Reporting of Improper Use or Disclosure and Notification of Breach Clause Samples

Reporting of Improper Use or Disclosure and Notification of Breach i. Business Associate shall, as soon as reasonably possible, but immediately after discovery of a Breach, notify Covered Entity of any use or disclosure of PHI not provided for by this Agreement, including a Breach of Unsecured Protected Health Information as such notice is required by 45 C.F.R. 164.410 or a breach for which notice is required under §▇▇-▇▇-▇▇▇, C.R.S. ii. Such notice shall include the identification of each Individual whose Unsecured Protected Health Information has been, or is reasonably believed by Business Associate to have been, accessed, acquired, or disclosed during such Breach. iii. Business Associate shall, as soon as reasonably possible, but immediately after discovery of any Security Incident that does not constitute a Breach, notify Covered Entity of such incident. iv. Business Associate shall have the burden of demonstrating that all notifications were made as required, including evidence demonstrating the necessity of any delay.
Reporting of Improper Use or Disclosure and Notification of Breach. Business Associate shall, as soon as reasonably possible, but immediately after discovery of a Breach, notify Covered Entity of any use or disclosure of PHI not provided for by this Agreement, including a Breach of Unsecured Protected Health Information as such notice is required by 45 C.F.R. 164.410 or a breach for which notice is required under §▇▇-▇▇-▇▇▇, C.R.S.
Reporting of Improper Use or Disclosure and Notification of Breach i. Business Associate shall, as soon as reasonably possible, but promptly without unreasonable delay (but in no case more than 48 hours) after discovery of a Breach, notify Covered Entity of any use or disclosure of PHI not provided for by this Agreement, including a Breach of Unsecured Protected Health Information as such notice is required by 45 C.F.R. 164.410 or a breach for which notice is required under §▇▇-▇▇-▇▇▇, C.R.S. ii. Such notice shall include the identification of each Individual whose Unsecured Protected Health Information has been, or is reasonably believed by Business Associate to have been, accessed, acquired, or disclosed during such Breach. iii. Business Associate shall, as soon as reasonably possible, but promptly without unreasonable delay (but in no case more than 48 hours) after discovery of any Security Incident that does not constitute a Breach, notify Covered Entity of such incident. iv. Business Associate shall have the burden of demonstrating that all notifications were made as required, including evidence demonstrating the necessity of any delay. v. The parties acknowledge and agree that this Section v. constitutes notice by Business Associate to Covered Entity of the ongoing existence and occurrence of attempted but Unsuccessful Security Incidents for which no additional notice to Covered Entity is required. “Unsuccessful Security Incidents” shall include pings and other broadcast attacks on Business Associate’s firewall, port scans, unsuccessful log-in attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of Protected Health Information.

Related to Reporting of Improper Use or Disclosure and Notification of Breach

  • Non-Disclosure and Non-Use of Confidential Information The Receiving Party shall use the Disclosing Party’s Confidential Information only for the purpose of evaluating the Relationship and for the purposes of the ongoing Relationship, and shall protect such Confidential Information from disclosure to third parties, using the same degree of care used to protect its own proprietary information of like importance, but in any case using no less than a reasonable degree of care. The Receiving Party shall not make any copies of Confidential Information unless the same are previously approved of in writing by the Disclosing Party. The Receiving Party shall reproduce the Disclosing Party’s proprietary rights notices on any such approved copies, in the same manner in which such notices were set forth in or on the original. The Receiving Party may disclose the Disclosing Party’s Confidential Information to its affiliates, employees and consultants (“Representatives”), in each case only if such Representatives have a need to know, and provided that such Representatives (i) use the Confidential Information for the purposes of the Relationship only, and (ii) are bound to protect the Confidential Information as required hereunder. The Receiving Party shall immediately notify the Disclosing Party in the event of any unauthorized use or disclosure of the Confidential Information. The Receiving Party agrees not to reverse engineer, disassemble or decompile any prototypes, software or other tangible objects which embody the Disclosing Party’s Confidential Information and which are provided to the Receiving Party hereunder. The Parties shall each be responsible for any breach of the terms of this Agreement by them or their Representatives and agree, at their sole expense, to take all reasonable measures (including, but not limited to, court proceedings) to restrain their respective Representatives from prohibited or unauthorized disclosure or use of the Confidential Information.

  • Data Disclosure Under Minnesota Statute § 270C.65, Subdivision 3 and other applicable law, the Contractor consents to disclosure of its social security number, federal employer tax identification number, and/or Minnesota tax identification number, already provided to the State, to federal and state agencies and state personnel involved in the payment of state obligations. These identification numbers may be used in the enforcement of federal and state laws which could result in action requiring the Contractor to file state tax returns, pay delinquent state tax liabilities, if any, or pay other state liabilities.