Mitigation of Unauthorized Access, Use or Disclosure of Unsecured PHI Sample Clauses

Mitigation of Unauthorized Access, Use or Disclosure of Unsecured PHI. Business Associate agrees that, to the extent practicable, it shall mitigate any harmful effect resulting from any unauthorized acquisition, use or disclosure of unsecured PHI caused by Business Associate’s violation of the requirements of this Agreement.
AutoNDA by SimpleDocs
Mitigation of Unauthorized Access, Use or Disclosure of Unsecured PHI. Business Associate agrees that, to the extent practi- cable, it shall mitigate any harmful effect resulting from any unauthorized acquisition, use or disclosure of unsecured PHI caused by Business Associate’s violation of the requirements of this Agreement or its failure to properly secure PHI in accordance with the April 17, 2009 guidelines published by the Department of Health and Human Services.

Related to Mitigation of Unauthorized Access, Use or Disclosure of Unsecured PHI

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Employment of Unauthorized Aliens The employment of unauthorized aliens by the Grantee is considered a violation of Section 274A (a) of the Immigration and Nationality Act. If the Grantee knowingly employs unauthorized aliens, such violation shall be cause for unilateral cancellation of this Agreement.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • EMPLOYMENT OF UNAUTHORIZED ALIENS PROHIBITED In accordance with §2.2-4311.1 of the Code of Virginia, as amended, the Contractor must not during the performance of this Contract knowingly employ an unauthorized alien, as that term is defined in the federal Immigration Reform and Control Act of 1986.

  • Protection from Unauthorized Use Licensee shall secure that Participating Institutions will use reasonable efforts to restrict access to the Licensed Materials to Authorized Users.

Time is Money Join Law Insider Premium to draft better contracts faster.