Data Processing Agreement
This Data Processing Agreement (the “Agreement”) between Provider (sometimes referred to as “Provider,” “we,” “us,” or “our”), and the Client found on the applicable Order (sometimes referred to as “you,” or “your,”) and, together with the Order, Master Services Agreement, Schedule of Services, and other relevant Service Attachments, forms the Agreement between the parties the terms to which the parties agree to be bound.
The parties agree as follows:
1. Health Insurance Portability and Accountability Act (“HIPAA”) Data Processing.
This Agreement documents the safeguards imposed upon the parties to protect health information that is subject to the Health Insurance Portability and Accountability Act (“HIPAA”). If HIPAA is identified in the Order, and if Provider is engaged as a “Business Associate” under HIPAA, then this Agreement shall apply to Provider’s activities as a Business Associate. If HIPAA applies to Provider’s activities as a Business Associate, in order to demonstrate the parties’ compliance with HIPAA, this Agreement applies to each agreement between Provider or any of Provider’s Affiliates and Client or any of Client’s Affiliates under which Provider engages protected health information as part of its performance.
- DEFINITIONS
The following terms used in this Agreement have the same meanings as those terms in the HIPAA Rules: Breach, Data Aggregation, Designated Record Set, Disclosure, Health Care Operations, Individual, Minimum Necessary, Notice of Privacy Practices, Protected Health Information, Required By Law, Secretary, Security Incident, Subcontractor, Unsecured Protected Health Information, and Use.
Specific Definitions:
- Business Associate. “Business Associate” generally has the same meaning as the term “business associate” at 45 CFR 160.103, and in reference to the party to this Agreement, means Provider.
- Covered Entity. “Covered Entity” generally has the same meaning as the term “covered entity” at 45 CFR 160.103, and in reference to the party to this Agreement, means Client.
- HIPAA Rules. “HIPAA Rules” means the Privacy, Security, Breach Notification, and Enforcement Rules at 45 CFR Part 160 and Part 164.
- OBLIGATIONS OF BUSINESS ASSOCIATE
Business Associate agrees to:
- Not use or disclose protected health information other than as permitted or required by the Agreement or as required by law;
- Use appropriate safeguards, and comply with Subpart C of 45 CFR Part 164 with respect to electronic protected health information, to prevent use or disclosure of protected health information other than as provided for by the Agreement;
- Report to covered entity any use or disclosure of protected health information not provided for by the Agreement of which it becomes aware, including breaches of unsecured protected health information as required at 45 CFR 164.410, and any security incident of which it becomes aware;
- In accordance with 45 CFR 164.502(e) (1) (ii) and 164.308(b)(2), if applicable, ensure that any subcontractors that create, receive, maintain, or transmit protected health information on behalf of the Business Associate agree to the same restrictions, conditions, and requirements that apply to the Business Associate with respect to such information;
- Make available protected health information in a designated record set to the covered entity as necessary to satisfy covered entity’s obligations under 45 CFR 164.524;
- Make any amendment(s) to protected health information in a designated record set as directed or agreed to by the covered entity pursuant to 45 CFR 164.526, or take other measures as necessary to satisfy covered entity’s obligations under 45 CFR 164.526;
- To the extent required by regulators, maintain and make available the information required to provide an accounting of disclosures to the covered entity as necessary to satisfy covered entity’s obligations under 45 CFR 164.528;
- To the extent the Business Associate is to carry out one or more of covered entity’s obligation(s) under Subpart E of 45 CFR Part 164, comply with the requirements of Subpart E that apply to the covered entity in the performance of such obligation(s); and
- To the extent required by regulators, make its internal practices, books, and records available to the Secretary for purposes of determining compliance with the HIPAA Rules.
- PERMITTED USES AND DISCLOSURES
- Business Associate may only use or disclose protected health information as necessary to perform the services set forth in the Master Services Agreement. The Business Associate is authorized to use protected health information to de-identify the information in accordance with 45 CFR 164.514(a)-(c). The parties also may wish to specify the manner in which the Business Associate will de-identify the information and the permitted uses and disclosures by the Business Associate of the de-identified information.
- Business Associate may use or disclose protected health information as required by law.
- Business Associate agrees to make uses and disclosures and requests for protected health information consistent with covered entity’s minimum necessary policies and procedures.
- Business Associate may not use or disclose protected health information in a manner that would violate Subpart E of 45 CFR Part 164 if done by covered entity.
- Business Associate may disclose protected health information for the proper management and administration of Business Associate or to carry out the legal responsibilities of the Business Associate, provided the disclosures are required by law, or Business Associate obtains reasonable assurances from the person to whom the information is disclosed that the information will remain confidential and used or further disclosed only as required by law or for the purposes for which it was disclosed to the person, and the person notifies Business Associate of any instances of which it is aware in which the confidentiality of the information has been breached.
- Business Associate may provide data aggregation services relating to the health care operations of the covered entity.
- PRIVACY PRACTICES AND RESTRICTIONS
- Covered entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of covered entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.
- Covered entity shall notify Business Associate of any changes in, or revocation of, the permission by an individual to use or disclose his or her protected health information, to the extent that such changes may affect Business Associate’s use or disclosure of protected health information.
- Covered entity shall notify Business Associate of any restriction on the use or disclosure of protected health information that covered entity has agreed to or is required to abide by under 45 CFR 164.522, to the extent that such restriction may affect Business Associate’s use or disclosure of protected health information.
- PERMISSIBLE REQUESTS
Covered entity shall not request Business Associate to use or disclose protected health information in any manner that would not be permissible under Subpart E of 45 CFR Part 164 if done by covered entity.
2. Gramm-Leach-Bliley Act (“GLBA”) Data Processing.
This section documents the safeguard standards imposed to protect Client financial information subject to the Gramm-Leach Bliley Act (“GLBA”). If GLBA is identified in the Order, and if Provider’s services constitute processing of financial information governed by GLBA, these provisions shall apply.
- DEFINITIONS. All capitalized terms in this Addendum which are not otherwise defined in this Addendum or in the MSA have the meaning set forth in Title V of the Gramm-Leach-Bliley Act (P. L. 106-102; 15 USC §6801 et seq.) and the regulations issued pursuant thereto by the Financial Institution’s Functional Regulator.
- RECEIPT OF INFORMATION. To perform its duties under the Agreement, Provider is authorized and permitted to receive, hold and, to the extent necessary, review Nonpublic Personal Information of Client in order to provide services for Client at Client’s direction as provided under the MSA. Provider may further use and disclose Nonpublic Personal Information for the proper management and administration of the business of Provider.
- OBLIGATIONS OF SERVICE PROVIDER. Provider will take reasonable steps to:
- Implement and maintain a written comprehensive information security program containing administrative, technical and physical safeguards for the security and protection of Nonpublic Personal Information and further containing each of the elements set forth in § 314.4 of the Gramm Leach Bliley Standards for Safeguarding Client Information (16 C.F.R. § 314) and the Red Flag Rules issued by the Federal Trade Commission;
- Ensure the security and confidentiality of Nonpublic Personal Information received from Client;
- Protect against any anticipated threats or hazards to the security or integrity of Nonpublic Personal Information;
- Protect against unauthorized access to or use of such information that could result in harm or inconvenience to Client;
- Ensure the proper disposal of Nonpublic Personal Information, as set forth in the MSA or in Service Attachments signed under the MSA; and
- Notify Client of any loss or breach of the security or Confidentiality of Client’s Nonpublic Personal Information.
- PERMITTED USES AND DISCLOSURES. Provider may disclose the information received by it under the Agreement only if the disclosure is required by law.
- PERMISSIBLE REQUESTS. Client shall not request Provider to use or disclose Nonpublic Personal Information in any manner that would not be permissible Title V of the Gramm-Leach-Bliley Act (P. L. 106-102; 15 USC §6801 et seq.) and the regulations issued pursuant thereto if done by Client.
3. Department of Defense Standards for Controlled Unclassified Information (“CUI”).
This section documents the safeguards imposed to protect CUI subject to the DoD and CMMC’s standards. If CUI or CMMC are identified in the Order, and to the extent Provider’s services involve CUI subject to DoD or CMMC standards or regulations, these provisions shall apply.
4. California Consumer and Privacy Act.
This section documents the safeguard standards imposed to protect Client information subject to the California Consumer and Privacy Act (“CCPA”). If CCPA is identified in the Order, and to the extent Provider’s services constitute processing of personal information governed by CCPA, these provisions shall apply.
5. Colorado Privacy Act.
This section documents the safeguard standards imposed to protect Client information subject to the Colorado Privacy Act (6-1-1301) (“CPA”). If CPA is identified in the Order, and to the extent Provider’s services constitute processing of personal information governed by CPA, these provisions shall apply.
6. Connecticut Privacy Act.
This section documents the safeguard standards imposed to protect Client information subject to the Connecticut SB 12-2 (“Conn Act”). If Conn Act is identified in the Order, and to the extent Provider’s services constitute processing of personal information governed by Conn Act, these provisions shall apply.
7. New York SHIELD
Provider maintains a comprehensive, written information security program that contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope and type of Provider’s business; (b) the amount of resources available to Provider; (c) the type of information that Provider will store; and (d) the need for security and confidentiality of such information. If SHIELD is identified in the Order and to the extent Provider’s services constitute processing of data under SHIELD, these provisions will apply.
8. Virginia Privacy Act.
This section documents the safeguard standards imposed to protect Client information subject to the Code of Virginia Section 59.1-579 (“VPA”). If VPA is identified in the Order, and to the extent Provider’s services constitute processing of personal information governed by VPA, these provisions shall apply.
9. General Data Protection Regulation for the EU and UK (“GDPR”)
The General Data Protection Regulation (“GDPR”) for the EU and UK imposes specific obligations on “Processors”, “Controllers”, and others with regard to their vendor relationships. If GDPR is identified in the Order, and to the extent Provider’s services constitute processing of personal information governed by GDPR, these provisions shall apply.

