written consent for such transfer. Operator shall not copy, reproduce or transmit any De-identified Information or other Data obtained under the Service Agreement except as necessary to fulfill the Service Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.