CUSTODY AND CONTROL, ACCESS, COLLECTION, USE AND DISCLOSURE Sample Clauses

CUSTODY AND CONTROL, ACCESS, COLLECTION, USE AND DISCLOSURE. 5.1 Custody and Control of Data (a) Where Access to IHA System is made available to the Physician/Provider , all such Data will be disclosed to the Physician/Provider by IHA pursuant to IHA’s authority to do so under FIPPA and other applicable legislation and where Access to the eHealth Viewer System is made available to the Physician/Provider, all such Data will be disclosed to the Physician/Provider by the respective Data contributor for the eHealth Viewer System with authority to do so under FIPPA, PIPA and other applicable legislation . (b) Data disclosed to the Physician/Provider from an IHA System remains in the Custody and under the Control of IHA and Data disclosed to the Physician/Provider from the eHealth Viewer System remains under the control of the respective contributor of the Data while Custody of the Data is maintained by the Ministry of Health. Data accessed and subsequently collected by the Physician/Provider into any paper or electronic form, will be collected by the Physician/Provider pursuant to the Physician/Provider’s legal authority to collect the Data under PIPA or other applicable legislation, and is deemed thereafter to be in the Custody and Control of the Physician/Provider. The Physician/Provider is then solely and wholly responsible for the privacy and the administrative, technical and physical security of the Data pursuant to, and consistent with, its obligations under PIPA. (c) Where the Physician/Provider discloses Data into an IHA System, all such information will be disclosed to IHA by the Physician/Provider pursuant to the terms and conditions of PIPA or other applicable legislation. Data disclosed into an IHA System in this manner is collected by IHA pursuant to IHA’s legal authority to collect it under the Hospital Act, the Health Authorities Act, FIPPA and other applicable legislation (as amended or replaced from time to time) and is deemed thereafter to be in the Custody and Control of IHA.

Related to CUSTODY AND CONTROL, ACCESS, COLLECTION, USE AND DISCLOSURE

  • PERMITTED USES AND DISCLOSURES BY CONTRACTOR Except as otherwise limited in this Schedule, Contractor may use or disclose Protected Health Information to perform functions, activities, or services for, or on behalf of, County as specified in the Agreement; provided that such use or disclosure would not violate the Privacy Rule if done by County.

  • Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.

  • Permitted Uses and Disclosures of PHI and the third party notifies the Business Associate of any instances of which it is aware in which the confidentiality of the information has been breached.