Written Notification of Unauthorized Access, Use or Disclosure of Unsecured PHI Sample Clauses

Written Notification of Unauthorized Access, Use or Disclosure of Unsecured PHI. Business Associate shall notify Covered Entity in writing of any unauthorized access, use or disclosure of unsecured PHI as soon as reasonably possible but no later than five (5) days following the date of discovery. Such notice shall include:
AutoNDA by SimpleDocs

Related to Written Notification of Unauthorized Access, Use or Disclosure of Unsecured PHI

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Employment of Unauthorized Aliens The employment of unauthorized aliens by the Grantee is considered a violation of Section 274A (a) of the Immigration and Nationality Act. If the Grantee knowingly employs unauthorized aliens, such violation shall be cause for unilateral cancellation of this Agreement.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy It is NIH’s intent to promote the dissemination of research findings from use of controlled-access dataset(s) subject to the NIH GDS Policy as widely as possible through scientific publication or other appropriate public dissemination mechanisms. Approved Users are strongly encouraged to publish their results in peer-reviewed journals and to present research findings at scientific meetings.

  • EMPLOYMENT OF UNAUTHORIZED ALIENS PROHIBITED In accordance with §2.2-4311.1 of the Code of Virginia, as amended, the Contractor must not during the performance of this Contract knowingly employ an unauthorized alien, as that term is defined in the federal Immigration Reform and Control Act of 1986.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

Time is Money Join Law Insider Premium to draft better contracts faster.