Reporting and Mitigating Unauthorized Uses and Disclosures of PHI Sample Clauses

Reporting and Mitigating Unauthorized Uses and Disclosures of PHI. Immediately upon notice to the Business Associate, the Business Associate shall report to the Department any uses or disclosures of PHI not authorized by this Agreement. The Business Associate shall also notify the affected individual of the breach. If the breach affects more than 500 individuals, the Business Associate must contact the U.S. Health and Human Services Secretary and the media, under the American Recovery and Reinvestment Act of 2009. The Business Associate shall use its best efforts to mitigate the deleterious effects of any use or disclosure of PHI not authorized by this Agreement. Further, in the notice provided to the Department by the Business Associate regarding unauthorized uses and/or disclosures of PHI, the Business Associate shall describe the remedial or other actions undertaken or proposed to be undertaken regarding the unauthorized use or disclosure of PHI.
AutoNDA by SimpleDocs
Reporting and Mitigating Unauthorized Uses and Disclosures of PHI. Promptly following its notice of the same, Contractor shall report to BHL any uses, disclosures or risks of disclosure of PHI not authorized by this Agreement of which it becomes aware and, with respect to ePHI, any security incident, including any attempted or successful unauthorized access, use, disclosure, modification, or destruction of ePHI or interference with information system operations all as required by applicable Privacy Laws and applicable state identity theft laws (e.g., Cal. Civ. Code §1798.82). Contractor agrees to mitigate, to the extent practicable, the deleterious effects of any use or disclosure of PHI not authorized by this Agreement.
Reporting and Mitigating Unauthorized Uses and Disclosures of PHI. Immediately upon notice to MAG, MAG shall report to Physician Practice any uses or disclosures of PHI not authorized by this Agreement. MAG shall use its best efforts to mitigate the deleterious effects of any use or disclosure of PHI not authorized by this Agreement. Further, in the notice provided to Physician Practice by MAG regarding unauthorized uses and/or disclosures of PHI, MAG shall describe the remedial or other actions undertaken or proposed to be undertaken regarding the unauthorized use or disclosure of PHI.
Reporting and Mitigating Unauthorized Uses and Disclosures of PHI. Immediately upon notice to Contractor, Contractor shall report to Company any uses or disclosures of PHI not authorized by this Agreement. Contractor shall use its best efforts to mitigate the deleterious effects of any use or disclosure of PHI not authorized by this Agreement. Further, in the notice provided to Company by Contractor regarding unauthorized uses and/or disclosures of PHI, Contractor shall describe the remedial or other actions undertaken or proposed to be undertaken regarding the unauthorized use or disclosure of PHI.
Reporting and Mitigating Unauthorized Uses and Disclosures of PHI. Immediately upon notice to Contractor, Contractor shall report to Company any uses or disclosures of PHI not authorized by this Agreement. Contractor shall use its best efforts to mitigate the deleterious effects of any use or disclosure of PHI not authorized by this Agreement. Further, in the notice provided to Company by Contractor regarding unauthorized uses and/or disclosures of PHI, Contractor shall describe the remedial or other actions undertaken or proposed to be undertaken regarding the unauthorized use or disclosure of PHI. In the event there is a breach of PHI, these guidelines/regulations from CMS must be initiated and the Company must be notified immediately by the Business Associate but no later than 30 days after the first date the breach is discovered: Written notification shall be provided in concise, conspicuous, plain language that includes the following elements: · A brief description of what happened, including the date(s) of the breach and of its discovery; · To the extent possible, a description of the types of personal information involved in the breach (e.g., full name, social security number, date of birth, home address, account number, disability code, etc.); · A statement whether the information was encrypted or protected by other means, when determined such information would be beneficial and would not compromise system security; · What steps individuals should take to protect themselves from potential harm, if any; · What Contractor is doing, if anything, to investigate the breach, to mitigate losses, and to protect against any further breaches; and · Who affected individuals should contact for more information, including a toll-free telephone number, e-mail address, and postal address.  The Privacy Officer will contact the business associate and determine whether a contractual provision has been violated.  If a contract provision has been violated, the Privacy Officer will identify steps to be taken by the business associate that will enable it to comply with its contractual obligations.  The Privacy Officer will review the corrective action steps with the business associate and determine whether those steps or other measures suggested by the business associate will correct the violation. If an agreement can be reached, the corrective measures will be summarized in writing and sent to the business associate.  The Privacy Officer will monitor the implementation of the corrective action measures by periodically contacting t...
Reporting and Mitigating Unauthorized Uses and Disclosures of PHI. Immediately upon notice to MAG, MAG shall report to Physician Practice any uses or disclosures of PHI not authorized by this Agreement of which it becomes aware, including breaches of unsecured protected health information as required at 45 C.F.R. 164.410, and any security incident of which it becomes aware. MAG shall use its best efforts to mitigate the deleterious effects of any use or disclosure of PHI not authorized by this Agreement. Further, in the notice provided to Physician Practice by MAG regarding unauthorized uses and/or disclosures of PHI, MAG shall describe the remedial or other actions undertaken or proposed to be undertaken regarding the unauthorized use or disclosure of PHI.

Related to Reporting and Mitigating Unauthorized Uses and Disclosures of PHI

  • Permitted Use and Disclosures Each Party hereto may use or disclose Confidential Information disclosed to it by the other Party to the extent such information is included in the Pharmacopeia Technology, Schering Technology or Collaboration Technology, as the case may be, and to the extent (i) such use or disclosure is reasonably necessary and permitted in the exercise of the rights granted hereunder in filing or prosecuting patent applications, prosecuting or defending litigation, (ii) such disclosure is reasonably required to be made to any institutional review board of any entity conducting clinical trials with Agreement Compound(s) and/or Agreement Product(s), or to any governmental or other regulatory agency, in order to gain approval to conduct clinical trials or to market Agreement Compound(s) and/or Agreement Products, (iii) such disclosure is required by law, regulation, rule, act or order of any governmental authority, court, or agency, or is made in connection with submitting required information to tax or other governmental authorities, or (iv) such disclosure or use is reasonably required in conducting clinical trials, or making a permitted sublicense or otherwise exercising license rights expressly granted to it by the other Party pursuant to the terms of this Agreement; in each case, provided that if a Party is required to make any such disclosure of another Party’s Confidential Information, other than pursuant to a confidentiality agreement, it will give reasonable advance notice to the other Party of such disclosure and, save to the extent inappropriate in the case of patent applications, will use its reasonable diligent efforts to secure confidential treatment of such Confidential Information in consultation with the other Party prior to its disclosure (whether through protective orders or otherwise) and disclose only the minimum necessary to comply with such requirements.

  • Reporting and Disclosure The Company, from time to time, shall provide government agencies with such reports concerning this Agreement as may be required by law, and the Company shall provide the Executive with such disclosure concerning this Agreement as may be required by law or as the Company may deem appropriate.

  • Publicity and Disclosures No press releases or public disclosure, either written or oral, of the transactions contemplated by this Agreement, shall be made by a party to this Agreement without the prior knowledge and written consent of Buyer and the Company.

  • Use and Disclosure All Confidential Information of a party will be held in confidence by the other party with at least the same degree of care as such party protects its own confidential or proprietary information of like kind and import, but not less than a reasonable degree of care. Neither party will disclose in any manner Confidential Information of the other party in any form to any person or entity without the other party’s prior consent. However, each party may disclose relevant aspects of the other party’s Confidential Information to its officers, affiliates, agents, subcontractors and employees to the extent reasonably necessary to perform its duties and obligations under this Agreement and such disclosure is not prohibited by applicable law. Without limiting the foregoing, each party will implement physical and other security measures and controls designed to protect (a) the security and confidentiality of Confidential Information; (b) against any threats or hazards to the security and integrity of Confidential Information; and (c) against any unauthorized access to or use of Confidential Information. To the extent that a party delegates any duties and responsibilities under this Agreement to an agent or other subcontractor, the party ensures that such agent and subcontractor are contractually bound to confidentiality terms consistent with the terms of this Section 11.

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • Authorized Disclosures Notwithstanding the obligations set forth in Sections 10.1 and 10.5, a Party may disclose the other Party’s Confidential Information and the terms of this Agreement to the extent:

  • Use and Disclosure of Confidential Information Notwithstanding anything to the contrary contained in this Agreement, and in addition to and not in lieu of other provisions in this Agreement:

  • Publicity and Disclosure A. The Financial Agent shall not make use of any Treasury name, symbol, emblem, program name, or product name, in any advertising, signage, promotional material, press release, Web page, publication, or media interview, without the prior written consent of the Treasury.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Preservation and Disclosure of Lists The Trustee shall preserve, in as current a form as is reasonably practicable, all information as to the names and addresses of the Holders contained in the most recent list furnished to it as provided in Section 5.01 or maintained by the Trustee in its capacity as Note Registrar, if so acting. The Trustee may destroy any list furnished to it as provided in Section 5.01 upon receipt of a new list so furnished.

Time is Money Join Law Insider Premium to draft better contracts faster.