STORAGE, TRANSMISSION AND DESTRUCTION OF PROTECTED HEALTH INFORMATION Sample Clauses

STORAGE, TRANSMISSION AND DESTRUCTION OF PROTECTED HEALTH INFORMATION. All Protected Health Information will be rendered unusable, unreadable, or indecipherable to unauthorized individuals in accordance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), as amended and supplemented by the Health Information Technology for Economic and Public Health Act (HITECH). Without limiting the generality of the foregoing, Contractor will encrypt all workstations and portable devices (e.g., mobiles, wearables, tablets, thumb drives, external hard drives) that store County’s Confidential Information (including Protected Health Information) in accordance with Federal Information Processing Standard (FIPS) 140-2. Contractor will encrypt County’s Confidential Information transmitted on networks outside of Contractor’s control with Secure Socket Layer (SSL or TLS), at a minimum, cipher strength of 256 bit. If County’s Confidential Information is no longer required to be retained by Contractor under the Contract and applicable law, Contractor must destroy such information by: (a) shredding or otherwise destroying paper, film, or other hard copy media so that the information cannot be read or otherwise cannot be reconstructed; and
AutoNDA by SimpleDocs
STORAGE, TRANSMISSION AND DESTRUCTION OF PROTECTED HEALTH INFORMATION. All Protected Health Information shall be rendered unusable, unreadable, or indecipherable to unauthorized individuals in accordance with HIPAA, as amended and supplemented by the HITECH Act. Without limiting the generality of the foregoing, Contractor will encrypt all electronic Protected Health Information (stored and during transmission) in accordance with HIPAA and the HITECH Act, as implemented by the U.S. Department of Health and Human Services. If Protected Health Information is no longer required to be retained by Contractor under the Agreement and applicable law, Contractor shall destroy such PHI by

Related to STORAGE, TRANSMISSION AND DESTRUCTION OF PROTECTED HEALTH INFORMATION

  • Amendment of Protected Health Information 8.1 To the extent Covered Entity determines that any Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within ten (10) business days after receipt of a written request from Covered Entity, make any amendments to such Protected Health Information that are requested by Covered Entity, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.526.

  • Access to Protected Health Information 7.1 To the extent Covered Entity determines that Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within two (2) business days after receipt of a request from Covered Entity, make the Protected Health Information specified by Covered Entity available to the Individual(s) identified by Covered Entity as being entitled to access and shall provide such Individuals(s) or other person(s) designated by Covered Entity with a copy the specified Protected Health Information, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.524.

  • Permitted Uses and Disclosures of Protected Health Information Business Associate:

  • Electronic Protected Health Information “Electronic Protected Health Information” means individually identifiable health information that is transmitted by or maintained in electronic media.

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • Unsecured Protected Health Information “Unsecured Protected Health Information” shall have the same meaning as the term “unsecured protected health information” in 45 CFR § 164.402.

  • Use and Disclosure of Protected Health Information The Business Associate must not use or further disclose protected health information other than as permitted or required by the Contract or as required by law. The Business Associate must not use or further disclose protected health information in a manner that would violate the requirements of HIPAA Regulations.

  • Protected Health Information “Protected Health Information” shall have the same meaning as the term “protected health information” in Section 160.103 and is limited to the information created or received by Contractor from or on behalf of County.

  • Confidentiality of Health Information (a) A Nurse shall not be required to provide her or his manager/supervisor specific information regarding the nature of her or his illness or injury during a period of absence. However, the Employer may require the Nurse to provide such information to persons responsible for occupational health.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

Time is Money Join Law Insider Premium to draft better contracts faster.