Examples of HIPAA Breach in a sentence
During the term of the Agreement, Business Associate shall notify Covered Entity in writing within twenty-four (24) hours of any suspected or actual breach of security, intrusion, HIPAA Breach, and/or any actual or suspected use or Disclosure of data in violation of any applicable federal or state laws or regulations.
Business Associate shall investigate such breach of security, intrusion, and/or HIPAA Breach, and provide a written report of the investigation to Covered Entity’s HIPAA Privacy Officer or other designee that is in compliance with 45 C.F.R. section 164.410 and that includes the identification of each individual whose PHI has been breached.
Business Associate will be considered to have had knowledge of a HIPAA Breach if the HIPAA Breach is known, or by exercising reasonable diligence would have been known, to any person (other than the person committing the HIPAA Breach) who is an employee, officer or other agent of the Business Associate.
For purposes of reporting a HIPAA Breach to Covered Entity, the discovery of a HIPAA Breach shall occur as of the first day on which such HIPAA Breach is known to the Business Associate or, by exercising reasonable diligence, would have been known to the Business Associate.
For purposes of this paragraph, a HIPAA Breach shall be treated as discovered as of the first day on which the HIPAA Breach is known or should reasonably have been known to Business Associate (including any person, other than the one committing the HIPAA Breach, which is an employee, officer, or other agent of Business Associate).
Following a HIPAA Breach, Business Associate will have a continuing duty to inform Covered Entity of new information learned by Business Associate regarding the HIPAA Breach, including but not limited to the information described in items (i) through (v), above.
This Part V is designed to satisfy the DoD Privacy Act Issuances and the HIPAA Breach Rule as implemented by the DoD HIPAA Issuances.
Contractor understands that it is subject to the HIPAA Breach Rule.
If the HIPAA Breach of Unsecured PHI involves less than five hundred (500) individuals, Business Associate will maintain a log or other documentation of the HIPAA Breach of Unsecured PHI which contains such information as would be required to be included if the log were maintained by Covered Entity pursuant to 45 CFR § 164.408, and provide such log to Covered Entity within five (5) business days of Covered Entity’s written request.
The parties acknowledge and agree that 45 C.F.R. § 164.404, as described below in this Section 8.1, governs the determination of the date of discovery of a HIPAA Breach.