Orange County NC Website
DocuSign Envelope ID:98C1 EFCE-16F1-463F-82E1-11 E2C75006F5 <br /> Information by Business Associate in violation of the requirements of this Agreement, as well as to <br /> provide complete cooperation to Covered Entity should Covered Entity elect to review or investigate such <br /> noncompliance or Security Incident. Business Associate shall cooperate in Covered Entity's breach <br /> analysis and/or risk assessment, if requested. Furthermore, Business Associate shall cooperate with <br /> Covered Entity in the event that Covered Entity determines that any third parties must be notified of a <br /> Breach,provided that Business Associate shall not provide any such notification except at the direction of <br /> Covered Entity. <br /> (f) Breach Reporting. Business Associate shall report in writing to Covered Entity's Privacy <br /> Officer (see Exhibit A), any use or disclosure of Protected Health Information that is not in compliance <br /> with the terms of this Agreement, as well as any Security Incident and any actual or suspected Breach, of <br /> which it becomes aware, without unreasonable delay, and in no event later than forty-eight (48) hours of <br /> such discovery. For purposes of this Agreement, "Security Incident" means the attempted or successful <br /> unauthorized access, use, disclosure, modification, or destruction of information or interference with <br /> system operations in an information system. Such notification shall contain the elements required by 45 <br /> C.F.R. § 164.410. Parties agree that notice is hereby deemed given for Unsuccessful Security Incidents, as <br /> defined hereafter and this notice shall satisfy any notices required of Business Associate to Covered <br /> Entity of the ongoing existence and occurrence of Unsuccessful Security Incidents, for which no <br /> additional notice to Covered Entity shall be given or required. An "Unsuccessful Security Incident" <br /> means a security incident that does not result in: (1)the unauthorized access, use, disclosure, modification <br /> or destruction of information; or (2) material interference with system operations in an information <br /> system, including, without limitation, activity such as pings and other broadcast attacks on Business <br /> Associate's firewall,port scans, unsuccessful log-on attempts, denial of service and/or any combination of <br /> the above, so long as no such incident results in unauthorized access,use or disclosure of Electronic PHI. <br /> (g) Compliance. To the extent applicable, Business Associate will comply with (i) Covered <br /> Entity's Notice of Privacy Practices; (ii) any limitations to which Covered Entity has agreed in regard to <br /> an Individual's permission to use or disclose his or her Protected Health Information; and (iii) any <br /> restrictions to the use or disclosure of Protected Health Information to which Covered Entity has agreed <br /> or is required to agree. <br /> (h) Government Access. Business Associate will make its internal practices, books and <br /> records available to the Secretary of the Department of Health and Human Services for purposes of <br /> determining compliance with the terms of the HIPAA Security and Privacy Rule, and, at the request of <br /> the Secretary, will comply with any investigations and compliance reviews,permit access to information, <br /> and cooperate with any complaints, as Required by Law. Without unreasonable delay and, in any event, <br /> no more than 48 hours of receipt of the request or notification, Business Associate will notify Covered <br /> Entity in writing of any request by any governmental entity, or its designee, to review Business <br /> assessment of any kind. <br /> (i) Electronic Transactions. If Business Associate conducts any Standard Transactions for or <br /> on behalf of Covered Entity, Business Associate shall comply with the requirements under the Electronic <br /> Transaction Rule. <br /> (j) Audit. Business Associate shall permit Covered Entity, in its discretion, to conduct an <br /> audit of Business Associate's compliance with this Agreement, HIPAA, and HITECH. Such audit may <br /> consist of an onsite visit, a series of inquiries that require written responses, or both. Business Associate <br /> shall promptly and completely respond to Covered Entity's requests for information in support of the <br /> audit, which shall not be conducted more than once annually except in cases of an actual or reasonably <br /> suspected Security Incident or reasonably suspected noncompliance with this Agreement, HIPAA or <br /> HITECH. Each Party shall bear its own costs associated with the audit. <br /> 3 <br /> October 2013 <br />