This HIPAA Business Associate Agreement (the “Agreement”) is entered into on by and between you (“Covered Entity”), and Robard Corporation and Lexington Wellness Holdings Inc. (each a “Business Associate).
Business Associate performs functions, activities, or services for, or on behalf of, Covered Entity and Business Associate creates, receives, maintains, or transmits Protected Health Information ("PHI"), including Electronic Protected Health Information ("EPHI"), in order to perform such functions, activities, and/or services related to MyHealthyJourney or Insurance Billing and Coding Services and other requested services (referred to collectively as the "Services"). The purpose of this Agreement is to set forth the terms and conditions of disclosure of PHI by Covered Entity to Business Associate, to set forth the terms and conditions of Business Associate's use and disclosure of PHI, and to ensure the confidentiality, integrity, and availability of EPHI that Business Associate creates, receives, maintains, or transmits on behalf of Covered Entity. It is the intent of Covered Entity and Business Associate that this Agreement will meet the requirements of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), the American Recovery and Reinvestment Act of 2009, Public Law 111-5 ("ARRA"), the Privacy Rule, and the Security Rule, 45 C.F.R. Parts 160 and 164.
2.1. Electronic Protected Health Information.
Terms used but not otherwise defined in this Agreement shall have the same meaning as those terms in the HIPAA Rules, which definitions are incorporated in this Agreement by reference.
“Individual” shall have the same meaning as the term “individual” in 45 C.F.R. § 160.103 and shall include a person who qualifies as a personal representative in accordance with 45 C.F.R. § 164.502(g).
2.3. Minimum Necessary
“Minimum Necessary” shall have the same meaning as "minimum necessary" described in 45 C.F.R. § 164.502(b) and Section 13405(b) of ARRA.
2.4. Privacy Rule.
“Privacy Rule” shall mean the Standards for Privacy of Individually Identifiable Health Information at 45 C.F.R. Parts 160 and Part 164, subparts A and E.
2.5. Protected Health Information.
“Protected Health Information” or “PHI” shall have the same meaning as the term “protected health information” in 45 C.F.R. § 160.103, but shall be limited to the information that Business Associate creates, receives, maintains, or transmits on behalf of Covered Entity.
2.6. Required by Law.
“Required by Law” shall have the same meaning as the term “required by law” in 45 C.F.R. § 164.103.
“Secretary” shall mean the Secretary of the United States Department of Health and Human Services or his designee.
2.8. Security Incident.
“Security Incident” shall have the same meaning as “security incident” in 45 C.F.R. § 164.304.
2.9. Security Rule.
“Security Rule” shall mean the Security Standards for the Protection of EPHI at 45 C.F.R. Parts 160 and 164, subparts A and C.
"Subcontractor" shall have the same meaning as "subcontractor" in 45 C.F.R. § 160.103.
3. OBLIGATIONS AND ACTIVITIES OF BUSINESS ASSOCIATE
3.1. Use and Disclosure.
Business Associate agrees to not use or disclose PHI other than as permitted or required by this Agreement and any underlying agreement(s) related to the Services, or as Required by Law. Business Associate shall also comply, where applicable, with the Privacy Rule and the Security Rule.
Business Associate agrees to use appropriate safeguards and comply, where applicable, with 45 C.F.R. Part 164 Subpart C with respect to EPHI, to prevent use or disclosure of the information other than as provided for by this Agreement.
3.3. Business Associate's Reporting Obligations.
- For purposes of this section, "Breach" and "Unsecured PHI" shall have the same meaning as "breach" and "unsecured protected health information," respectively, as such terms are defined by 45 C.F.R. § 164.402.
- Following the discovery of a Breach of Unsecured PHI, Business Associate shall notify Covered Entity of the Breach. Such notification shall be made without unreasonable delay after discovering the Breach, but no later than ten (10) calendar days after its discovery.
- Business Associate’s notice shall include, to the extent possible, the identification of each Individual whose Unsecured PHI has been, or is reasonably believed by Business Associate to have been, accessed, acquired, used, or disclosed during or as a result of the Breach. Business Associate shall also provide Covered Entity with at least the following information: a description of the Breach, including the date of Breach and the date of discovery of the Breach, if known; a description of the types of Unsecured PHI involved in the Breach; any steps Individuals should take to protect themselves from potential harm resulting from the Breach; a brief description of what Business Associate is doing to investigate the Breach, to mitigate harm to Individuals, and to protect against any further Breaches; and any other information Covered Entity is required to include in notification to the affected Individual(s) under 45 C.F.R. § 164.404(c). Business Associate will provide additional information to Covered Entity as such information becomes available
3.3.1. Reports of Non-Permitted Use or Disclosure. Business Associate agrees to report to Covered Entity any use or disclosure of the PHI not provided for by this Agreement of which Business Associate becomes aware. Where applicable, such report shall comply with the requirements outlined in Sections 3.3(b) and 3.3(c).
3.3.2. Reports of Breach of Unsecured PHI.
3.3.3. Reports of Security Incidents. Business Associate agrees to report to Covered Entity any Security Incident of which it becomes aware. Where applicable, such report shall comply with the requirements outlined in Sections 3.3(a) and (b). This Agreement serves as Business Associate's notice to Covered Entity that attempted but unsuccessful Security Incidents, such as pings and other broadcast attacks on Business Associate’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, regularly occur and that no further notice will be made by Business Associate unless there has been a successful Security Incident.
Business Associate agrees to ensure that any Subcontractor that creates, receives, maintains, or transmits PHI (including EPHI) on behalf of Business Associate agrees to substantially the same restrictions and conditions that apply through this Agreement to Business Associate with respect to such information, including but not limited to, compliance with the applicable requirements of 45 C.F.R. Parts 160 and 164. Such agreement between Business Associate and the Subcontractor must be made in writing and must comply with the terms of this Agreement and the requirements outlined in 45 C.F.R. §§ 164.504(e) and 164.314.
3.5. Access to Designated Record Set.
If Business Associate maintains PHI in a Designated Record Set, Business Associate agrees to provide access, at the request of Covered Entity, to PHI in a Designated Record Set, to Covered Entity or, as directed by Covered Entity, to an Individual in order to meet the requirements under 45 C.F.R. § 164.524.
3.6. Amendments to Designated Record Set.
If Business Associate maintains PHI in a Designated Record Set, Business Associate agrees to make available such PHI for amendment and incorporate any amendment(s) to PHI in a Designated Record Set that Covered Entity directs or agrees to pursuant to 45 C.F.R. § 164.526 at the request of Covered Entity or an Individual.
3.7. Accounting of Disclosures.
3.7.1. Business Associate agrees to document such disclosures of PHI and information related to such disclosures as would be required for Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528.
3.7.2. Business Associate agrees to provide to Covered Entity or an Individual information collected in accordance with Section 3.7(a) of this Agreement, to permit Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528.
3.8. Compliance with Law.
To the extent Business Associate is expressly obligated under the underlying agreement(s) to carry out one or more of Covered Entity's obligation(s) under Subpart E of 45 C.F.R. Part 164, Business Associate shall comply with the requirements of Subpart E that apply to Covered Entity in the performance of such obligation(s).
3.9. Internal Practices.
Business Associate agrees to make internal practices, books, and records relating to the use and disclosure of PHI received from, or created or received by Business Associate on behalf of, Covered Entity available to the Secretary for purposes of the Secretary determining Covered Entity's compliance with the Privacy Rule and Security Rule.
Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate of a use or disclosure of PHI by Business Associate in violation of the requirements of this Agreement.
4. PERMITTED USES AND DISCLOSURES BY BUSINESS ASSOCIATE
4.1. General Use and Disclosure.
4.2. Specific Use and Disclosure.
5. OBLIGATIONS OF COVERED ENTITY
5.1. Privacy Practices.
Covered Entity shall provide Business Associate with the notice of privacy practices that Covered Entity produces in accordance with 45 C.F.R. § 164.520, and shall promptly provide Business Associate with any changes to such notice.
5.2. Notice of Changes and Restrictions.
Covered Entity shall notify Business Associate in writing of any changes in, or revocation of, permission by Individual to use or disclose PHI, to the extent such changes affect Business Associate’s permitted or required uses and disclosures. Such notification shall include any restriction that Covered Entity has agreed to in accordance with 45 C.F.R. § 164.522. If Business Associate receives a request to restrict the disclosure of PHI directly from an Individual, Business Associate shall notify Covered Entity of such request and Covered Entity shall be responsible for making the determination, in accordance with the Privacy Rule, as to whether Business Associate shall comply with the Individual's request.
5.3. Permissible Requests by Covered Entity.
Covered Entity shall not request Business Associate to use or disclose PHI in any manner that would not be permissible under the Privacy Rule or the Security Rule if done by Covered Entity, except that Business Associate may use or disclose PHI as set forth herein.
Covered Entity shall use appropriate safeguards to maintain the confidentiality, privacy, and security of PHI in transmitting PHI to Business Associate pursuant to this Agreement.
6. TERM AND TERMINATION
This Agreement shall be effective upon the Effective Date and shall remain in effect until all of the PHI provided by Covered Entity to Business Associate, or created or received by Business Associate on behalf of Covered Entity, is destroyed or returned to Covered Entity, or, if it is infeasible to return or destroy PHI, protections are extended to such information, in accordance with Section 6.3(b).
6.2.1. Termination Resulting from the End of Services. This Agreement shall terminate in the event that the Services that give rise to the necessity of a Business Associate Agreement terminate for any reason.
6.2.2. Termination for Cause. Upon either Party’s knowledge of a material breach of this Agreement by the other Party, the non-breaching Party must provide an opportunity for the breaching Party to cure the breach or end the violation, and if the breaching Party does not cure the breach or end the violation within the time specified by the non-breaching Party, the non-breaching Party shall terminate this Agreement.
6.3. Return or Destruction of PHI.
6.3.1. Except as provided in paragraph (b) of this section, upon termination of this Agreement for any reason, Business Associate shall return or destroy all PHI received from Covered Entity, or created or received by Business Associate on behalf of Covered Entity, that Business Associate still maintains in any form. Covered Entity shall notify Business Associate in writing whether the PHI shall be returned or destroyed. If the Covered Entity determines that PHI shall be returned, Covered Entity shall export the PHI from Business Associate's servers within fourteen (14) business days of termination. If Covered Entity does not export the PHI during this time, Business Associate will destroy the PHI unless the parties agree otherwise. Business Associate shall retain no copies of the PHI. This provision shall also apply to PHI that is in the possession of Subcontractors of Business Associate.
6.3.2. In the event that Business Associate determines that returning or destroying the PHI is infeasible, Business Associate and its Subcontractors shall extend the protections of this Agreement to such PHI and limit further uses and disclosures of such PHI to those purposes that make the return or destruction infeasible, for so long as Business Associate and/or its Subcontractors maintain such PHI.
7.1. Regulatory References.
A reference in this Agreement to a section in the Privacy Rule, the Security Rule, HIPAA, or ARRA, or any other reference to a law or regulation, means the section or law as in effect as of the date of this Agreement or as subsequently amended.
The Parties agree to take such action as is necessary to amend this Agreement from time to time to comply with the requirements of the Privacy Rule, the Security Rule, HIPAA, and ARRA.
The respective rights and obligations of Business Associate under Section 6.3 of this Agreement shall survive the termination of this Agreement.
Any ambiguity in this Agreement shall be resolved in favor of a meaning that permits compliance with the Privacy Rule, the Security Rule, HIPAA, and ARRA.
7.5. Relationship to Other Agreement Provisions.
In the event that a provision of this Agreement is contrary to a provision of an underlying agreement or agreements under which Covered Entity discloses PHI to Business Associate, the provision of this Agreement shall control. Otherwise, this Agreement shall be construed under, and in accordance with, the terms of such underlying agreement or agreements between the Parties.
7.6. Prior Business Associate Agreements.
Consistent with Section 7.5, this Agreement shall supersede any and all prior business associate agreement(s), or terms of other agreements addressing the privacy and security of PHI, between the Parties.
7.7. Modification of Agreement.
No alteration, amendment, or modification of the terms of this Agreement shall be valid or effective unless in writing and signed by Business Associate and Covered Entity.
7.8. Relationship of Parties.
Business Associate, in furnishing services to Covered Entity, is acting as an independent contractor, and Business Associate has the sole right and obligation to supervise, manage, contract, direct, procure, perform, or cause to be performed, all work to be performed by Business Associate under this Agreement. Business Associate is not an agent of Covered Entity, and has no authority to represent Covered Entity as to any matters, except as expressly authorized in this Agreement.
Any notices required or permitted to be given under this Agreement by either Party shall be given in writing: (a) by personal delivery; (b) by electronic facsimile with confirmation sent by United States first class mail; (c) by bonded courier or nationally recognized overnight delivery service; (d) by email at the addressed set forth below, with delivery receipt requested; or (e) by United States first class registered or certified mail, postage prepaid, return receipt requested, addressed to the Parties at the addresses set forth below or to such other addresses as the Parties may request in writing by notice pursuant to this Section 7.9. Notices shall be deemed received on the earliest of personal delivery, upon the next business day after delivery by electronic facsimile with confirmation that the transmission was completed or upon receipt by any other method of delivery.
Mailing & Email Address: The mailing and email address provided by you at the time of registration, or as may be updated by you in your settings from time to time.
Mailing Address: Robard Corporation, c/o Privacy Officer, 821 East Gate Drive, Mount Laurel, NJ 08054.
Email Address: email@example.com.
7.10. Governing Law.
This Agreement shall be governed by and interpreted in accordance with the laws of the State of New Jersey.
This Agreement may be executed in two (2) or more counterparts, each of which shall be deemed an original and when taken together shall constitute one agreement.