Authorized Access to Phi Sample Clauses

Authorized Access to Phi. To the extent that Business Associate maintains PHI in a Designated Record Set and at the request of Covered Entity, Business Associate agrees to provide access to PHI in a Designated Record Set to Covered Entity or, as directed by Covered Entity, to an individual in order to meet the requirements under 45 C.F.R. § 164.524. If Business Associate maintains an Electronic Health Record, Business Associate shall provide such information in electronic format to enable Covered Entity to fulfill its obligations under the HITECH Act, including, but not limited to, 42 U.S.C. § 17935(e).
AutoNDA by SimpleDocs
Authorized Access to Phi. At the request of Covered Entity and within ten (10) calendar days of such request, Business Associate shall make available to Covered Entity (or to the Individual at the direction of Covered Entity) for inspection and copying, any PHI about an Individual which Business Associate created or received for or from Covered Entity and that is in the custody or control of Business Associate as required by 45 C.F.R. § 164.524. To enable Covered Entity to fulfill its obligations that pertain to an Individual’s request for an electronic copy of his or her PHI that is used or maintained in an Electronic Health Record, to the extent Business Associate uses or maintains PHI in an Electronic Health Record, Business Associate shall provide Covered Entity with a copy of such information in electronic format, at Covered Entity’s expense, within five (5) calendar days of a request by Covered Entity.
Authorized Access to Phi 

Related to Authorized Access to Phi

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Authorized User You may request us to issue a Card to an individual who has no financial responsibility under this Agreement. An Authorized User has the same access to your Account as you do, subject to any limitations we may impose. An Authorized User has no authority to add or delete Cardholders, request a replacement Card or terminate or modify this Agreement. You may terminate an Authorized User’s authority to access your Account at any time. To do this, you must return the Card to PenFed. You agree that you are responsible for all charges and cash advances made by an Authorized User, including charges made before the Card is returned, recurring charges, or charges made without the use of the Card initiated by the Authorized User after termination of the Authorized User’s access.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • Authorized Sub-processors Customer agrees that MailChimp may engage Sub- processors to process Customer Data on Customer's behalf. The Sub-processors currently engaged by MailChimp and authorized by Customer are listed in Annex A.

  • Authorized Activities In carrying out the purposes of the Partnership, but subject to all other provisions of this Agreement, the Partnership is authorized to engage in any kind of lawful activity, and perform and carry out contracts of any kind, necessary or advisable in connection with the accomplishment of the purposes and business of the Partnership described herein and for the protection and benefit of the Partnership; provided that the General Partner shall not be obligated to cause the Partnership to take, or refraining from taking, any action which, in the judgment of the General Partner, (i) could adversely affect the ability of the General Partner to qualify and continue to qualify as a REIT, (ii) could subject the General Partner to additional taxes under Code Section 857 or 4981 or (iii) could violate any law or regulation of any governmental body or agency having jurisdiction over the General Partner or its securities.

  • Authorized Users Authorized Users" are:

  • Limited Access If necessary for the fulfillment of the Agreement, NBU may provide the Professional with non-exclusive, limited access to NBU’s information technology infrastructure. The Professional understands and agrees to abide by NBU policies, standards, regulations and restrictions regarding access and usage of NBU’s information technology infrastructure. The Professional shall reasonably enforce such policies, standards, regulations and restrictions with all the Professional’s employees, agents or any tier of subcontractor granted access in the performance of this Agreement, and shall be granted and authorize only such access as may be necessary for the purpose of fulfilling the requirements of the Agreement. The Professional’s employees, agents and subcontractors must receive prior, written approval from NBU before being granted access to NBU’s information technology infrastructure and data and NBU, in its sole determination, shall determine accessibility and limitations thereto. The Professional agrees that the requirements of this Section shall be incorporated into all subcontractor agreements entered into by the Professional. It is further agreed that a violation of this Section shall be deemed to cause irreparable harm that justifies injunctive relief in court. A violation of this Section may result in immediate termination of this Agreement without notice.

Time is Money Join Law Insider Premium to draft better contracts faster.