Unsecured PHI. “Unsecured PHI” shall mean PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified by the Secretary in the guidance issued under section 13402(h)(2) of Public Law 111-5.
Unsecured PHI. “Unsecured PHI” shall have the same meaning as the term “unsecured protected health information” at 45 C.F.R. § 164.402.
Unsecured PHI. As used herein, the term “Unsecured PHI” shall have the meaning given to such term under the HITECH Act and any guidance issued pursuant to such Act including, but not limited to, 42 U.S.C. Section 17932(h) and 45 C.F.R. Section 164.402.
Unsecured PHI. “Unsecured PHI” is Electronic PHI that is not encrypted. “Unsecured PHI” is also any PHI that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified by the Secretary in the guidance issued under § 13402(h)(2) of the HITECH Act.
Unsecured PHI. “Unsecured PHI” is protected health information that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of a technology or methodology specified by the Secretary in relevant HHS guidance.
Unsecured PHI. ‘Unsecured PHI” shall mean PHI that is not secured through the use of a technology or methodology specified by the Secretary in guidance or as otherwise defined in Section 13402 of HITECH.
Unsecured PHI. Unsecured PHI as defined in HIPAA and the HIPAA regulations at 45 CFR § 164.402, means protected health information that is not rendered unusable, unreadable, or indecipherable to unauthorized individuals through the use of technology or methodology specified by the Secretary in guidance issued under 13402(h)(2) of Public Law 111-5 on HHS website.
Unsecured PHI. “Unsecured PHI” shall have the same meaning given to such term under 45 C.F.R. § 164.402, as may be amended from time to time.
Unsecured PHI. The following requirement shall apply to the extent that Business Associate accesses, maintains, retains, modifies, records, stores, destroys, or otherwise holds, uses, or discloses “unsecured PHI,” which is defined in the HITECH Act as not secured through the use of a technology or methodology that renders the information “unusable, unreadable, or indecipherable” to unauthorized individuals. In addition to the notification requirements with respect to EPHI set forth herein above, Business Associate shall notify Covered Entity, as soon as possible but not later than 10 days following the discovery of any unauthorized acquisition, access, use or disclosure of such unsecured PHI. Business Associate shall be considered to have discovered such activity as of the first day on which the unauthorized activity is known or, by exercising reasonable diligence, would have been known to the Business Associate. Such notice shall include identification of each individual whose unsecured PHI has been, or is reasonably believed by the Business Associate to have been accessed, acquired, or disclosed during such unauthorized activity. If Covered Entity determines the unauthorized activity by Business Associate qualifies as a Breach that triggers the HITECH breach notification requirements, or the notification requirements of §501.171, Florida Statutes, then Business Associate will reimburse Covered Entity for all costs related to notifying individuals of said Breach of unsecured PHI or EPHI maintained or otherwise held by Business Associate. Covered Entity, at its sole discretion, shall make the determination of whether or not the definition of “Breach” as set forth in the XXXXXX Xxx, 00 XXX §164.402, or in §501.171, Florida Statutes has been met.
Unsecured PHI. The following requirement shall apply to the extent that Business Associate accesses, maintains, retains, modifies, records, stores, destroys, or otherwise holds, uses, or which is defined in the HITECH Act as not secured through the use of a technology or methodology that renders the information or to unauthorized individuals. In addition to the notification requirements with respect to EPHI set forth herein above, Business Associate shall notify Covered Entity, as soon as possible but not later than 10 days following the discovery of any unauthorized acquisition, access, use or disclosure of such unsecured PHI. Business Associate shall be considered to have discovered such activity as of the first day on which the unauthorized activity is known or, by exercising reasonable diligence, would have been known to the Business Associate. Such notice shall include identification of each individual whose unsecured PHI has been, or is reasonably believed by the Business Associate to have been accessed, acquired, or disclosed during such unauthorized activity. If Covered Entity determines the unauthorized activity by Business Associate qualifies as a Breach that triggers the HITECH breach notification requirements, or the notification requirements of §501.171, Florida Statutes, then Business Associate will reimburse Covered Entity for all costs related to notifying individuals of said Breach of unsecured PHI or EPHI maintained or otherwise held by Business Associate. Covered Entity, at its sole discretion, shall make the determination of whether or not the definition of as set forth in the XXXXXX Xxx, 00 XXX §164.402, or in §501.171, Florida Statutes has been met.