Laserfiche WebLink
receives, maintains, or transmits on behalf of the Covered Entity as required by law. The Business <br />Associate is directly responsible for compliance with the security provisions of HIPAA and <br />HITECH to the same extent as the Covered Entity. <br />C. Improper Disclosures: Report all unauthorized or otherwise improper disclosures of PHI, or <br />security incident, to the Covered Entity within two (2) days of the Business Associate's <br />knowledge of such event. <br />D. Notice of Breach: Within two (2) business days of the discovery of a breach as defined at 45 CFR <br />§ 164.402 notify the Covered Entity of any breach of unsecured PHI. Notification shall by the <br />most rapid means reasonably possible, such as telephonic notice made directly to an appropriate <br />person within the covered entity and not including a voice mail or similar message. Written <br />notification shall follow within that two (2) period by fax and be confirmed by direct contact with <br />the intended recipient, and include the identification of each individual whose unsecured PHI has <br />been, or is reasonably believed by the Business Associate to have been, accessed, acquired, or <br />disclosed during such breach; a brief description of what happened, including the date of the <br />breach and the date of the discovery of the breach, if known; a description of the types of <br />unsecured PHI that were involved in the breach (such as whether full name, social security <br />number, date of birth, home address, account number, diagnosis, disability code, or other types of <br />information were involved); any steps individuals should take to protect themselves from <br />potential harm resulting from the breach; a brief description of what the Business Associate is <br />doing to investigate the breach, to mitigate harm to individuals, and to protect against any further <br />breaches; the contact procedures of the Business Associate for individuals to ask questions or <br />learn additional information, which shall include a toll free number, an e-mail address, Web site, <br />or postal address; and any other information required to be provided to the individual by the <br />Covered Entity pursuant to 45 CFR § 164.404, as amended. A breach shall be treated as <br />discovered in accordance with the terms of 45 CFR § 164.410. The information shall be updated <br />promptly and provided to the Covered Entity as requested by the Covered Entity. <br />E. Miti aQ tion: Mitigate, to the extent practicable, any harmful effect that is known to Business <br />Associate of a use or disclosure of PHI by Business Associate in violation of the requirements of <br />this Addendum or the law. <br />F. Agents: Ensure that any agent, including all of its employees, representatives, and subcontractors, <br />to whom it provides PHI received from, or created or received by Business Associate on behalf of <br />Covered Entity agrees to the same restrictions and conditions that apply through this Addendum <br />to Business Associate with respect to such information. <br />G. Right of Access: <br />1. From time to time upon reasonable advance notice, or upon a reasonable determination by <br />Covered Entity that Business Associate has potentially or actually breached this Addendum, <br />make internal practices, books, and records relating to the use and disclosure of PHI received <br />from, or created or received by Business Associate on behalf of Covered Entity available to <br />the Covered Entity, or at the request of the Covered Entity to the Secretary of Department of <br />Health and Human Services, for the purpose of determining compliance with HIPAA, <br />HITECH, and/or this Addendum. <br />