Reporting of Unauthorized Access Sample Clauses

Reporting of Unauthorized Access. A. Entity shall, within ten (10) calendar days of becoming aware of an unauthorized access to PHI unrelated to treatment of a patient, payment or operations through Epic Link by Entity, its officers, directors, employees, contractors, agents, report any such access to Hospital. Such notice shall be made to the following: ▇▇▇ & ▇▇▇▇▇▇ ▇. ▇▇▇▇▇ Children’s Hospital of Chicago; ATTN: Privacy Officer; ▇▇▇ ▇. ▇▇▇▇▇▇▇ ▇▇▇. Box 160; Chicago, IL 60611; Phone: ▇▇▇.▇▇▇.▇▇▇▇. B. Entity will promptly take actions to mitigate the cause of the unauthorized access. To the extent Hospital deems warranted, in its sole discretion, Hospital will provide notification to its patients (at Entity’s expense). In the event credit monitoring is necessary for affected individuals, it shall be provided at Entity’s sole cost and expense.
Reporting of Unauthorized Access. Accellion shall inform the Customer without undue delay, but at least within 48 hours, about any errors or irregularities in processing of personal data of the Customer or reasonable suspicion of any other breach of the protection of personal data.
Reporting of Unauthorized Access. Filemail shall inform the Customer without undue delay, but at least within 48 hours, about any errors or irregularities in processing of personal data of the Customer or reasonable suspicion of any other breach of the protection of personal data.
Reporting of Unauthorized Access. Kiteworks shall inform the Customer without undue delay, but at least within 48 hours, about any errors or unauthorized access or disclosure in processing of personal data of theCustomer or any other breach of the protection of personal data.

Related to Reporting of Unauthorized Access

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Access Notification ▇▇▇ shall notify Provider promptly of any known unauthorized access. ▇▇▇ will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. §§ 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.

  • Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.