Reporting of Improper Disclosures of PHI Sample Clauses

Reporting of Improper Disclosures of PHI. If the Management Company discovers a (i) use or disclosure of PHI in violation of this Agreement by the Management Company or a third party to which the Management Company disclosed PHI, (ii) Successful Security Incident (as defined herein) or (iii) Breach of Unsecured PHI, then the Management Company will report the use or disclosure in accordance with HIPAA to the Professional Company without unreasonable delay and in any event within 60 calendar days after its discovery. “Successful Security Incident” means successful unauthorized access, use, disclosure, modification, or destruction of Electronic PHI or interference with system operations in an Information System in a manner that materially risks the Confidentiality, Integrity, or Availability of such PHI. Notice is hereby deemed provided, and no further notice will be provided, for unsuccessful attempts at such unauthorized access, use, disclosure, modification, or destruction, such as pings and other broadcast attacks on a firewall, denial of service attacks, port scans, unsuccessful login attempts, or interception of encrypted information where the key is not compromised, or any combination of the above. EXHIBIT TO MANAGEMENT SERVICES AGREEMENT
AutoNDA by SimpleDocs
Reporting of Improper Disclosures of PHI. If the Service Company discovers a (i) use or disclosure of PHI in violation of this Agreement by the Service Company or a third party to which the Service Company disclosed PHI, (ii) Successful Security Incident (as defined herein) or (iii) Breach of Unsecured PHI, then the Service Company will report the use or disclosure in accordance with HIPAA and applicable state privacy laws to the Professional Company without unreasonable delay and in any event within 10 calendar days after its discovery (or such earlier time frame as may be required under applicable state Law). “Successful Security Incident” means successful unauthorized access, use, disclosure, modification, or destruction of Electronic PHI or interference with system operations in an Information System in a manner that materially risks the Confidentiality, Integrity, or Availability of such PHI. Notice is hereby deemed provided, and no further notice will be provided, for unsuccessful attempts at such unauthorized access, use, disclosure, modification, or destruction, such as pings and other broadcast attacks on a firewall, denial of service attacks, port scans, unsuccessful login attempts, or interception of encrypted information where the key is not compromised, or any combination of the above.
Reporting of Improper Disclosures of PHI. (i) If the Management Company becomes aware of a use or disclosure of PHI in violation of this Agreement by the Management Company or a third party to which the Management Company disclosed PHI, then the Management Company will report the use or disclosure to the Company without unreasonable delay.
Reporting of Improper Disclosures of PHI. Business Associate shall, within ten (10) business days of Discovery, report to Covered Entity any confirmed use or disclosure of PHI not provided for by this BAA of which it becomes aware, including any Breach of Unsecured PHI as required by 45 C.F.R. 164.410, and any confirmed Security Incident. The parties agree that this Section 1.6 satisfies any notices necessary by Business Associate to Covered Entity of the ongoing existence and occurrence of Unsuccessful Security Incidents for which no additional notice to Covered Entity shall be required. For purposes of this BAA, such Unsuccessful Security Incidents include activity such as pings and other broadcast attacks on Business Associate’s firewall, port scans, unsuccessful log-on attempts, denial of service and any combination of the above, so long as no such Unsuccessful Security Incident results in unauthorized access, use, disclosure, modification or destruction of PHI or interference with information system operations.
Reporting of Improper Disclosures of PHI. Business Associate acknowledges that it is required by law to comply with the HIPAA security rule (45 C.F.R. 164.302 through 164.318) and the use and disclosure provisions of the HIPAA privacy rule (45 C.F.R. 162.502, 162.504). Business Associate shall immediately, but in no event later than five (5) days after becoming aware of any use or disclosure of PHI in violation of this Agreement – or in violation of the HIPAA Rules – whether by Business Associate, its officers, directors, employees, contractors or agents, (or by a third party to which Business Associate disclosed PHI) report any such disclosure or privacy or security breach to Covered Entity. Business Associate agrees to (a) fully cooperate with Covered Entity in the investigation of any such improper disclosure or privacy or security breach; and (b) fully mitigate any harmful effect resulting from any such improper disclosure or privacy or security breach. Business Associate shall provide written notice to Covered Entity, in the timeframe referenced above, of each of the following: (i) the date of the breach; (ii) the date of the discovery of the breach; (iii) a description of the types of unsecured PHI that were involved; (iv) identification of each individual whose unsecured PHI has been, or is reasonably believed to have been, accessed, acquired, or disclosed; and (v) any other details necessary to complete an assessment of the risk of harm to any individual(s). Covered Entity will be responsible to provide notification to individuals whose unsecured PHI has been disclosed, as well as any required disclosure to the Secretary. Business Associate agrees to establish procedures to investigate the breach, mitigate losses and protect against any future breaches, and to provide a description of these procedures and the specific findings of the investigation to Covered Entity.

Related to Reporting of Improper Disclosures of PHI

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • ADV Disclosure The Adviser has provided the Trust with a copy of its Form ADV as most recently filed with the Commission and will, promptly after filing any amendment to its Form ADV with the Commission, furnish a copy of such amendments to the Trust. The information contained in the Adviser’s Form ADV is accurate and complete in all material respects and does not omit to state any material fact necessary in order to make the statements made, in light of the circumstances under which they were made, not misleading.

  • DISCLOSURE; ACCESS TO INFORMATION The Investor had an opportunity to review copies of the SEC Documents filed on behalf of the Company and has had access to all publicly available information with respect to the Company.

  • Confidential Business Information CARB may have based this penalty in part on confidential business information provided by Xxxxx or confidential settlement communications.

  • Board and Filings Information The Adviser will also provide the Trust with any information reasonably requested regarding its management of the Funds required for any meeting of the Board, or for any shareholder report, amended registration statement, proxy statement, or prospectus supplement to be filed by the Trust with the Commission. The Adviser will make its officers and employees available to meet with the Board from time to time on due notice to review its investment management services to the Funds in light of current and prospective economic and market conditions and shall furnish to the Board such information as may reasonably be necessary in order for the Board to evaluate this Agreement or any proposed amendments thereto.

  • Confidentiality; Access to Information (a) The parties acknowledge that Company and Parent have previously executed a mutual nondisclosure agreement, dated as of March 5, 2000 (the "CONFIDENTIALITY AGREEMENT"), which Confidentiality Agreement will continue in full force and effect in accordance with its terms; provided, that nothing in this Agreement or the Confidentiality Agreement will restrict communications with parties to the Related Agreements.

  • Company Creation and Use of Confidential Information The Executive understands and acknowledges that the Company has invested, and continues to invest, substantial time, money and specialized knowledge into developing its resources, creating a customer base, generating customer and potential customer lists, training its employees, and improving its product offerings in the field of financial services. The Executive understands and acknowledges that as a result of these efforts, the Company has created, and continues to use and create Confidential Information. This Confidential Information provides the Company with a competitive advantage over others in the marketplace.

  • Inventions and Proprietary Information Prohibition on Third Party Information A. Proprietary Information Agreement. Executive acknowledges that he has signed and remains bound by the terms of the Company’s Proprietary Information and Inventions Agreement, which is attached as Exhibit B (“Proprietary Information Agreement”).

  • Non-Disclosure of Proprietary Information Employee recognizes and acknowledges that the Trade Secrets (as defined below) and Confidential Information (as defined below) of the Company and its affiliates and all physical embodiments thereof (as they may exist from time-to-time, collectively, the “Proprietary Information”) are valuable, special and unique assets of the Company's and its affiliates' businesses. Employee further acknowledges that access to such Proprietary Information is essential to the performance of Employee's duties under this Agreement. Therefore, in order to obtain access to such Proprietary Information, Employee agrees that, except with respect to those duties assigned to him by the Company, Employee will hold in confidence all Proprietary Information and will not reproduce, use, distribute, disclose, publish or otherwise disseminate any Proprietary Information, in whole or in part, and will take no action causing, or fail to take any action necessary to prevent causing, any Proprietary Information to lose its character as Proprietary Information, nor will Employee make use of any such information for Employee's own purposes or for the benefit of any person, firm, corporation, association or other entity (except the Company) under any circumstances.

Time is Money Join Law Insider Premium to draft better contracts faster.