Reporting Unauthorized Disclosures and Breaches Sample Clauses

Reporting Unauthorized Disclosures and Breaches. During the term of this BAA, BA shall notify CE within 24 hours of discovering a Breach of security; intrusion; or unauthorized acquisition, access, use or disclosure of CE’s PHI in violation of any applicable federal or state law, including security incidents. BA shall identify for the CE the individuals whose unsecured PHI has been, or is reasonably believed to have been, Breached so that CE can comply with any notification requirements if necessary. BA shall also indicate whether the PHI subject to the Breach; intrusion; or unauthorized acquisition, access, use or disclosure was encrypted or destroyed at the time. BA shall take prompt corrective action to cure any deficiencies that result in Breaches of security; intrusion; or unauthorized acquisition, access, use, and disclosure. BA shall fulfill all breach notice requirements unless CE notifies BA that CE will take over the notice requirements. BA shall reimburse CE for all costs incurred by CE that are associated with any mitigation, investigation and notice of Breach CE undertakes or provides under HIPAA, HITECH Act, and the Privacy and Security Rule as a result of a Breach of CE’s PHI caused by BA or BA’s subcontractor or agent. If the unauthorized acquisition, access, use or disclosure of CE’s PHI involves only Secured PHI, BA shall notify CE within 10 days of discovering the Breach but is not required to notify CE of the names of the individuals affected.
AutoNDA by SimpleDocs
Reporting Unauthorized Disclosures and Breaches. During the term of this BAA, BA shall notify CE within 24 hours of any suspected or actual Breach of security; intrusion; or unauthorized acquisition, access, use or disclosure of PHI in violation of any applicable federal or state law. BA shall identify for the CE the individuals whose unsecured PHI has been, or is reasonably believed to have been, Breached so that CE can comply with any notification requirements. BA shall also indicate whether the PHI subject to the suspected or actual Breach; intrusion; or unauthorized acquisition, access, use or disclosure was encrypted or destroyed at the time. BA shall take prompt corrective action to cure any deficiencies that result in Breaches of security; intrusion; or unauthorized acquisition, access, use, and disclosure. BA shall reimburse CE for all costs associated with any notice of Breach CE is required to provide under HIPAA, HITECH Act, and the Privacy and Security Rule. For purposes of this paragraph, BA is not an agent of CE.
Reporting Unauthorized Disclosures and Breaches. During the term of this BAA, BA shall notify CE within 15 days of discovering a Breach of security; intrusion; or unauthorized acquisition, access, use or disclosure of CE’s PHI in violation of any applicable federal or state law. BA shall identify for the CE the individuals whose unsecured PHI has been, or is reasonably believed to have been, Breached so that CE can comply with any notification requirements. BA shall also indicate whether the PHI subject to the Breach; intrusion; or unauthorized acquisition, access, use or disclosure was encrypted or destroyed at the time. BA shall make every reasonable effort to correct any deficiencies it caused that result in Breaches of security; intrusion; or unauthorized acquisition, access, use, and disclosure. If the unauthorized acquisition, access, use or disclosure of CE’s PHI involves only Secured PHI, BA shall notify CE within 30 days of discovering the Breach but is not required to notify CE of the names of the individuals affected.
Reporting Unauthorized Disclosures and Breaches. During the term of this contract, the contractor shall notify the state within three business days of discovering: (i) any use or disclosure of PHI not provided for in this agreement, including any use or disclosure of the state’s PHI in violation of any applicable federal or state law; (ii) any security incident of which contractor becomes aware; and/or (iii) any Breach of Unsecured PHI of which it becomes aware. The contractor shall identify for the state the individuals whose unsecured PHI has been, or is reasonably believed to have been, breached so that the state can comply with any notification requirements if necessary. The contractor shall also indicate whether the PHI subject to the breach; intrusion; or unauthorized acquisition, access, use or disclosure was encrypted or destroyed at the time. The contractor shall take prompt corrective action to cure any deficiencies that result in breaches of security; intrusion; or unauthorized acquisition, access, use, and disclosure. For the purposes of reporting under this provision, a reportable security incident shall not include unsuccessful or inconsequential incidents that do not represent a material threat to the confidentiality, integrity or availability of PHI (such as scans, pings or unsuccessful attempts to penetrate computer networks). If the unauthorized acquisition, access, use or disclosure of the state’s PHI involves only secured PHI, the contractor shall notify the state within 10 days of discovering the breach but is not required to notify the state of the names of the individuals affected.

Related to Reporting Unauthorized Disclosures and Breaches

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Confidentiality and Disclosure of Offering Materials by Potential Investor Potential Investor acknowledges on behalf of itself and any and all Related Parties that the Offering Materials are considered confidential and proprietary information of Owner and/or HFF, and Potential Investor will not make (or cause or permit any Related Party to make) any Offering Materials available, or disclose any of the contents thereof, to any person without Owner’s or HFF’s prior written consent; provided, however, that the Offering Materials may be disclosed to the Potential Investor’s Representative (if any), the Potential Investor's partners, employees, legal counsel, advisors, institutional lenders and other capital sources (collectively the "Related Parties") as reasonably required for an evaluation of the Property. Such Related Parties shall be informed by Potential Investor of the confidential nature of the Offering Materials and the terms of this Agreement and shall be directed by Potential Investor to keep the Offering Materials and related information strictly confidential in accordance with this Agreement and to otherwise abide by the terms of this Agreement as if such party was the Potential Investor hereunder. In the event any Related Party shall take or omit to take any action which if taken or omitted to be taken by Potential Investor would constitute a breach of or a default under the terms hereof, the such act or omission by such Related Party shall be deemed to be a breach of the terms hereof by Potential Investor.

Time is Money Join Law Insider Premium to draft better contracts faster.