My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2025/04/09 Council Agenda Packet
>
Council Agenda Packets
>
2025
>
2025/04/09 Council Agenda Packet
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
4/10/2025 8:32:47 AM
Creation date
4/10/2025 8:30:23 AM
Metadata
Fields
Template:
Council Agenda Packet
Date
4/9/2025
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
109
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
Download electronic document
View images
View plain text
<br /> <br />12 <br /> <br />(vii) Right to Request Restrictions on the Disclosure of PHI and Confidential <br />Communications. If an individual submits a Request for Restriction or Request for <br />Confidential Communications to the Business Associate, Business Associate and <br />Covered Entity agree that Business Associate, on behalf of Covered Entity, shall <br />evaluate and respond to these requests according to Business Associate’s own <br />procedures for such requests. <br /> <br />(viii) Return or Destruction of PHI. Upon the termination or expiration of the <br />Agreement or this BAA, Business Associate agrees to return the PHI to Covered <br />Entity, destroy the PHI (and retain no copies), or if Business Associate determines <br />that return or destruction of the PHI is not feasible, (a) continue to extend the <br />protections of this BAA and of the HIPAA Requirements to the PHI, and (b) limit any <br />further uses and disclosures of the PHI to the purpose making return or destruction <br />infeasible. <br /> <br />(ix) Availability of Books and Records. Business Associate shall make <br />available to HHS or its agents the Business Associate’s internal practices, books, and <br />records relating to the use and disclosure of PHI in connection with this BAA. <br /> <br />(x) Termination for Breach. <br /> <br />a. Business Associate agrees that Covered Entity shall have the right <br />to terminate this BAA or seek other remedies if Business Associate violates a <br />material term of this Agreement. <br /> <br />b. Covered Entity agrees that Business Associate shall have the right <br />to terminate this BAA or seek other remedies if Covered Entity violates a <br />material term of this BAA. <br /> <br /> (c) Security Incident and Breach Reporting. <br /> <br />(i) Business Associate shall Report to Covered Entity any unauthorized <br />access, use, disclosure, modification, or destruction of PHI (including Electronic PHI) <br />not permitted by this BAA, applicable law, or permitted by Covered Entity in writing <br />(“Successful Security Incidents” or “Breaches”) of which Business Associate <br />becomes aware. Business Associate shall report such Successful Security Incidents <br />or Breaches to Covered Entity as specified in this Agreement. <br /> <br />(ii) For Security Incidents that do not result in unauthorized access, use, <br />disclosure, modification, or destruction of PHI (including, for purposes of example <br />and not for purposes of limitation, pings on Business Associate’s firewall, port <br />scans, attempts to log onto a system or enter a database with an invalid password <br />or username, denial-of-service attacks that do not result in the system being taken <br />off-line, or malware such as worms or viruses) (hereinafter “Unsuccessful Security
The URL can be used to link to this page
Your browser does not support the video tag.