Securing PHI Clause Samples

Securing PHI. Unless it is not feasible under the circumstances, Business Associate agrees to implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies in order to render PHI that Provider creates, receives, maintains or transmits on behalf of Plan, unusable, unreadable, or indecipherable to unauthorized individuals, thereby making the PHI secure. In addition, unless it is not feasible under the circumstances, Provider shall ensure that any agent, including, but not limited to, Subcontractors or vendors to whom it provides Plan’s PHI will implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies with respect to rendering Plan’s PHI unusable, unreadable or indecipherable to unauthorized individuals.
Securing PHI. FACT shall secure any and all electronic PHI covered by this Addendum in accordance with the guidance issued by the Secretary entitled “Guidance Specifying the Technologies and Methodologies that Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals,” as amended and updated from time to time. In addition, with respect to PHI covered by this Addendum, FACT shall comply with guidance issued by the Secretary under the authority of HITECH Section 13401(c). FACT shall use best efforts to avoid the creation or storage of paper PHI.
Securing PHI. To the extent applicable, Business Associate shall secure any and all EPHI covered by this Agreement in accordance with any requirements issued by the Secretary as amended and updated from time to time. In addition, with respect to PHI covered by this Agreement, Business Associate shall comply with any requirements issued by the Secretary under the authority of HITECH Section 13401(c). Business Associate shall use best efforts to avoid the creation or storage of paper PHI.
Securing PHI. Business Associate shall secure all PHI to the extent necessary to insure that it is not deemed Unsecured PHI. Business Associate will accomplish this by use of a technology standard that renders PHI unusable, unreadable, or indecipherable to unauthorized individuals and is accredited by the American National Standards Institute and is consistent with guidance issued by the Secretary of Health and Human Services specifying the technologies and methodologies that render PHI unusable unreadable or indecipherable to unauthorized individuals, including the use of standards developed under Section 13101 of the HITECH Act.
Securing PHI. Unless specifically agreed to by the Covered Entity, Business Associate agrees to implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act or other Law specifies in order to render PHI that Business Associate creates, receives, maintains or transmits on behalf of the Covered Entity, unusable, unreadable, or indecipherable to unauthorized individuals, thereby making the PHI secure. Business Associate shall ensure that any agent, including, but not limited to, subcontractors or vendors to whom it provides the Covered Entity’s PHI, will implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act or other Law specifies with respect to rendering the Covered Entity’s PHI unusable, unreadable or indecipherable to unauthorized individuals.