Security Rule Requirements Sample Clauses

Security Rule Requirements. 9.1 Business Associate agrees, to the extent any Protected Health Information created, received, maintained or transmitted by or in electronic media, also referred to as electronic protected health care information, as defined by 45 CFR § 160.103, that it will only create, maintain or transmit such information with appropriate safeguards in place. Business Associate shall therefore: implement administrative, physical, and technical safeguards that reasonably and appropriately protect the confidentiality, integrity and availability of the electronic protected health care information; ensure that any agent, including Subcontractors, to whom it provides such information shall agree to also implement reasonable and appropriate safeguards to protect the information; and report to the Covered Entity any Security Incident, as that term is defined by 45 CFR § 164.304, of which it becomes aware.
AutoNDA by SimpleDocs
Security Rule Requirements. Business Associate shall implement Administrative, Physical, and Technical Safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of Electronic PHI that it creates, receives, maintains, or transmits on behalf of the Covered Entity as required by the Security Rule. Additionally, Business Associate shall comply with the Security & Privacy Requirements described in the attached Security & Privacy Addendum. Not more than once per calendar year, Business Associate shall within ten (10) days after request from Covered Entity truthfully complete and duly execute the Annual Attestation that is attached hereto or, alternatively, notify Covered Entity in writing of any facts or events that would render untrue any statement within the Annual Attestation. Business Associate shall document policies and procedures that implement the foregoing requirements and shall, upon request, provide them to Covered Entity, who may further disclose them to any governmental entity with regulatory oversight over Covered Entity. Business Associate agrees to report to Covered Entity any use or disclosure of PHI not provided for by this Agreement or the HIPAA Authorities of which it becomes aware, including any Incident. Accordingly, as also provided in Section 3.4, Business Associate agrees to report any Incident of which it becomes aware to Covered Entity immediately, but not later than the same day of discovery of the Incident. All reports required of the Business Associate pursuant to this Section shall be provided as specified in Section 3.4 of this Agreement, including the actions and the mitigation steps, if any, taken by Business Associate in response to the Incident(s).
Security Rule Requirements. Practice Sense agrees to:
Security Rule Requirements. To the extent that Business Associate creates, receives, maintains, or transmits electronic PHI, Business Associate shall also implement administrative, physical and technical safeguards that reasonably and appropriately protect the confidentiality, integrity, and availability of any electronic Protected Information that may be transmitted in conformity with the requirements of the Security Rule.
Security Rule Requirements. BUSINESS ASSOCIATE shall implement administrative, physical and technical safeguards that reasonably and appropriately protect the confidentiality, integrity and availability of the ePHI that it creates, receives, maintains or transmits on behalf of COVERED ENTITY in accordance with the Security Rule; and (ii) make its policies and procedures, and documentation required by the Security Rule relating to such safeguards available to the Secretary for purposes of determining COVERED ENTITY’s compliance with the Security Rule. In addition, BUSINESS ASSOCIATE shall report to COVERED ENTITY within ten (10) business days any “security incident” of which it becomes aware, as such term is defined in the Security Rule. The report to COVERED ENTITY shall identify: the date of the security incident, the scope of the security incident and the BUSINESS ASSOCIATE’s response. BUSINESS ASSOCIATE will ensure that any agent or subcontractor to whom it provides ePHI that was created, received, maintained or transmitted on behalf of COVERED ENTITY agrees to implement reasonable and appropriate safeguards to protect the ePHI.

Related to Security Rule Requirements

  • Security Rule “Security Rule” shall mean the Standards for the Protection of Electronic Protected Health Information at 45 CFR Part 160 and Part 164, Subparts A and C.

  • DBE Requirements A. Notice is hereby given to the CONSULTANT and any SUB-CONSULTANT, and both agree, that failure to carry out the requirements set forth in 49 CFR Sec. 26.13(b) shall constitute a breach of this Contract and, after notification and failure to promptly cure such breach, may result in termination of this Contract or such remedy as INDOT deems appropriate. The referenced section requires the following assurance to be included in all subsequent contracts between the CONSULTANT and any SUB-CONSULTANT: The CONSULTANT, sub recipient or SUB-CONSULTANT shall not discriminate on the basis of race, color, national origin, or sex in the performance of this Contract. The CONSULTANT shall carry out applicable requirements of 49 CFR Part 26 in the award and administration of DOT-assisted contracts. Failure by the CONSULTANT to carry out these requirements is a material breach of this Contract, which may result in the termination of this Contract or such other remedy, as INDOT, as the recipient, deems appropriate.

  • Interface Requirements 9.3.1 BellSouth shall offer LIDB in accordance with the requirements of this subsection.

  • Schedule Requirements The Contractor shall submit an electronic and a paper copy of the initial Work Progress Schedule reflecting accurate and reliable representations of the planned progress of the Work, the Work to date if any, and of the Contractor’s actual plans for its completion. The Contractor shall organize and provide adequate detail so the Work Progress Schedule is capable of measuring and forecasting the effect of delaying events on completed and uncompleted activities.

  • Security Requirements 11.1 The Supplier shall comply, and shall procure the compliance of the Suppliers Personnel, with the Security Policy and the Security Plan and the Supplier shall ensure that the Security Plan produced by the Supplier fully complies with the Security Policy.

  • Space Requirements The Construction Administrator will conduct a review of the adequacy of space allotments for maintenance of mechanical, telephone, and fire protection equipment.

  • VEHICLE REQUIREMENTS The following shall be considered minimum Vehicle requirements. The Authorized User shall include supplemental required specifications for Vehicles specified in a Mini-Bid. Unless otherwise indicated, all items specified which are listed on the OEM Pricelist as standard or optional equipment shall be factory installed and operative. Vehicles delivered to an Authorized User in a condition considered to be below retail customer acceptance levels will not be accepted. Items which determine this acceptance level shall include, but not be limited to, the general appearance of the interior and exterior of the vehicle for completeness and quality of workmanship, lubrication and fluid levels, with any leaks corrected, mechanical operation of the vehicle and all electrical components operational. Product specified to be furnished and installed which is not available through the OEM shall conform to the standards known to that particular industry, both product and installation.

  • Age Requirements If you are a sole proprietor, and you are not old enough to enter into a contract on your own behalf (which is commonly but not always 18 years old), but you are 13 years old or older, your Representative must be your parent or legal guardian. If you are a legal entity that is owned, directly or indirectly, by an individual who is not old enough to enter into a contract on their own behalf, but the individual is 13 years old or older, your Representative must obtain the consent of either your board or an authorised officer. The approving board, authorised officer, parent or legal guardian is responsible to Stripe and is legally bound to this Agreement as if it had agreed to this Agreement itself. You must not use the Services if you are under 13 years of age.

  • CLEARANCE REQUIREMENTS CONTRACTOR shall comply with the requirements of California Education Code section 44237, 35021.1, 35021.2, and 56366.1 including, but not limited to: obtaining clearance from both the California Department of Justice (hereinafter referred to as “CDOJ”) and clearance from the Federal Bureau of Investigation (hereinafter referred to as "FBI") for CONTRACTOR’s employees and volunteers, unless CONTRACTOR determines that the volunteers will have no direct contact with students. CONTRACTOR hereby agrees that CONTRACTOR’s employees and volunteers, unless CONTRACTOR determines that the volunteers will have no direct contact with students shall not come in contact with students until CDOJ and FBI clearance are ascertained. CONTRACTOR shall certify in writing to LEA that none of its employees, and volunteers, unless CONTRACTOR determines that the volunteers will have no direct contact with students, or contractors who may come into contact with students have been convicted of a violent or serious felony as those terms are defined in California Education Code section 44237(h), unless despite the employee’s conviction of a violent or serious felony, he or she has met the criteria to be eligible for employment pursuant to California Education Code section 44237 (i) or (j). Contractor shall certify to LEA that they have successful background checks and enrolled in subsequent arrest notification service for all employees who may come into contact with students. Notwithstanding the restrictions on sharing and destroying criminal background check information, CONTRACTOR, upon demand, shall make available to the LEA evidence of a successful criminal background check clearance and enrollment in subsequent arrest notice service, as provided, for each owner, operator, and employee of the NPS/A. CONTRACTOR is required to retain the evidence on-site, as specified, for all staff, including those licensed or credentialed by another state agency. Background clearances and proof of subsequent arrest notification service as required by California Penal Code section 11105.2 for all staff shall be provided upon request.

  • Software Requirements 7 Developer shall prepare the Project Schedule using Oracle’s Primavera P6.

Time is Money Join Law Insider Premium to draft better contracts faster.