Inappropriate Access Sample Clauses

Inappropriate Access. It is never acceptable for you to look at confidential or patient information “just out of curiosity,” even if no harm is intended. • It does not matter whether the information pertains to a celebrity, political figure, or other “high profile” person, fellow workforce member, a close friend, family member, or yourself. You must protect and keep private ALL patient information, no matter whose it is. Just because you have access to a system or network or patient records, does not mean you have the right or authorization to access or view confidential or patient information that does not pertain to your job. All patient information is confidential and must be protected at all times. Unauthorized Access • Unauthorized access to networks or systems containing PHI or other confidential information includes: o Access without authorization. o Using someone else’s password and/or user ID. o Letting someone else log you into the network using their password. o Giving someone your password to log into the network. o Using your password to log someone else into the network. o Accessing information without a job-related “need-to-know.” • You are responsible and will be held accountable for all access to networks or systems using your password. • Be wise and only access systems and data as authorized. Scene: A workforce member is talking to her coworker.
AutoNDA by SimpleDocs
Inappropriate Access. I will not access or obtain my own, a friend’s, or a family member’s information maintained by Presence Health without appropriate written authorization and consistent with Presence Health Policies.

Related to Inappropriate Access

  • Inappropriate Conduct You shall not use the Service or the Device in any way that is threatening, abusive, harassing, defamatory, libelous, deceptive, fraudulent, invasive of another's privacy, or any similar behavior. We reserve the right to immediately terminate your Service if, in our sole and absolute discretion, we determine that you have used the Service or the Device in any of the aforementioned ways. In the event of such termination, you will be responsible for the full month's charges to the end of the current term, including, without limitation, unbilled charges, plus a termination fee, if applicable, all of which will become immediately due and payable upon termination of your Service. If we believe that you have used the Service or the Device in any of the aforementioned ways, we may forward the relevant communication and other information, including your identity, to the appropriate authorities for investigation and prosecution. You hereby consent to our forwarding of any such communications and information to these authorities. In addition, VoIP Systems USA will provide information in response to law enforcement requests, subpoenas, court orders, to protect it's rights and property and in the case where failure to disclose the information may lead to imminent harm to the customer or others.

  • Appropriate Safeguards BA shall implement appropriate safeguards to prevent the use or disclosure of Protected Information other than as permitted by the Contract or Addendum, including, but not limited to, administrative, physical and technical safeguards in accordance with the Security Rule, including, but not limited to, 45 C.F.R. Sections 164.308, 164.310, and 164.312. [45 C.F.R. Section 164.504(e)(2)(ii)(B); 45 C.F.R. Section 164.308(b)]. BA shall comply with the policies and procedures and documentation requirements of the Security rule, including, but not limited to, 45 C.F.R. Section 164.316 [42 U.S.C. Section 17931].

  • Geological and Archeological Specimens If, during the execution of the Work, the Contractor, any Subcontractor, or any servant, employee, or agent of either should uncover any valuable material or materials, such as, but not limited to, treasure trove, geological specimens, archival material, archeological specimens, or ore, the Contractor acknowledges that title to the foregoing is vested in the Owner. The Contractor shall notify the Owner upon the discovery of any of the foregoing, shall take reasonable steps to safeguard it, and seek further instruction from the Design Professional. Any additional cost incurred by the Contractor shall be addressed under the provision for changed conditions. The Contractor agrees that the Geological and Water Resources Division and the Historic Preservation Division of the Georgia Department of Natural Resources may inspect the Work at reasonable times.

  • Target Population The Grantee shall ensure that diversion programs and services provided under this grant are designed to serve juvenile offenders who are at risk of commitment to Department.

  • Misuse of Internet-based Services You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Appropriate Technical and Organizational Measures SAP has implemented and will apply the technical and organizational measures set forth in Appendix 2. Customer has reviewed such measures and agrees that as to the Cloud Service selected by Customer in the Order Form the measures are appropriate taking into account the state of the art, the costs of implementation, nature, scope, context and purposes of the processing of Personal Data.

  • Employee Access Employees are entitled to read and review their personnel file and, without limiting the generality of the foregoing, shall be entitled to inspect their performance evaluations, written censures, letters of reprimand, and other adverse reports. Upon request, employees shall be given copies of all such pertinent documents. The Employer further agrees that no personal files or documents on employees shall be kept outside of the personnel file, apart from payroll or health services files.

  • Grant Activity material The Grantee gives (or procures for) the Commonwealth a non-exclusive, irrevocable, royalty-free licence to use, reproduce, communicate, publish and adapt all material that is provided to the Commonwealth under this Agreement. This includes a right to sub-license that material.

Time is Money Join Law Insider Premium to draft better contracts faster.