Reports of Unauthorized Access, Use or Disclosure Sample Clauses

Reports of Unauthorized Access, Use or Disclosure. Business Associate shall report in writing to Participant, without unreasonable delay, (i) any use or disclosure of PHI that is not authorized by this Addendum or the DURSA including, but not limited to, Adverse Security Events, as defined in the DURSA, and (ii) any Breach of Unsecured Protected Health Information. Business Associate shall deliver such notice no later than five (5) calendar days after the date on which it (or any member of its workforce or its agent, except the person(s) responsible for the unauthorized use or disclosure or Breach), became aware, or in the exercise of reasonable diligence should have become aware, of such unauthorized use or disclosure or Breach. Notice of any unauthorized use or disclosure or Breach shall include the following information if know at the time of the Notice: (i) describe the event resulting in the unauthorized use or disclosure or Breach;
AutoNDA by SimpleDocs
Reports of Unauthorized Access, Use or Disclosure. Participant #2 shall report in writing to Participant #1, without unreasonable delay, (i) any use or disclosure of PHI that is not authorized by this Addendum or the DURSA including, but not limited to, Adverse Security Events, defined in the DURSA, and (ii) any Breach of Unsecured Protected Health Information. Participant #2 shall deliver such notice no later than five
Reports of Unauthorized Access, Use or Disclosure. Business Associate shall report in writing to Participant, without unreasonable delay, (i) any use or disclosure of PHI that is not authorized by this Addendum or the DURSA including, but not limited to, Adverse Security Events, as defined in the DURSA, and (ii) any Breach of Unsecured Protected Health Information. Business Associate shall deliver such notice no later than five (5) calendar days after the date on which it (or any member of its workforce or its agent, except the person(s) responsible for the unauthorized use or disclosure or Breach), became aware, or in the exercise of reasonable diligence should have become aware, of such unauthorized use or disclosure or Breach. Notice of any unauthorized use or disclosure or Breach shall include the following information if know at the time of the Notice: (i) describe the event resulting in the unauthorized use or disclosure or Breach; (ii) describe the types of PHI that were involved in the unauthorized use or disclosure or Breach; and (iii) describe what Business Associate is doing to investigate, mitigate losses arising from and protect against any further unauthorized use or disclosure or Breach. Business Associate shall maintain, for six (6) years, all documentation associated with the investigation of a potential unauthorized use or disclosure or Breach, including any information influencing its determination that the use or disclosure was or was not a Breach and any exceptions applied to the use or disclosure. On request, Business Associate shall provide Participant with the documentation relevant to the circumstances surrounding the unauthorized use or disclosure or Breach.

Related to Reports of Unauthorized Access, Use or Disclosure

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Unauthorized Access Notification LEA shall notify Provider promptly of any known or suspected unauthorized access. LEA will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • IDENTIFYING INFORMATION AND PRIVACY NOTIFICATION (a) FEDERAL EMPLOYER IDENTIFICATION NUMBER and/or FEDERAL SOCIAL SECURITY NUMBER. As a condition to NYSERDA’s obligation to pay any invoices submitted by Contractor pursuant to this Agreement, Contractor shall provide to NYSERDA its Federal employer identification number or Federal social security number, or both such numbers when the Contractor has both such numbers. Where the Contractor does not have such number or numbers, the Contractor must give the reason or reasons why the payee does not have such number or numbers.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Account Information Disclosure We will disclose information to third parties about your account or the transfers you make: - As necessary to complete transfers; - To verify the existence of sufficient funds to cover specific transactions upon the request of a third party, such as a credit bureau or merchant; - If your account is eligible for emergency cash and/or emergency card replacement services and you request such services, you agree that we may provide personal information about you and your account that is necessary to provide you with the requested service(s); - To comply with government agency or court orders; or - If you give us your written permission.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Data Disclosure Under Minnesota Statute § 270C.65, Subdivision 3 and other applicable law, the Contractor consents to disclosure of its social security number, federal employer tax identification number, and/or Minnesota tax identification number, already provided to the State, to federal and state agencies and state personnel involved in the payment of state obligations. These identification numbers may be used in the enforcement of federal and state laws which could result in action requiring the Contractor to file state tax returns, pay delinquent state tax liabilities, if any, or pay other state liabilities.

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release.

Time is Money Join Law Insider Premium to draft better contracts faster.