Examples of Electronic Protected Information in a sentence
Reporting for any Security Incident involving the attempted unauthorized access, use, disclosure, modification or destruction of Electronic Protected Information (collectively, an “Attempted Security Incident”) shall be provided pursuant to the standard reporting protocols of DBI (as determined by DBI).
DBI shall make available to the Secretary DBI’s internal practices, books and records (including its policies and procedures) relating to the safeguards established by DBI with respect to Electronic Protected Information for the purpose of enabling the Secretary to assess DBI and/or the Plan’s compliance with the Security Rule.
In addition, Business Associate shall ensure that any such agent or Subcontractor agrees to implement reasonable and appropriate safeguards to protect Covered Entity’s Protected Health Information and/or Electronic Protected Information in accordance with 45 CFR §164.308(b)(2).
Protected Information shall have the meaning given to such term under the Privacy Rule (45 C.F.R. §164.501).Protected Information includes Electronic Protected Information (C.F.R. §160.103 and §164.501).1.13.
Each Party will comply with all applicable federal or state law or regulation, and will use appropriate administrative, technical, and physical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of Electronic Protected Information that either Party creates, receives, maintains, or transmits under this Agreement.11.3. No Transfer of Protected Information Outside United States.
The safeguards must reasonably protect Protected Information from any intentional or unintentional use or disclosure, and shall be no less protective than the safeguards a Party has in place or develops to protect its own Protected Information.11.2. Security of Electronic Protected Information.
Company shall make available to the Secretary Company’s internal practices, books and records (including its policies and procedures) relating to the safeguards established by Company with respect to Electronic Protected Information for the purpose of enabling the Secretary to assess Company and/or Savvis’ compliance with the Security Rule.
A total of 290 DDR genes were analyzed based on the recommendation of the TCGA Pan-Cancer analysis of DDR deficiency in cancer.
Reporting for any Security Incident involving the attempted unauthorized access, use, disclosure, modification or destruction of Electronic Protected Information (collectively, an “Attempted Security Incident”) shall be provided no more than five (5) business days after any Security Incident.
With respect to Electronic Protected Information and the requirements set forth in this Article VII, DBI shall directly comply with (a) Section 13401(a) of the HITECH Act, including with respect to the administrative, physical and technical safeguards described in 45 CFR §§ 164.308, 164.310, 164.312 and 164.316 of the Security Rule and (b) Section 13401(c) of the HITECH Act (relating to annual technical safeguard guidance to be issued by the Secretary).