Laserfiche WebLink
C011111hancc with the privacy provisions of law that apply [,) the Business Associate to the <br />sarlle extent as the Covered Fruity, <br />A. Secur-it1,: 41111)1enient administrative. physical. and technical sal-eguards that reasonably <br />and appropriately protect the confidentiality, integrity, and availability of the PHI that it <br />creates, receives, nlaitltarils, 01, translllits on behalf of the Covered Entity as required by <br />la". The Business Assoc:iatC is directly responsible for conlpliatice tvitll the security <br />provision; of HIPAA and i-IITECH to the sarlle extent as rile Covered Entity. <br />C. Improper Disclosures: Report ,all unauthorized or otherwise improper disclosures of PI I I, <br />or security incident, to the Covered Entity within two (2) days Of the Business <br />Associate's knowledge of such event. <br />D. Notice of Breach: Within two (2) business clays of the disco%cry of a breach its defined at <br />45 C'FIR § 164.402 notify [he Covered Entity of any bre,ich of unsecured PHI. Noti ricati oil <br />shall by the most rapid rneans reasonably possible, such as tclephorlic notice made <br />directly to an appropriate person within the covered entity and not including a voice mail <br />or similar menage. written notification shall fol]Ok� within that two (2) period by Fax and <br />be confirmed by diiect contact with the intended recipient, and include the identification <br />of arch individual whose unsecured PHI has been, or is reasonably believed by the <br />Busrrle.S,S Associate to have been, accessed, acquired, or disclosed during such breach; a <br />brief description of what happened. including the date ofthe breach and the date ofthe <br />discovery of the breach. i f known: a description of the types of unsecured PHI that were <br />involved in the breach (such as whether fill] rlatne, social security number, date of -birth, <br />home address. tnccount number, diagnosis, disability code, or other types of information <br />were involved); any step,, individt_ralti should take to protect themselves frorn potential <br />harm resulting from the breach, a brief description of what the Business Associate is <br />doing to investigate the breach, to mitigate harm to individuals, and to protect against any <br />fitillier breaches; the contact procedures of file Business Associate for individuals to ask <br />questions or Darn additional information, which shall include a toll tree dumber, an e <br />mail address, Web site, or postal address; and any other intonation required to be <br />provided to the individual by the Covered Entity pt.n-suant to 45 CFR § 164, 404, as <br />amended. A breach shall be treated as discovered in accordance -v►'ith the terms of 45 CFR <br />5164 410. The information shall be updated promptly and provided to [lie Covered Entity <br />its requested by the Covered Entity, <br />E. Mitigation: Mitigate, to die extent practicable, any harmful effect that is known to <br />Business Associate of a use or disclosure of PHI by Business Associate it] violation of the <br />requirements of this Addendum or the law. <br />F. A+dents: Ensure that any agent, including all of its employees, representatives, and <br />subcontractors, to whore it provides PHI received from, or created or received by <br />Business Associate on behalf of Covered Entity agrees to the same restrictions and <br />B. A. A. Attachment Page 2 of 5 <br />