Common use of Securing PHI Clause in Contracts

Securing PHI. Unless it is not feasible under the circumstances, Business Associate agrees to implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies in order to render PHI that Provider creates, receives, maintains or transmits on behalf of Plan, unusable, unreadable, or indecipherable to unauthorized individuals, thereby making the PHI secure. In addition, unless it is not feasible under the circumstances, Provider shall ensure that any agent, including, but not limited to, Subcontractors or vendors to whom it provides Plan’s PHI will implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies with respect to rendering Plan’s PHI unusable, unreadable or indecipherable to unauthorized individuals.

Appears in 4 contracts

Sources: Data Protection Agreement, Data Protection Agreement, Data Protection Agreement

Securing PHI. Unless it is not feasible under the circumstances, Business Associate agrees to implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies in order to render PHI that Provider Supplier creates, receives, maintains or transmits on behalf of Plan, unusable, unreadable, or indecipherable to unauthorized individuals, thereby making the PHI secure. In addition, unless it is not feasible under the circumstances, Provider Supplier shall ensure that any agent, including, but not limited to, Subcontractors or vendors to whom it provides Plan’s PHI will implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies with respect to rendering Plan’s PHI unusable, unreadable or indecipherable to unauthorized individuals.

Appears in 1 contract

Sources: Data Processing Agreement