Information Governance Breach definition

Information Governance Breach an information governance serious incident requiring investigation, as defined in IG Guidance for Serious Incidents; "Initial Expiry Date" [insert date];
Information Governance Breach means an information governance serious incident requiring investigation, as defined in IG Guidance for Serious Incidents

Examples of Information Governance Breach in a sentence

  • The Provider must report and publish any Data Breach and any Information Governance Breach in accordance with IG Guidance for Serious Incidents.

  • This clause does not require the ICB to provide NHS England with information which identifies any individual affected by the Information Governance Breach where doing so would breach Data Protection Legislation.

  • The ICB must respond to any Information Governance Breach in accordance with IG Guidance for Serious Incidents.

  • If the ICB is required under Data Protection Legislation to notify the Information Commissioner’s Office or a Data Subject of an Information Governance Breach then as soon as reasonably practical and in any event on or before the first such notification is made the ICB must fully inform NHS England of the Information Governance Breach.

  • Where there are any Patient Safety Incidents or Information Governance Breaches relating to the Integrated Services, for example, the Providers shall ensure that they each comply with their individual Services Contract and work collectively and share all relevant information for the purposes of any investigations and/or remedial plans to be put in place, as well as for the purposes of learning lessons in order to avoid such Patient Safety Incident or Information Governance Breach in the future.

  • At the Quality and Safety Committee is was agreed that the learning points for both of these SIs will be amalgamated and presented in a variety of ways (lessons learned seminars, roundabout article, risk action groups).• The use of faxing to communicate sensitive data is being reviewed due to the Information Governance Breach SI and due to the recent fines imposed by the Information Commissioners Office on NHS Trusts who have failed to keep data in a safe and secure manner.

  • At the Quality and Safety Committee is was agreed that the learning points for both of these SIs will be amalgamated and presented in a variety of ways (lessons learned seminars, roundabout article, risk action groups). The use of faxing to communicate sensitive data is being reviewed due to the Information Governance Breach SI and due to the recent fines imposed by the Information Commissioners Office on NHS Trusts who have failed to keep data in a safe and secure manner.

  • The following areas of IGMAG work were highlighted: • NHS Wales Information Governance Breach Reporting: An IGMAG subgroup have developed guidance to establish a consistent process for identifying and reporting breaches of data protection legislation to the ICO.

  • The Provider must inform CHCP CIC immediately if any of the following events occur: A Breach of Duty of Candour; or A Serious Incident or Incident; or An Information Governance Breach or Data Protection Incident.

  • It is understood that the Escrow Agent and the beneficiary's bank in any funds transfer may rely solely upon any account numbers or similar identifying number provided by any party hereto to identify (i) the beneficiary, (ii) the beneficiary's bank or (iii) an intermediary bank.

Related to Information Governance Breach

  • Rating Agencies Information Website The internet website with respect to the Notes, initially located at xxx.xxxxxxxxxxxx.xxx, access to which is limited to the Rating Agencies and NRSROs who have been provided access.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Other Confidential Consumer Information The Contractor agrees to comply with the requirements of AHS Rule No. 08-048 concerning access to information. The Contractor agrees to comply with any applicable Vermont State Statute, including but not limited to 12 VSA §1612 and any applicable Board of Health confidentiality regulations. The Contractor shall ensure that all of its employees and subcontractors performing services under this agreement understand the sensitive nature of the information that they may have access to and sign an affirmation of understanding regarding the information’s confidential and non- public nature.

  • Electronic and Information Resources Accessibility Standards means the accessibility standards for electronic and information resources contained in 1 Texas Administrative Code Chapter 213.

  • Personal Information Breach means an instance where an unauthorized person or entity accesses Personal Information in any manner, including but not limited to the following occurrences: (1) any Personal Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2) one or more third parties have had access to or taken control or possession of any Personal Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Personal Information together with the confidential process or key that is capable of compromising the integrity of the Personal Information; or (4) if there is a substantial risk of identity theft or fraud to the client, the Contractor, the Department or State.

  • Business Confidential Information has the meaning set forth in Section 5.04(a).

  • State Confidential Information means any and all State Records not subject to disclosure under CORA. State Confidential Information shall include, but is not limited to, PII, PHI, PCI, Tax Information, CJI, and State personnel records not subject to disclosure under CORA. State Confidential Information shall not include information or data concerning individuals that is not deemed confidential but nevertheless belongs to the State, which has been communicated, furnished, or disclosed by the State to Contractor which (i) is subject to disclosure pursuant to CORA; (ii) is already known to Contractor without restrictions at the time of its disclosure to Contractor; (iii) is or subsequently becomes publicly available without breach of any obligation owed by Contractor to the State; (iv) is disclosed to Contractor, without confidentiality obligations, by a third party who has the right to disclose such information; or (v) was independently developed without reliance on any State Confidential Information.

  • Safeguard Policy Statement or “SPS” means ADB's Safeguard Policy Statement (2009);

  • Authority's Confidential Information means all Personal Data and any information, however it is conveyed, that relates to the business, affairs, developments, trade secrets, know-how, personnel, and suppliers of the Authority, including all IPRs, together with all information derived from any of the above, and any other information clearly designated as being confidential (whether or not it is marked "confidential") or which ought reasonably be considered to be confidential;

  • Information Resources means any and all computer printouts, online display devices, mass storage media, and all computer-related activities involving any device capable of receiving email, browsing Web sites, or otherwise capable of receiving, storing, managing, or transmitting Data including, but not limited to, mainframes, servers, Network Infrastructure, personal computers, notebook computers, hand-held computers, personal digital assistant (PDA), pagers, distributed processing systems, network attached and computer controlled medical and laboratory equipment (i.e. embedded technology), telecommunication resources, network environments, telephones, fax machines, printers and service bureaus. Additionally, it is the procedures, equipment, facilities, software, and Data that are designed, built, operated, and maintained to create, collect, record, process, store, retrieve, display, and transmit information.

  • Patient Information means information (however recorded) which—

  • Benchmarking Information means information generated by Portfolio Manager, as herein defined including descriptive information about the physical building and its operational characteristics.

  • Information Provider means the person or organisation providing the Information under this licence.

  • Rule 17g-5 Information Provider’s Website The website established and maintained by the Rule 17g-5 Information Provider pursuant to Section 12.06 and Section 12.13 of this Agreement, initially located at xxxxx://xx.xxxxxxxxxx.xxx, under the “NRSRO” tab for the related transaction.

  • Internal confidentiality agreement or statement means a confidentiality agreement or any other written statement that the contractor requires any of its employees or subcontractors to sign regarding nondisclosure of contractor information, except that it does not include confidentiality agreements arising out of civil litigation or confidentiality agreements that contractor employees or subcontractors sign at the behest of a Federal agency.

  • Information Privacy Principles means the information privacy principles set out in the Privacy and Data Protection Act 2014 (Vic).

  • Management Information or “MI” means the management information specified in Framework Schedule 8 (Management Information);

  • Fund Confidential Information means Confidential Information for which the Fund is the Disclosing Party.

  • Information Acts means the Data Protection Legislation, FOIA and the EIR, as amended from time to time; Intellectual Property Rights or IPRs means copyright, rights related to or affording protection similar to copyright, rights in databases, patents and rights in inventions semi-conductor topography rights, trade marks, rights in internet domain names and website addresses and other rights in trade names, designs, know-how, trade secrets and any modifications, amendments, updates and new releases of the same and all similar or equivalent rights or forms of protection which subsist or will subsist now or in the future in any part of the world;

  • Customer Confidential Information means Confidential Information of the Customer provided to Computershare.

  • Information Disclosure Requirements means the requirements to disclose information under:

  • Client Information means any data, information, software or other materials that you provide to Red Hat under the Agreement.

  • Market Information means an electronic document (also available in paper form upon request) located on the Trading Platform which sets out the commercial details for each Market, including but not limited to: Margin Factors, the minimum and maximum Quantity and Our Spread. In the event you elect to use a third party hosting or trading application (for example, MetaTrader), information specific to such third party hosting or trading application located on the Website shall supplement the Market Information; however, to the extent there are any inconsistencies the Market Information will prevail. Note that certain components of Market Information may not be available via a mobile application and must be accessed via desktop.

  • Customer Proprietary Network Information (“CPNI”) is as defined in the Act.

  • Disclosure shall have the meaning given to such term under the HIPAA regulations in 45 CFR § 160.103.

  • 17g-5 Information Provider’s Website The 17g-5 Information Provider’s Internet website, which shall initially be located within the Certificate Administrator’s Website (xxx.xxxxxxx.xxx), under the “NRSRO” tab on the page relating to this transaction.