Reporting of Unauthorized Use Sample Clauses

Reporting of Unauthorized Use. Seller shall:
AutoNDA by SimpleDocs
Reporting of Unauthorized Use. Business Associate shall: Report to MetroHealth’s designated privacy official, any unauthorized use or disclosure of PHI within 5 business days of becoming aware of the same, including breaches of unsecured PHI as required by the Regulations, and any Security Incidents; Indemnify and hold MetroHealth harmless from all liabilities, costs, penalties, and damages arising out of or in any manner connected with the unauthorized use or disclosure by Business Associate of any PHI; and, Permit MetroHealth to examine Business Associate's premises, records and practices, to the extent reasonably necessary to investigate any such report.
Reporting of Unauthorized Use. Business Associate shall promptly report to Covered Entity in writing within fifteen (15) days of discovery of any unauthorized acquisition, access, use or disclosure of PHI in violation of this Agreement or any law, or any Security Incident (“the Breach”). Such written notice to Covered Entity shall include the identity of each individual whose PHI was, or was reasonably believed to have been, breached; a brief description of what happened, including the date of the Breach and date of discovery of the Breach; a description of the PHI that was involved in the Breach; any steps the individual(s) should take to protect themselves from potential harm from the Breach; a description of what Business Associate is doing to investigate the breach, mitigate harm to the individual(s) and protect against further Breaches; and contact procedures for individual(s) to ask questions or get additional information. Business Associate shall implement and maintain sanctions against any employee, subcontractor, or agent who violates the requirements of this Agreement or the HIPAA regulations. Business Associate shall, as requested by Covered Entity, take steps to mitigate, to the extent practicable, any harmful effect that is known to Business Associate of a use or disclosure of PHI by Business Associate in violation of the requirements of this Agreement.
Reporting of Unauthorized Use. Business Associate will promptly report to University any breach of security or use or disclosure of the PHI not provided for in this Agreement upon becoming aware of it; and will indemnify and hold University harmless from all liabilities, costs and damages arising out of or in any manner connected with the security breach or use or disclosure by Business Associate of any PHI. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate of a security breach or use or disclosure of PHI by Business Associate in violation of the requirements of this Agreement.
Reporting of Unauthorized Use. Consultant shall promptly notify Company in writing of any facts which may come to Consultant’s attention indicating or suggesting that any unauthorized person may have become aware of or obtained or may be using any portion of Confidential Information or is or may be soliciting or attempting to acquire any portions of Confidential Information without authorization from Company to do so.
Reporting of Unauthorized Use. Business Associate will promptly report to the Director of Privacy and Risk Management of MHS any unauthorized use or disclosure immediately upon becoming aware of it; and will indemnify and hold MHS harmless from all liabilities, costs and damages arising out of or in any manner connected with the disclosure by Business Associate of any PHI. Business Associate shall permit MHS to investigate any such report and to examine Business Associate's premises, records and practices.

Related to Reporting of Unauthorized Use

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Security; Reliance; Unauthorized Use The Fund will cause all persons utilizing the Software and System to treat all applicable user and authorization codes, passwords and authentication keys with extreme care, and it will establish internal control and safekeeping procedures to restrict the availability of the same to persons duly authorized to give Instructions. Custodian is hereby irrevocably authorized to act in accordance with and rely on Instructions received by it through the System. The Fund acknowledges that it is its sole responsibility to assure that only persons duly authorized use the System and that Custodian shall not be responsible nor liable for any unauthorized use thereof.

  • Privacy of Customer Information Company Customer Information in the possession of the Agent, other than information independently obtained by the Agent and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of the Companies. Except in accordance with this Section 10.10, the Agent shall not use any Company Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, Customers, or disclose any Company Customer Information to any Person, including any of the Agent’s employees, agents or contractors or any third party not affiliated with the Agent. The Agent may use or disclose Company Customer Information only to the extent necessary (i) for examination and audit of the Agent’s activities, books and records by the Agent’s regulatory authorities, (ii) to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges or (iii) to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors), and for no other purpose; provided that the Agent may also use and disclose the Company Customer Information as expressly permitted by the relevant Company in writing, to the extent that such express permission is in accordance with the Privacy Requirements. The Agent shall take commercially reasonable steps to ensure that each Person to which the Agent intends to disclose Company Customer Information, before any such disclosure of information, agrees to keep confidential any such Company Customer Information and to use or disclose such Company Customer Information only to the extent necessary to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges, or to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations, under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors). The Agent agrees to maintain an Information Security Program and to assess, manage and control risks relating to the security and confidentiality of Company Customer Information pursuant to such program in the same manner as the Agent does so in respect of their own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 208, 211, 225, 263, 308, 364, 568 and 570. Without limiting the scope of the foregoing sentence, the Agent shall use at least the same physical and other security measures to protect all Company Customer Information in the Agent’s possession or control as the Agent uses for their own customers’ confidential and proprietary information.

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

Time is Money Join Law Insider Premium to draft better contracts faster.