Security Rule Compliance Sample Clauses

Security Rule Compliance. Business Associate shall establish, implement and maintain appropriate administrative, physical and technical safeguards in accordance with Subpart C of 45 C.F.R. Part 164 (the “Security Rule”) that reasonably and appropriately protect the confidentiality, integrity, and availability of any ePHI that it creates, receives, maintains, or transmits on behalf of Covered Entity and to prevent the use or disclosure of ePHI in any manner other than as permitted by this Agreement.
AutoNDA by SimpleDocs
Security Rule Compliance. Comply with the Security Rule to maintain the security of, and prevent any unauthorized use and/or disclosure of, electronic Protected Health Information. Business Associate shall maintain and implement a comprehensive information privacy and security program that complies with HITECH, HIPAA, and the regulations and guidance issued thereunder by the U.S. Department of Health and Human Services (“HHS”). Without limitation, this includes administrative, technical and physical safeguards that are appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities involving Protected Health Information. Business Associate shall comply with the HHS guidance to render unsecured PHI unusable, unreadable, or indecipherable to unauthorized individuals, with respect to ePHI in motion and at rest, and destruction of PHI. In addition, in the event that the Agreement contains specific requirements regarding information and data security, Business Associate will comply with all such provisions of the Agreement.
Security Rule Compliance. The Agency shall comply with the Security Rule‟s administrative, physical and technical safeguard requirements. As part of compliance with the Security Rule, the Agency shall develop and implement written security policies and procedures with respect to the electronic PHI they handle. By signing this Agreement, the Agency assures and acknowledges compliance with the requirements of HITECH including meeting the administrative, physical and technical safeguard requirements of the HIPAA Security Rule. (45 CFR Part 160, 162, 164.) The Agency also assures and acknowledges that the electronic PHI they transmit is encrypted and that it will adopt internal procedures for reporting breaches and mitigating potential damages.
Security Rule Compliance. Vendor shall comply with the Security Rule’s administrative, physical and technical safeguard requirements. As part of compliance with the Security Rule, Vendor shall develop and implement written security policies and procedures with respect to the electronic PHI they handle. By signing this Amendment, the Vendor assures and acknowledges compliance with the requirements of HITECH including meeting the administrative, physical and technical safeguard requirements of the HIPAA Security Rule. (45 C.F.R. Part 160, 162, 164.) Vendor also assures and acknowledges that the electronic PHI they transmit is encrypted and that it will adopt internal procedures for reporting breaches and mitigating potential damages.
Security Rule Compliance. Business Associate shall comply with applicable provisions of the Security Rule (45 CFR 164.306, 308, 310, 312, 316 and any amendments thereto) as required by the HITECH Act, including developing and implementing written information security policies and procedures and otherwise meeting the Security Rule documentation requirements. Business Associate acknowledges that it is subject to civil and criminal enforcement for failure to comply with the Privacy Rule and Security Rule.
Security Rule Compliance. Business associate shall comply with the Security Rule’s administrative, physical and technical safeguard requirements as set forth in 45 CFR Part 164 Sections 164.308, 164.310, 164.312, and 164.316.
Security Rule Compliance. Business Associate shall comply with the Security Rule requirements set forth in 45 C.F.R. §§164.308, 164.310, 164.312, 164.314, and 164.316, all of which are hereby incorporated into the Agreement. Business Associate shall also comply with all other provisions of the Security Rule not specifically stated in this Agreement. Business Associate represents and warrants that it has implemented, and during the term of this Agreement shall maintain, comprehensive written privacy and security policies and procedures and the necessary administrative, technical, and physical safeguards appropriate to the size and complexity of Business Associate’s operations and the nature and scope of its activities. As needed to continue the provision of reasonable and appropriate protection of PHI, Business Associate shall review and modify its security measures implemented pursuant to the Security Rule and any associated policies and procedures. Business Associate shall update documentation of such security measures in accordance with 45 C.F.R. §164.316.
AutoNDA by SimpleDocs

Related to Security Rule Compliance

  • Child Abuse Reporting Requirements A. Grantees shall comply with child abuse and neglect reporting requirements in Texas Family Code Chapter 261. This section is in addition to and does not supersede any other legal obligation of the Grantee to report child abuse.

  • Regulation M Compliance The Company has not, and to its knowledge no one acting on its behalf has, (i) taken, directly or indirectly, any action designed to cause or to result in the stabilization or manipulation of the price of any security of the Company to facilitate the sale or resale of any of the Securities, (ii) sold, bid for, purchased, or, paid any compensation for soliciting purchases of, any of the Securities, or (iii) paid or agreed to pay to any Person any compensation for soliciting another to purchase any other securities of the Company, other than, in the case of clauses (ii) and (iii), compensation paid to the Company’s placement agent in connection with the placement of the Securities.

  • Child Abuse Reporting Requirement Grantee will:

  • PCI Compliance A. The Acquiring Bank will provide The Merchant with appropriate training on PCI PED and/or DSS rules and regulations in respect of The Merchants obligations. Initial training will be provided and at appropriate intervals as and when relevant changes are made to such rules and regulations.

  • Additional Reporting Requirements Contractor agrees to submit written quarterly reports to H-GAC detailing all transactions during the previous three (3) month period. Reports must include, but are not limited, to the following information:

  • Rule 144 Compliance With a view to making available to the holders of Registrable Securities the benefits of Rule 144 under the Securities Act and any other rule or regulation of the Commission that may at any time permit a holder to sell securities of the Company to the public without registration or pursuant to a registration on Form S-3 (or any successor form), the Company shall:

  • Standards Compliance DNS. Registry Operator shall comply with relevant existing RFCs and those published in the future by the Internet Engineering Task Force (IETF), including all successor standards, modifications or additions thereto relating to the DNS and name server operations including without limitation RFCs 1034, 1035, 1123, 1982, 2181, 2182, 2671, 3226, 3596, 3597, 4343, and 5966. DNS labels may only include hyphens in the third and fourth position if they represent valid IDNs (as specified above) in their ASCII encoding (e.g., “xn--ndk061n”).

  • CERTIFICATION REGARDING DRUG-FREE WORKPLACE REQUIREMENTS The undersigned (authorized official signing for the contracting organization) certifies that the contractor will, or will continue to, provide a drug-free workplace in accordance with 45 CFR Part 76 by:

  • Regulation AB Compliance If at any time the Custodian is not also serving as Servicer under the Servicing Agreement, the Custodian shall:

  • CONTRACT COMPLIANCE REQUIREMENT The HUB requirement on this Contract is 0%. The student engagement requirement of this Contract is 0 hours. The Career Education requirement for this Contract is 0 hours. Failure to achieve these requirements may result in the application of some or all of the sanctions set forth in Administrative Policy 3.10, which is hereby incorporated by reference.

Time is Money Join Law Insider Premium to draft better contracts faster.