Notification of Unintended Use or Disclosure of PHI Sample Clauses

Notification of Unintended Use or Disclosure of PHI. 5.1 BUSINESS ASSOCIATE shall report to COVERED ENTITY any use or disclosure of PHI not provided for in this BAA or in violation of the HIPAA Rules or other applicable law, including any and all actual and potential breaches and security incidents (each an “unintended use or disclosure”), promptly and no later than seventy-two (72) hours after BUSINESS ASSOCIATE, its workforce or any subcontractor discovers, is alerted to or otherwise becomes aware of such unintended use or disclosure. Such report shall be submitted to COVERED ENTITY’s designated Privacy Officer by both mail and electronic mail using the mailing and email addresses set forth below the signature block. BUSINESS ASSOCIATE also shall notify the person designated to receive contractual notices on COVERED ENTITY’s behalf under the Agreement.
AutoNDA by SimpleDocs
Notification of Unintended Use or Disclosure of PHI. 5.1 Business Associate shall report to Covered Entity any use or disclosure of PHI not provided for in this BAA or in violation of the HIPAA Rules or other applicable law, including any and all actual and potential breaches and security incidents (each an “unintended use or disclosure”), promptly and no later than seventy-two (72) hours after Business Associate, its workforce or any subcontractor discovers, is alerted to or otherwise becomes aware of such unintended use or disclosure. Such report shall be submitted to Covered Entity’s designated Privacy Officer by both mail and email using the mailing and email addresses set forth below the signature block. Business Associate also shall notify the person designated to receive contractual notices on Covered Entity’s behalf under any Agreement(s).

Related to Notification of Unintended Use or Disclosure of PHI

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code.

  • DISCLOSURE OF LICENESEE STATUS The Seller hereby discloses that he/she is a Maryland real estate licensee and or auctioneer of the said property. _ , who is a Maryland real estate licensee involved in this transaction is related to the seller.

  • CONFIDENTIALITY/SAFEGUARDING OF INFORMATION The CONTRACTOR shall not use or disclose any information concerning the AGENCY, or information that may be classified as confidential, for any purpose not directly connected with the administration of this contract, except with prior written consent of the AGENCY, or as may be required by law.

  • Contractor Designation of Trade Secrets or Otherwise Confidential Information If the Contractor considers any portion of materials to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to Contract-related materials it has designated trade secret or otherwise confidential.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Restricted Use By Third Parties Third parties retained by Licensee shall have the right to use the Product to maintain Licensee’s business operations, including data processing, for the time period that they are engaged in such activities, provided that: (i) Licensee gives notice to Contractor of such third party, Site of intended use of the Product, and means of access; and (ii) such third party has executed, or agrees to execute, the Product manufacturer’s standard nondisclosure or restricted use agreement, which executed agreement shall be accepted by the Contractor (“Non-Disclosure Agreement”); and (iii) such third party maintains a logical or physical partition within its computer system so as to restrict use and access to the program to that portion solely dedicated to beneficial use for Licensee. In no event shall Licensee assume any liability for third party’s compliance with the terms of the Non-Disclosure Agreement, nor shall the Non- Disclosure Agreement create or impose any liabilities on the State or Licensee.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

Time is Money Join Law Insider Premium to draft better contracts faster.