12-20-2022
This HIPAA Business Associate Addendum ("Addendum") is an addendum to the Customer Terms of Service (the “Agreement”) between Second Door Health Inc. ("Business Associate") and Customer ("Covered Entity"), as defined in the Agreement (each a “Party” and collectively the “Parties”).
Background. Business Associate performs functions, activities, or services for, or on behalf of, Covered Entity under an existing written agreement (the “Underlying Agreement”) and Business Associate creates, receives, maintains, or transmits Protected Health Information ("PHI"), including Electronic Protected Health Information ("EPHI"), in order to perform such functions, activities, or services (referred to collectively as the "Services"). The purpose of this Agreement is to set forth the terms and conditions of disclosure of PHI by Covered Entity to Business Associate, to set forth the terms and conditions of Business Associate's use and disclosure of PHI, and to ensure the confidentiality, integrity, and availability of EPHI that Business Associate creates, receives, maintains, or transmits on behalf of Covered Entity. It is the intent of Covered Entity and Business Associate that this Agreement will meet the requirements of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”), the American Recovery and Reinvestment Act of 2009, Public Law 111-5 ("ARRA"), the Privacy Rule, and the Security Rule, 45 C.F.R. Parts 160 and 164.
Definitions. Terms used, but not otherwise defined, in this Agreement shall have the same meaning as those terms in HIPAA, ARRA, the Privacy Rule, and the Security Rule. Following are some of the key terms of this Agreement.
Electronic Protected Health Information. “Electronic Protected Health Information” or “EPHI” shall have the same meaning as the term “electronic protected health information” in 45 C.F.R. § 160.103, but shall be limited to the EPHI that Business Associate creates, receives, maintains, or transmits on behalf of Covered Entity.
Individual. “Individual” shall have the same meaning as the term “individual” in 45 C.F.R. § 160.103 and shall include a person who qualifies as a personal representative in accordance with 45 C.F.R. § 164.502(g).
Minimum Necessary. “Minimum Necessary” shall have the same meaning as "minimum necessary" described in 45 C.F.R. § 164.502(b) and Section 13405(b) of ARRA.
Privacy Rule. “Privacy Rule” shall mean the Standards for Privacy of Individually Identifiable Health Information at 45 C.F.R. Parts 160 and Part 164, subparts A and E.
Protected Health Information. “Protected Health Information” or “PHI” shall have the same meaning as the term “protected health information” in 45 C.F.R. § 160.103, but shall be limited to the information that Business Associate creates, receives, maintains, or transmits on behalf of Covered Entity.
Required by Law. “Required by Law” shall have the same meaning as the term “required by law” in 45 C.F.R. § 164.103.
Secretary. “Secretary” shall mean the Secretary of the United States Department of Health and Human Services or his designee.
Security Incident. “Security Incident” shall have the same meaning as “security incident” in 45 C.F.R. § 164.304.
Security Rule. “Security Rule” shall mean the Security Standards for the Protection of EPHI at 45 C.F.R. Parts 160 and 164, subparts A and C.
Subcontractor. "Subcontractor" shall have the same meaning as "subcontractor" in 45 C.F.R. § 160.103.
Obligations and Activities of Business Associate
Use and Disclosure. Business Associate agrees to not use or disclose PHI other than as permitted or required by this Agreement and any Underlying Agreement(s) related to the Services, or as Required by Law. Business Associate shall also comply, where applicable, with the Privacy Rule and the Security Rule.
Safeguards. Business Associate agrees to use appropriate safeguards and comply, where applicable, with the Security Rule with respect to EPHI, to prevent use or disclosure of the information other than as provided for by this Agreement.
Business Associate's Reporting Obligations
a) Reports of Non-Permitted Use or Disclosure. Business Associate agrees to report to Covered Entity any use or disclosure of the PHI not provided for by this Agreement of which Business Associate becomes aware. Where applicable, such report shall comply with the requirements outlined in Sections 3.3(b) and 3.3(c).
b) Reports of Breach of Unsecured PHI.
For purposes of this Section, "Breach" and "Unsecured PHI" shall have the same meaning as "breach" and "unsecured protected health information," respectively, as such terms are defined by 45 C.F.R. § 164.402.
Following the discovery of a Breach of Unsecured PHI, Business Associate shall notify Covered Entity of the Breach. Such notification shall be made without unreasonable delay after discovering the Breach, but no later than five (5) calendar days after its discovery.
Business Associate’s notice shall include, to the extent possible, the identification of each Individual whose Unsecured PHI has been, or is reasonably believed by Business Associate to have been, accessed, acquired, used, or disclosed during or as a result of the Breach. Business Associate shall also provide Covered Entity with at least the following information: a description of the Breach, including the date of Breach and the date of discovery of the Breach, if known; a description of the types of Unsecured PHI involved in the Breach; any steps Individuals should take to protect themselves from potential harm resulting from the Breach; a brief description of what Business Associate is doing to investigate the Breach, to mitigate harm to Individuals, and to protect against any further Breaches; and any other information Covered Entity is required to include in notification to the affected Individual(s) under 45 C.F.R. § 164.404(c). Business Associate will provide additional information to Covered Entity as such information becomes available.
c) Reports of Security Incidents. Business Associate agrees to report to Covered Entity any Security Incident of which it becomes aware. Where applicable, such report shall comply with the requirements outlined in Sections 3.3(a) and (b). This Agreement serves as Business Associate's notice to Covered Entity that attempted but unsuccessful Security Incidents, such as pings and other broadcast attacks on Business Associate’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, regularly occur and that no further notice will be made by Business Associate unless there has been a successful Security Incident.
Subcontractors. Business Associate agrees to ensure that any Subcontractor that creates, receives, maintains, or transmits PHI (including EPHI) on behalf of Business Associate agrees to substantially the same restrictions and conditions that apply through this Agreement to Business Associate with respect to such information, including but not limited to, compliance with the applicable requirements of 45 C.F.R. Parts 160 and 164. Such agreement between Business Associate and the Subcontractor must be made in writing and must comply with the terms of this Agreement and the requirements outlined in 45 C.F.R. §§ 164.504(e) and 164.314.
Access to Designated Record Set The Parties do not intend for Business Associate to maintain any PHI in a Designated Record Set for Covered Entity. To the extent Business Associate possesses PHI in a Designated Record Set, Business Associate agrees to provide access, at the request of Covered Entity, to PHI in a Designated Record Set, to Covered Entity or, as directed by Covered Entity, to an Individual in order to meet the requirements under 45 C.F.R. § 164.524. Business Associate is not required to provide such access where the PHI contained in a Designated Record Set is duplicative of the PHI contained in a Designated Record Set possessed by Covered Entity. If an Individual makes a request for access pursuant to 45 C.F.R. § 164.524 directly to Business Associate, or inquires about his or her right to access, Business Associate will either forward such request to Covered Entity or direct the Individual to Covered Entity.
Amendments to Designated Record Set. The Parties do not intend for Business Associate to maintain any PHI in a Designated Record Set for Covered Entity. To the extent Business Associate possesses PHI in a Designated Record Set, Business Associate agrees to make available such PHI for amendment and incorporate any amendment(s) to PHI in a Designated Record Set that Covered Entity directs or agrees to pursuant to 45 C.F.R. § 164.526 at the request of Covered Entity or an Individual. If an Individual submits a written request for amendment pursuant to 45 C.F.R. § 164.526 directly to Business Associate, or inquires about his or her right to amendment, Business Associate will either forward such request to Covered Entity or direct the Individual to Covered Entity.
Accounting of Disclosures.
a) Business Associate agrees to document such disclosures of PHI and information related to such disclosures as would be required for Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528.
b) Business Associate agrees to provide to Covered Entity or an Individual information collected in accordance with Section 3.7(a) of this Agreement, to permit Covered Entity to respond to a request by an Individual for an accounting of disclosures of PHI in accordance with 45 C.F.R. § 164.528.
Compliance with Law. To the extent Business Associate is expressly obligated under the Underlying Agreement(s) to carry out one or more of Covered Entity's obligation(s) under the Privacy Rule, Business Associate shall comply with the requirements of the Privacy Rule that apply to Covered Entity in the performance of such obligation(s).
Internal Practices. Business Associate agrees to make internal practices, books, and records relating to the use and disclosure of PHI received from, or created or received by Business Associate on behalf of, Covered Entity available to the Secretary for purposes of the Secretary determining Covered Entity's compliance with the Privacy Rule and Security Rule.
Mitigation. Business Associate agrees to mitigate, to the extent practicable, any harmful effect that is known to Business Associate of a use or disclosure of PHI by Business Associate in violation of the requirements of this Agreement.
Permitted Uses and Disclosures by Business Associate.
General Use and Disclosure.
a) Except as otherwise limited in this Agreement, Business Associate may use or disclose PHI to perform Services for, or on behalf of, Covered Entity as such services may be specified in any Underlying Agreement(s), provided that such use or disclosure would not violate the Privacy Rule or the Security Rule if done by Covered Entity.
b) All uses and disclosures of PHI must comply with the Minimum Necessary requirements under the Privacy Rule. The Party disclosing PHI shall determine what constitutes the Minimum Necessary to accomplish the intended purpose of the disclosure.
Specific Use and Disclosure.
a) Business Associate may use or disclose PHI to carry out Business Associate's legal responsibilities and for the proper management and administration of [Business Associate, provided that any such disclosures are either (1) Required by Law or (2) Business Associate obtains reasonable assurances from the person to whom the information is disclosed that it will remain confidential and used or further disclosed only as Required by Law or for the purpose for which it was disclosed to the person, and the person notifies Business Associate of any instances of which it becomes aware in which the confidentiality of the information has been breached.
b) Business Associate may use PHI to provide Data Aggregation services to Covered Entity as permitted by 45 C.F.R. § 164.504(e)(2)(i)(B).
c) Business Associate may use and disclose PHI to report violations of law to appropriate state and federal authorities, to the extent permitted or required by 45 C.F.R. § 164.502(j)(1) and state law.
d) Business Associate may use PHI to create de-identified information in accordance with the requirements outlined in the Privacy Rule. Data that has been de-identified will no longer be subject to the terms of this Agreement.
Obligations of Covered Entity
Privacy Practices Covered Entity will notify Business Associate of any limitation(s) in its notice of privacy practices in accordance with 45 C.F.R. § 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of PHI. Covered Entity will provide such notice no later than fifteen (15) days prior to the effective date of the limitation.
Notice of Changes Regarding Individual Permission. Covered Entity will obtain any consent or authorization that may be required by the Privacy Rule, or applicable state law, prior to furnishing Business Associate with PHI. Covered Entity will notify Business Associate of any changes in, or revocation of, permission by an Individual to use or disclose PHI, to the extent that such changes may affect Business Associate’s use or disclosure of PHI. Covered Entity will provide such notice no later than fifteen (15) days prior to the effective date of the change.
Notice of Restrictions to Use or Disclosure of PHI. Covered Entity will notify Business Associate of any restriction to the use or disclosure of PHI that Covered Entity has agreed to in accordance with 45 C.F.R. § 164.522, to the extent that such restriction may affect Business Associate’s use or disclosure of PHI. Covered Entity will provide such notice no later than fifteen (15) days prior to the effective date of the restriction. If Business Associate reasonably believes that any restriction agreed to by Covered Entity pursuant to this Section may materially impair Business Associate’s ability to perform its obligations under the Underlying Agreement or this Agreement, the Parties will mutually agree upon any necessary modification of Business Associate’s obligations under such agreements.
Permissible Requests by Covered Entity. Covered Entity shall not request Business Associate to use or disclose PHI in any manner that would not be permissible under the Privacy Rule or the Security Rule if done by Covered Entity, except that Business Associate may use or disclose PHI as set forth herein.
Safeguards. Covered Entity shall use appropriate safeguards to maintain the confidentiality, privacy, and security of PHI in transmitting PHI to Business Associate pursuant to this Agreement.
Term and Termination
Term. This Agreement shall be effective upon the Effective Date and shall remain in effect until all of the PHI provided by Covered Entity to Business Associate, or created or received by Business Associate on behalf of Covered Entity, is destroyed or returned to Covered Entity, or, if it is infeasible to return or destroy PHI, protections are extended to such information, in accordance with Section 6.3(b).
Termination
a) Termination Resulting from the End of Services. This Agreement shall terminate in the event that the Underlying Agreement(s) under which Covered Entity discloses PHI to Business Associate terminates for any reason, or if the Services that give rise to the necessity of a business associate agreement terminate for any reason.
b) Termination for Cause. Upon either Party’s knowledge of a material breach of this Agreement by the other Party, the non-breaching Party must either:
Provide an opportunity for the breaching Party to cure the breach or end the violation within thirty (30) business days, and if the breaching Partydoes not cure the breach or end the violation within thirty (30) business days, the non-breaching Party shall terminate this Agreement; or
Immediately terminate this Agreement if cure is not possible.
Return or Destruction of PHI
a) Except as provided in paragraph (b) of this Section, upon termination of this Agreement for any reason, Business Associate shall return or destroy all PHI received from Covered Entity, or created or received by Business Associate on behalf of Covered Entity, that Business Associate still maintains in any form. This provision shall also apply to PHI that is in the possession of Subcontractors of Business Associate. Business Associate shall retain no copies of the PHI
b) In the event that Business Associate determines that returning or destroying the PHI is infeasible, Business Associate and its Subcontractors shall extend the protections of this Agreement to such PHI and limit further uses and disclosures of such PHI to those purposes that make the return or destruction infeasible, for so long as Business Associate and/or its Subcontractors maintain such PHI.
Miscellaneous
Regulatory References A reference in this Agreement to a section in the Privacy Rule, the Security Rule, HIPAA, or ARRA, or any other reference to a law or regulation, means the section or law as in effect as of the date of this Agreement or as subsequently amended.
Amendment. The Parties agree to take such action as is necessary to amend this Agreement from time to time to comply with the requirements of the Privacy Rule, the Security Rule, HIPAA, and ARRA.
Survival. The respective rights and obligations of Business Associate under Section 6.3 of this Agreement shall survive the termination of this Agreement.
Interpretation. Any ambiguity in this Agreement shall be resolved in favor of a meaning that permits compliance with the Privacy Rule, the Security Rule, HIPAA, and ARRA.
Relationship to Other Agreement Provisions. In the event that a provision of this Agreement is contrary to a provision of an Underlying Agreement or Agreements under which Covered Entity discloses PHI to Business Associate, the provision of this Agreement shall control. Otherwise, this Agreement shall be construed under, and in accordance with, the terms of such Underlying Agreement or Agreements between the Parties.
Prior Business Associate Agreements. Consistent with Section 7.5, this Agreement shall supersede any and all prior business associate agreement(s), or terms of other agreements addressing the privacy and security of PHI, between the Parties.
No Third Party Beneficiaries. Nothing express or implied in this Agreement is intended to confer, nor shall anything herein confer, upon any person other than Covered Entity or Business Associate any rights, remedies, obligations, or liabilities whatsoever.
Modification of Agreement. No alteration, amendment, or modification of the terms of this Agreement shall be valid or effective unless in writing and signed by Business Associate and Covered Entity.
Relationship of Parties. Business Associate, in furnishing services to Covered Entity, is acting as an independent contractor, and Business Associate has the sole right and obligation to supervise, manage, contract, direct, procure, perform, or cause to be performed, all work to be performed by Business Associate under this Agreement. Business Associate is not an agent of Covered Entity, and has no authority to represent Covered Entity as to any matters, except as expressly authorized in this Agreement.
Notices. Any notices required or permitted to be given under this Agreement by either Party shall be given in writing: (a) by personal delivery; (b) by electronic facsimile with confirmation sent by United States first class mail; (c) by bonded courier or nationally recognized overnight delivery service; or (d) by United States first class registered or certified mail, postage prepaid, return receipt requested, addressed to the Parties at the addresses set forth in the Order Form or to such other addresses as the Parties may request in writing by notice pursuant to this Section 7.10. Notices shall be deemed received on the earliest of personal delivery, upon the next business day after delivery by electronic facsimile with confirmation that the transmission was completed or upon receipt by any other method of delivery.
Governing Law. This Agreement shall be governed by and interpreted in accordance with the laws of the State of Delaware.
Counterparts. This Agreement may be executed in two (2) or more counterparts, each of which shall be deemed an original and when taken together shall constitute one agreement.