My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
98point6 10/2/19
>
Contracts
>
6 Years Then Destroy
>
2021
>
98point6 10/2/19
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
10/1/2021 1:40:17 PM
Creation date
10/15/2019 11:02:14 AM
Metadata
Fields
Template:
Contracts
Contractor's Name
98point6
Approval Date
10/2/2019
Council Approval Date
9/25/2019
End Date
12/31/2021
Department
Human Resources
Department Project Manager
Marcy Hammer
Subject / Project Title
Subscription Servcies On-demand primary care
Total Compensation
$23,400.00
Contract Type
Agreement
Contract Subtype
Professional Services
Retention Period
6 Years Then Destroy
Document Relationships
Adjusters Northwest 6/17/2019 Amendment 7
(Contract)
Path:
\Records\City Clerk\Contracts\6 Years Then Destroy\2019
CHM2Hill Engineers Inc. 1/25/2021 Amendment 2
(Contract)
Path:
\Records\City Clerk\Contracts\6 Years Then Destroy\2022
CivicPlus 9/29/2021 Amendment 4
(Contract)
Path:
\Documents\City Clerk\Contracts\Agreement\Technology
Multiple Agencies 4/15/2020 Amendment 3
(Contract)
Path:
\Documents\City Clerk\Contracts\Agreement\Interlocal Agreements
Multiple Agencies 8/12/2020 Amendment 2
(Contract)
Path:
\Documents\City Clerk\Contracts\Agreement\Interlocal Agreements
Snohomish County PUD 1/8/2021 Amendment 1
(Contract)
Path:
\Records\City Clerk\Contracts\6 Years Then Destroy\2023
Trapeze Software Group Inc 8/19/2019 Amendment 5
(Contract)
Path:
\Documents\City Clerk\Contracts\Agreement\Technology
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
26
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
transmitted by Business Associate for or on behalf of Covered Entity pursuant to the Service <br /> Agreement. <br /> "Security Rule" means final regulatory provisions set forth at 45 CFR Parts 160 and <br /> 164, Subparts A and C. <br /> 2. OBLIGATIONS AND ACTIVITIES OF BUSINESS ASSOCIATE <br /> 2.1. Use of PHI. Business Associate agrees not to use or disclose PHi other than as <br /> necessary to perform the Services, as permitted or required by this Agreement, or as <br /> Required by Law. <br /> 2.2. Safeguards; Compliance with the Security Rule. Business Associate agrees (a) to <br /> use appropriate safeguards to (1) prevent use or disclosure of PHI other than as <br /> permitted by this Agreement and (ii) appropriately protect the confidentiality, <br /> integrity, and availability of PHI; and (b) to comply, where applicable, with the <br /> Security Rule with respect to ePHI. <br /> 2.3. Reporting Unauthorized Use or Disclosure. Business Associate agrees to report <br /> to Covered Entity any use or disclosure of PHI that is not permitted by this Agreement, <br /> including any successful Security Incident and any Breach of Unsecured PHi. Any such <br /> report shall be made without unreasonable delay, but in no event beyond 5 calendar <br /> days after Business Associate discovers such use or disclosure, unless taw enforcement <br /> requests a delay in such notice as permitted under 45 CFR§ 164.412. Following notice <br /> to Covered Entity of any Breach of Unsecured PHI, Business Associate will provide <br /> information required by 45 CFR S 164.404(c), if available, that would permit Covered <br /> Entity to comply with its notice obligations. Business Associate is under no other <br /> obligation to make any report of a Breach of Unsecured PHI, including to any <br /> individual, state, federal, or other government agency or attorney general, or the <br /> media on behalf of Covered Entity. <br /> 2.4. Unsuccessful Security Incidents. Covered Entity and Business Associate <br /> acknowledge and agree that unsuccessful Security Incidents include but are not <br /> limited to: (a) unsuccessful attempts to penetrate computer networks or assets <br /> maintained by Business Associate; (b) immaterial incidents such as "pinging" or "denial <br /> of services" attacks, port scans, and unsuccessful log-on attempts; and (c) any <br /> combination of the foregoing, as long as no such incident results in unauthorized <br /> access, use, or disclosure of PHI. This Section 2.4 hereby constitutes notice to Covered <br /> Entity, and no further notification is required regarding unsuccessful Security <br /> Incidents. <br /> 2.5. Compliance by Subcontractors. Business Associate agrees to ensure that any of <br /> its Subcontractors that create, receive, maintain or transmit PHi for or on behalf of <br /> Business Associate agree in writing to comply with the Security Rule and substantially <br /> similar restrictions and conditions to those that apply through this Agreement to <br /> Business Associate with respect to such PHI or ePHI. <br /> 2.6. Requests by the Secretary. Upon request by the Secretary, Business Associate <br /> agrees to make available to the Secretary Business Associate's Internal Material for use <br /> by the Secretary in determining whether Covered Entity or Business Associate is in <br /> compliance with the HIPAA Rules. <br /> Exhibit B to Subscription Agreement 21 <br /> 20190227.v10.1 <br />
The URL can be used to link to this page
Your browser does not support the video tag.