Laserfiche WebLink
inaccurate, or unlawful material in the Services; (vi) resell, sublicense, lease, time- <br />share or otherwise make the Digital Services available to any unauthorized third <br />party; (vii) permit access to the Digital Services by a competitor of Vera; (viii) use <br />the Digital Services, or permit it to be used, for purposes of product evaluation or <br />other comparative analysis intended for publication without Vera's prior written <br />consent; or (ix) access the Digital Services for the purpose of building a competitive <br />product or service or copying its features or user interface. <br />8.2 Access and Use of Data. Vera shall have the right to reproduce, modify and prepare <br />derivative works of, aggregate, analyze, cleanse, scrub, reverse engineer, distribute, <br />display, present and otherwise use Data as reasonably necessary for the purposes of <br />performing, improving and providing services for all users. To the extent Vera <br />creates and uses any modified version of Data or new data based on Data, Vera agrees <br />with respect to modified Data or new data created with reference thereto, the <br />applicable Participants shall have been de-identified in accordance with 45 CFR <br />section 164.514, as applicable. Employer shall use its best efforts to require its <br />Administrators to ensure that (i) all information that is provided to Vera, including, <br />but not limited to eligibility files, is authentic, accurate, reliable, complete and <br />confidential and (ii) Vera may use such information in accordance with the terms of <br />the Agreement without violating or infringing any third-party rights. Employer’s <br />security measures shall include, and Employer shall use its best efforts to require <br />that its Administrators’ security measures include, but are not limited to: (a) <br />maintaining, and requiring agents and subcontractors to maintain, administrative, <br />technical and physical safeguards to protect the security, integrity and confidentiality <br />of data provided to Vera, including up-to-date anti-virus software; (b) not accessing <br />or using the electronic systems of Vera for any purpose that is illegal or unauthorized; <br />(c) reporting to Vera any material system, equipment or software malfunction, error, <br />breakage or security breach that involves or may reasonably affect Vera, whether <br />detected or believed to be imminent; and (d) maintaining and enforcing security <br />management policies and procedures and utilizing mechanisms and processes to <br />prevent, detect, record, analyze, contain and resolve unauthorized access attempts <br />and for periodically reviewing its processing infrastructure for potential security <br />vulnerabilities. <br />8.3 Protected Health Information. Each party will comply with all federal and state <br />laws and requirements regarding the confidentiality and security of Protected Health <br />Information or “PHI” to the extent applicable to the Parties’ respective obligations <br />under this SOF-1. A Party’s obligations as a Business Associate of the other Party, <br />if applicable, are set forth in the Business Associate Agreement executed between <br />the Parties. Nothing in this Agreement will be construed to limit any obligations of <br />the Parties under the Business Associate Agreement, and nothing in the Business <br />Associate Agreement will be construed to limit any obligations of the Parties under <br />this SOF-1. In the event of a conflict between (i) any provision of SOF-1, and (ii) <br />any provision of the Business Associate Agreement, the provision in the Business <br />Associate Agreement, if applicable, will control to the fullest extent permitted by <br />applicable laws.