Laserfiche WebLink
transmitted by Business Associate for or on behalf of Covered Entity pursuant to the Service <br /> Agreement. <br /> "Security Rule" means final regulatory provisions set forth at 45 CFR Parts 160 and <br /> 164, Subparts A and C. <br /> 2. OBLIGATIONS AND ACTIVITIES OF BUSINESS ASSOCIATE <br /> 2.1. Use of PHI. Business Associate agrees not to use or disclose PHi other than as <br /> necessary to perform the Services, as permitted or required by this Agreement, or as <br /> Required by Law. <br /> 2.2. Safeguards; Compliance with the Security Rule. Business Associate agrees (a) to <br /> use appropriate safeguards to (1) prevent use or disclosure of PHI other than as <br /> permitted by this Agreement and (ii) appropriately protect the confidentiality, <br /> integrity, and availability of PHI; and (b) to comply, where applicable, with the <br /> Security Rule with respect to ePHI. <br /> 2.3. Reporting Unauthorized Use or Disclosure. Business Associate agrees to report <br /> to Covered Entity any use or disclosure of PHI that is not permitted by this Agreement, <br /> including any successful Security Incident and any Breach of Unsecured PHi. Any such <br /> report shall be made without unreasonable delay, but in no event beyond 5 calendar <br /> days after Business Associate discovers such use or disclosure, unless taw enforcement <br /> requests a delay in such notice as permitted under 45 CFR§ 164.412. Following notice <br /> to Covered Entity of any Breach of Unsecured PHI, Business Associate will provide <br /> information required by 45 CFR S 164.404(c), if available, that would permit Covered <br /> Entity to comply with its notice obligations. Business Associate is under no other <br /> obligation to make any report of a Breach of Unsecured PHI, including to any <br /> individual, state, federal, or other government agency or attorney general, or the <br /> media on behalf of Covered Entity. <br /> 2.4. Unsuccessful Security Incidents. Covered Entity and Business Associate <br /> acknowledge and agree that unsuccessful Security Incidents include but are not <br /> limited to: (a) unsuccessful attempts to penetrate computer networks or assets <br /> maintained by Business Associate; (b) immaterial incidents such as "pinging" or "denial <br /> of services" attacks, port scans, and unsuccessful log-on attempts; and (c) any <br /> combination of the foregoing, as long as no such incident results in unauthorized <br /> access, use, or disclosure of PHI. This Section 2.4 hereby constitutes notice to Covered <br /> Entity, and no further notification is required regarding unsuccessful Security <br /> Incidents. <br /> 2.5. Compliance by Subcontractors. Business Associate agrees to ensure that any of <br /> its Subcontractors that create, receive, maintain or transmit PHi for or on behalf of <br /> Business Associate agree in writing to comply with the Security Rule and substantially <br /> similar restrictions and conditions to those that apply through this Agreement to <br /> Business Associate with respect to such PHI or ePHI. <br /> 2.6. Requests by the Secretary. Upon request by the Secretary, Business Associate <br /> agrees to make available to the Secretary Business Associate's Internal Material for use <br /> by the Secretary in determining whether Covered Entity or Business Associate is in <br /> compliance with the HIPAA Rules. <br /> Exhibit B to Subscription Agreement 21 <br /> 20190227.v10.1 <br />