HIPAA Security Rule Sample Clauses

HIPAA Security Rule. Business Associate agrees to use appropriate administrative, physical and technical safeguards, and comply with the Security Rule and HIPAA Security Regulations with respect to Electronic PHI, to prevent the use or Disclosure of the PHI other than as provided for by this Exhibit.
AutoNDA by SimpleDocs
HIPAA Security Rule. With regard to its use and/or disclosure of PHI, Business Associate shall, at its own expense:
HIPAA Security Rule. Business Associate will develop, implement, maintain and use appropriate safeguards, and comply with the Security Rule at Subpart C of 45 C.F.R. Part 164, with respect to EPHI, to prevent use or disclosure of the PHI other than as provided for by this Agreement.
HIPAA Security Rule. (a) Business Associate shall comply with the provisions of the Security Rule set forth in 45 C.F.R. Sections 164.308, 164.310, 164.312, and 164.316 in the same manner that such provisions apply to Covered Entity.
HIPAA Security Rule. With regard to its use and/or disclosure of EPHI, Business Associate shall (as of the compliance date of April 20, 2005), at its own expense:
HIPAA Security Rule. At least sixty (60) days prior to the compliance date for the HIPAA Security and Electronic Signature Standards ("Security Rule") (63 Fed. Reg. 43,242 (August 12, 1998)), the Parties shall review this Agreement, and, as necessary, modify this Agreement to incorporate any relevant provisions, including, provisions governing chain of trust partner agreements.
HIPAA Security Rule. The HIPAA Security Rule (45 CFR Part 160 and Subparts A and C of Part 164), as may be amended from time to time.
AutoNDA by SimpleDocs
HIPAA Security Rule. (a) Security of Electronic Protected Health Information. Business Associate will develop, implement, maintain, and use administrative, technical, and physical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of Electronic Protected Health Information (as defined in 45 C.F.R. Section 160.103) that Business Associate creates, receives, maintains, or transmits on behalf of the Covered Entity consistent with the Security Rule.
HIPAA Security Rule 

Related to HIPAA Security Rule

  • Security Rule “Security Rule” shall mean the Standards for the Protection of Electronic Protected Health Information at 45 CFR Part 160 and Part 164, Subparts A and C.

  • Privacy Rule “Privacy Rule” shall mean the Standards for Privacy of Individually Identifiable Health Information at 45 Code of Federal Regulations Part 160 and Part 164, Subparts A and E.

  • Security Rule Obligations The following provisions of this section apply to the extent that Business Associate creates, receives, maintains or transmits Electronic PHI on behalf of Covered Entity.

  • Health Insurance Portability and Accountability Act of 1996 (a) If the Contactor is a Business Associate under the requirements of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), as noted in this Contract, the Contractor must comply with all terms and conditions of this Section of the Contract. If the Contractor is not a Business Associate under HIPAA, this Section of the Contract does not apply to the Contractor for this Contract.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • Health Insurance Portability and Accountability Act Grantee certifies that it is in compliance with the Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law Xx. 000-000, 00 XXX Parts 160, 162 and 164, and the Social Security Act, 42 USC 1320d-2 through 1320d-7, in that it may not use or disclose protected health information other than as permitted or required by law and agrees to use appropriate safeguards to prevent use or disclosure of the protected health information. Grantee shall maintain, for a minimum of six (6) years, all protected health information.

  • OMNIBUS PROCUREMENT ACT OF 1992 It is the policy of New York State to maximize opportunities for the participation of New York State business enterprises, including minority and women-owned business enterprises as bidders, subcontractors and suppliers on its procurement contracts. Information on the availability of New York State subcontractors and suppliers is available from: NYS Department of Economic Development Division for Xxxxx Xxxxxxxx Xxxxxx, Xxx Xxxx 00000 Telephone: 000-000-0000 Fax: 000-000-0000 email: xxx@xxx.xx.xxx A directory of certified minority and women-owned business enterprises is available from: NYS Department of Economic Development Division of Minority and Women's Business Development 000 Xxxxx Xxxxxx Xxx Xxxx, XX 00000 212-803-2414 email: xxxxxxxxxxxxxxxxx@xxx.xx.xxx xxxxx://xx.xxxxxxxxxxxxxx.xxx/FrontEnd/VendorSearchPu blic.asp The Omnibus Procurement Act of 1992 requires that by signing this bid proposal or contract, as applicable, Contractors certify that whenever the total bid amount is greater than $1 million:

  • Health, Safety and Security 22.2.1 The University and the Association agree to promote safe, secure and healthy working conditions and procedures, and to encourage Members to adopt and follow sound health, safety and security procedures in the performance of their work.

  • Data Protection and Privacy: Protected Health Information Party shall maintain the privacy and security of all individually identifiable health information acquired by or provided to it as a part of the performance of this Agreement. Party shall follow federal and state law relating to privacy and security of individually identifiable health information as applicable, including the Health Insurance Portability and Accountability Act (HIPAA) and its federal regulations.

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

Time is Money Join Law Insider Premium to draft better contracts faster.