Securing PHI. Unless it is not feasible under the circumstances, Business Associate agrees to implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies in order to render PHI that Provider creates, receives, maintains or transmits on behalf of Plan, unusable, unreadable, or indecipherable to unauthorized individuals, thereby making the PHI secure. In addition, unless it is not feasible under the circumstances, Provider shall ensure that any agent, including, but not limited to, Subcontractors or vendors to whom it provides Plan’s PHI will implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies with respect to rendering Plan’s PHI unusable, unreadable or indecipherable to unauthorized individuals.
Appears in 4 contracts
Sources: Data Protection Agreement, Data Protection Agreement, Data Protection Agreement
Securing PHI. Unless it is not feasible under the circumstances, Business Associate agrees to implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies in order to render PHI that Provider Supplier creates, receives, maintains or transmits on behalf of Plan, unusable, unreadable, or indecipherable to unauthorized individuals, thereby making the PHI secure. In addition, unless it is not feasible under the circumstances, Provider Supplier shall ensure that any agent, including, but not limited to, Subcontractors or vendors to whom it provides Plan’s PHI will implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies with respect to rendering Plan’s PHI unusable, unreadable or indecipherable to unauthorized individuals.
Appears in 1 contract
Sources: Data Processing Agreement