Data Breach Notification and Obligations Sample Clauses

Data Breach Notification and Obligations. 11.1. The Breach or potential compromise of Data shared under this Contract must be reported to the HCA Privacy Officer at XxxxxxxXxxxxxx@xxx.xx.xxx within one (1) business day of discovery.
AutoNDA by SimpleDocs
Data Breach Notification and Obligations. ‌ The Breach of Data shared under this Agreement must be reported to the HCA Privacy Officer at XxxxxxxXxxxxxx@xxx.xx.xxx within five (5) business days of discovery. The Receiving Party must also take all reasonable actions to mitigate the risk of loss and comply with any notification or other requirements imposed by applicable law or reasonably requested by HCA in order to meet its regulatory obligations.
Data Breach Notification and Obligations. 11.1. The Breach or potential compromise of Data shared under this DSA must be reported to the HCA Privacy Officer at XxxxxxxXxxxxxx@xxx.xx.xxx within one (1) business day of discovery.
Data Breach Notification and Obligations. The Breach or potential compromise of Data shared under this Contract must be reported to the HCA Privacy Officer at XxxxxxxXxxxxxx@xxx.xx.xxx within one (1) business day of discovery. If the Breach or potential compromise of Data includes PHI, and the Contractor does not have full details, it will report what information it has within one (1) business day of discovery and provide full details within fifteen (15) business days of discovery. To the extent possible, these reports must include the following: The identification of each individual whose PHI has been or may have been improperly accessed, acquired, used, or disclosed; The nature of the unauthorized Use or disclosure, including a brief description of what happened, the date of the event(s), and the date of discovery; A description of the types of PHI involved; The investigative and remedial actions the Contractor or its Subcontractor took or will take to prevent and mitigate harmful effects and protect against recurrence; Any details necessary for a determination of the potential harm to Clients whose PHI is believed to have been Used or disclosed and the steps those Clients should take to protect themselves; and Any other information HCA reasonably requests. The Contractor must also take actions to mitigate the risk of loss and comply with any notification or other requirements imposed by law or HCA including but not limited to 45 C.F.R. Part 164 Subpart D; RCW 42.56.590; RCW 19.255.010; or WAC 000-00-000. If notification must, in the sole judgement of HCA, must be made Contractor will further cooperate and facilitate notification to necessary individuals, to the U.S. Department of Health and Human Services (DHHS) Secretary, and to the media. At HCA’s discretion, Contractor may be required to directly perform notification requirements, or if HCA elects to perform the notifications, Contractor must reimburse HCA for all costs associated with notification(s). Contractor is responsible for all costs incurred in connection with a security incident privacy Breach, or potential compromise of Data, including: Computer forensics assistance to assess the impact of a Data Breach, determine root cause, and help determine whether and the extent to which notification must be provided to comply with Breach notification laws; Notification and call center services for individuals affected by a security incident or privacy Breach, including fraud prevention, credit monitoring, and identify theft assistance; and R...
Data Breach Notification and Obligations 

Related to Data Breach Notification and Obligations

  • Data Breach Notification Seller will promptly notify Buyer of any actual or potential exposure or misappropriation of Buyer data ("breach") that comes to Seller's attention. Seller will cooperate with Xxxxx and in investigating any such breach, at Xxxxxx's expense. Seller will likewise cooperate with Buyer and, as applicable, with law enforcement agencies in any effort to notify injured or potentially injured parties, and such cooperation will be at Seller's expense, except to the extent that the breach was caused by Xxxxx. The remedies and obligations set forth in this subsection are in addition to any others Buyer may have, including, but not limited to, any requirements in the “Privacy, Confidentiality, and Security” provisions of this Agreement.

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Termination and Breach 13.1 The termination of this Agreement or any part thereof however caused and the serving of notice to terminate shall be without prejudice to any obligations or rights of any of the parties which have accrued prior to such termination and shall not affect any provision of this Agreement which is expressly or by implication provided to come into effect on or to continue in effect after such termination

  • Security Breach Notifications Notice must be given by the Subrecipient to anyone whose PSCI could have been breached in accordance with HIPAA, the Information Practices Act of 1977, and State policy.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Breach Notification a. In the event of a Breach of unsecured PHI or disclosure that compromises the privacy or security of PHI obtained from DSHS or involving DSHS clients, Business Associate will take all measures required by state or federal law.

  • Termination on Breach of Obligations of Confidentiality The Authority may terminate this Framework Agreement by serving notice on the Supplier in writing with effect from the date specified in such notice where the Supplier fails to comply with Clauses 19.1 to 19.5 (Confidentiality).

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

  • TERMINATION BY MPS - BREACH BY CONTRACTOR If Contractor fails to fulfill its obligations under this Contract in a timely or proper manner, or violates any of its provisions, MPS shall thereupon have the right to terminate it by giving five (5) days written notice before the effective date of termination of the Contract, specifying the alleged violations, and effective date of termination. The Contract shall not be terminated if, upon receipt of the notice, Contractor promptly cures the alleged violation with five (5) days. In the event of termination, MPS will only be liable for services rendered through the date of termination and not for the uncompleted portion, or for any materials or services purchased or paid for by Contractor for use in completing the Contract.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

Time is Money Join Law Insider Premium to draft better contracts faster.