Inappropriate Access Sample Clauses

The Inappropriate Access clause defines restrictions and consequences related to unauthorized or improper access to certain systems, data, or resources. Typically, this clause outlines what constitutes inappropriate access, such as accessing confidential information without permission or bypassing security protocols, and may specify disciplinary actions or liability for violations. Its core function is to protect sensitive information and systems by deterring unauthorized use and providing a clear basis for addressing breaches.
Inappropriate Access. I will not access or obtain my own, a friend’s, or a family member’s information maintained by Presence Health without appropriate written authorization and consistent with Presence Health Policies.
Inappropriate Access. It is never acceptable for you to look at confidential or patient information “just out of curiosity,” even if no harm is intended. • It does not matter whether the information pertains to a celebrity, political figure, or other “high profile” person, fellow workforce member, a close friend, family member, or yourself. You must protect and keep private ALL patient information, no matter whose it is. Just because you have access to a system or network or patient records, does not mean you have the right or authorization to access or view confidential or patient information that does not pertain to your job. All patient information is confidential and must be protected at all times. • Unauthorized access to networks or systems containing PHI or other confidential information includes: o Access without authorization. o Using someone else’s password and/or user ID. o Letting someone else log you into the network using their password. o Giving someone your password to log into the network. o Using your password to log someone else into the network. o Accessing information without a job-related “need-to-know.” • You are responsible and will be held accountable for all access to networks or systems using your password. • Be wise and only access systems and data as authorized.
Inappropriate Access. Access to the information is granted on the basis that the partner organisations employee has a legitimate reason to access information only as set out above. Access and sharing of information are restricted and any unauthorised access or sharing may be challenged and reported to the partner organisations. The Partner organisations employees access privileges could also be deactivated, during any investigation.

Related to Inappropriate Access

  • Appropriate Safeguards BA shall implement appropriate safeguards to prevent the use or disclosure of Protected Information other than as permitted by the Contract or Addendum, including, but not limited to, administrative, physical and technical safeguards in accordance with the Security Rule, including, but not limited to, 45 C.F.R. Sections 164.308, 164.310, and 164.312. [45 C.F.R. Section 164.504(e)(2)(ii)(B); 45 C.F.R. Section 164.308(b)]. BA shall comply with the policies and procedures and documentation requirements of the Security rule, including, but not limited to, 45 C.F.R. Section 164.316 [42 U.S.C. Section 17931].

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Receiving Party Personnel The receiving Party will limit access to the Confidential Information of the disclosing Party to those of its employees, attorneys and contractors that have a need to know such information in order for the receiving Party to exercise or perform its rights and obligations under this Agreement (the “Receiving Party Personnel”). The Receiving Party Personnel who have access to any Confidential Information of the disclosing Party will be made aware of the confidentiality provision of this Agreement, and will be required to abide by the terms thereof. Any third party contractors that are given access to Confidential Information of a disclosing Party pursuant to the terms hereof shall be required to sign a written agreement pursuant to which such Receiving Party Personnel agree to be bound by the provisions of this Agreement, which written agreement will expressly state that it is enforceable against such Receiving Party Personnel by the disclosing Party.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

  • Employee Access Employees are entitled to read and review their personnel file and, without limiting the generality of the foregoing, shall be entitled to inspect their performance evaluations, written censures, letters of reprimand, and other adverse reports. Upon request, employees shall be given copies of all such pertinent documents. The Employer further agrees that no personal files or documents on employees shall be kept outside of the personnel file, apart from payroll or health services files.