• Your Trusted 24 Hours Service Provider!
  • Talk To Expert : +1 720-807-4500
Open

Business Associate Agreement

Business Associate Agreement

This Business Associate Agreement is made and effective on (“EFFECTIVE DATE”).

BETWEEN:

easyTEK.technology, LLC (D.B.A. easyTEK.technology), a Limited Liability Corporation (LLC)(S-Corporation), organized and existing under the laws of the States of Colorado, with its corporate office located at:

  • 11052 Twenty Mile RD, APT 200,
    Parker, Douglas County, Colorado 80134-5101
    United States of America
    +1 720-807-4500 - Phone
    +1 720-817-3964 - Fax
    [email protected] - E-mail

AND:

"CLIENT"

WHEREAS This Business Associate Agreement (“Agreement”), effective “EFFECTIVE DATE”, is entered into by and between easyTEK.technology, LLC, (D.B.A., easyTEK.technology) (the “Business Associate”) and “CLIENT” (each a “Party” and collectively the “Parties”). The Parties have entered into an agreement (the “Underlying Agreement”) pursuant to which Business Associate is providing “Services” to the Covered Entity that requires the disclosure and use of Protected Health Information. Both Parties are committed to complying with the Privacy Rule and the Security Rule promulgated pursuant to the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”).

WHEREAS This Agreement sets forth the terms and conditions pursuant to which protected health information (PHI) or electronic protected health information (ePHI) that is created or received by and/or maintained by the Business Associate from or on behalf of the Covered Entity, will be handled between the Business Associate and the Covered Entity, and with third parties during the term of the Underlying Agreement and after its termination. All capitalized terms in this Agreement that are used as defined terms herein have the meanings ascribed to them in Section 1 below, unless otherwise noted or the context clearly requires otherwise.

NOW, THEREFORE, it is agreed as follows:

  • 1. Definitions

    • 1.1. Administrative Safeguards. “Administrative Safeguards” has the same meaning as the term “administrative safeguards” in 45 C.F.R. §164.304, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.2. Breach. "Breach" has the same meaning as the term “breach” in 45 C.F.R. § 164.402, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.3. Breach of System Security. “Breach of System Security” means unauthorized acquisition of computerized data, limited to the information created, received, maintained, and/or transmitted by Business Associate from or on behalf of Covered Entity, that compromises the security, confidentiality, or integrity of Sensitive Personal Information maintained by a person, including data that is encrypted if the person accessing the data has the key required to decrypt the data.

    • 1.4. Designated Record Set. “Designated Record Set” has the same meaning as the term “designated record set” in 45 C.F.R. § 164.501, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.5. Electronic Protected Health Information (ePHI). “Electronic Protected Health Information” has the same meaning as the term “electronic protected health information” in 45 C.F.R. § 160.103, maintained, and/or transmitted, but limited to the information created, received, maintained, and/or transmitted by Business Associate from or on behalf of Covered Entity, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.6. Health Care Operations. “Health Care Operations” has the same meaning as the term “health care operations” in 45 C.F.R. § 164.501, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.7. HITECH Act. “HITECH Act” means the Health Information and Technology for Economic and Clinical Health Act, as codified at 42 U.S.C. § 1790, which was adopted as part of the American Recovery and Reinvestment Act of 2009 on February 17, 2009.

    • 1.8. Individual. “Individual” has the same meaning as the term “individual” in 45 C.F.R. § 160.103, as such provision is currently drafted and as it is subsequently updated, amended, or revised, and will include a person who qualifies as a personal representative in accordance with 45 C.F.R. § 164.502(g).

    • 1.9. Physical Safeguards. “Physical Safeguards” has the same meaning as the term “physical safeguards” in 45 C.F.R. §164.304, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.10. HIPAA Compliance Officer. “HIPAA Compliance Officer” has the same meaning as the term “privacy officer” in 45 C.F.R. § 164.530(a)(1), as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.11. Privacy Rule. “Privacy Rule” means the Standards for Privacy of Individually Identifiable Health Information at 45 C.F.R. part 160 and part 164, subparts A and E.

    • 1.12. Protected Health Information. “Protected Health Information” or “PHI” has the same meaning as the term “protected health information” in 45 C.F.R. § 160.103, limited to the information created, received, maintained, and/or transmitted by Business Associate from or on behalf of Covered Entity, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.13. Required by Law. “Required by Law” has the same meaning as the term “required by law” in 45 C.F.R. § 164.103, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.14. Secretary. “Secretary” means the Secretary of the Department of Health and Human Services or her designee.

    • 1.15. Security Incident. "Security Incident" has the same meaning as the term “security incident” in 45 C.F.R. § 164.304, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.16. Security Rule. “Security Rule” means the Security Standards for the Protection of Electronic Protected Health Information at 45 C.F.R. parts 160, 162 and 164, subpart C.

    • 1.17. Sensitive Personal Information. “Sensitive Personal Information” means:

      • 1.17.1. an individual’s first name or first initial and last name in combination with any one or more of the following items, if the name and the items are not encrypted:

      • 1.17.1.1. social security number.

      • 1.17.1.2. driver’s license number.

      • 1.17.1.3. account number or credit or debit card number in combination with any required security code, access, code, or password that would permit access to an individual’s financial account; or (2) PHI.

    • 1.18. Technical Safeguards. “Technical Safeguards” has the same meaning as the term “technical safeguards” in 45 C.F.R. §164.304, as such provision is currently drafted and as it is subsequently updated, amended, or revised.

    • 1.19. Unsecured PHI. "Unsecured PHI" means PHI that is not secured by a technology standard that;

      • 1.19.1. renders PHI unusable, unreadable, or indecipherable to unauthorized individuals, and

      • 1.19.2. is developed or endorsed by a standards organization that is accredited by the American National Standards Institute.

  • 2. Permitted Uses and Disclosures of Protected Health Information

    • 2.1. Services. Pursuant to the Services Agreement, Business Associate provides Services for the Covered Entity that involve the creation, receipt, maintenance, and/or transmission of Protected Health Information. Except as otherwise specified herein, the Business Associate may make any and all uses of Protected Health Information necessary to perform its obligations under the Services Agreement. All other uses not authorized by this Agreement are prohibited. Moreover, Business Associate may disclose Protected Health Information for the purposes authorized by this Agreement only.

      • 2.1.1. to its employees, subcontractors, and agents, in accordance with Sections 3.1(f) and 3.1(l);

      • 2.1.2. as directed by the Covered Entity; or

      • 2.1.3. as otherwise permitted by the terms of this Agreement including, but not limited to, Section 2.2.2. below. Even when PHI has been de-identified in accordance with the requirements of 45 C.F.R. § 164.514(b), Business Associate may not disclose de-identified data for purposes unrelated to performance of the Services without prior approval by the Covered Entity.

    • 2.2. Business Activities of the Business Associate. Unless otherwise limited herein, the Business Associate may:

      • 2.2.1. Use the Protected Health Information in its possession for its proper management and administration and to fulfill any present or future legal responsibilities of the Business Associate provided that such uses are permitted under state and federal confidentiality laws.

      • 2.2.2. disclose the Protected Health Information in its possession to third parties for the purpose of its proper management and administration or to fulfill any present or future legal responsibilities of the Business Associate, provided that the Business Associate represents to the Covered Entity, in writing, that:

        • 2.2.2.1. the disclosures are Required by Law; or

        • 2.2.2.2. the Business Associate has entered into a Business Associate Agreement containing substantially similar (or more stringent) terms as this Agreement with any third party that creates, receives, maintains, or transmits PHI on behalf of the Business Associate.

      • 2.2.3. use and/or disclose Protected Health Information as permitted under 45 C.F.R. § 164.512 except that uses or disclosures for research are not permitted without prior approval by the Covered Entity.

    • 2.3. Additional Activities of Business Associate. In addition to using the Protected Health Information to perform the Services set forth in Section 2.1 of this Agreement, Business Associate may:

      • 2.3.1. aggregates the Protected Health Information in its possession with the Protected Health Information of other covered entities that the Business Associate has in its possession through its capacity as a business associate to those other covered entities provided that the purpose of such aggregation is to provide the Covered Entity with data analyses relating to the Health Care Operations of the Covered Entity. Under no circumstances may the Business Associate disclose Protected Health Information of one covered entity to another covered entity absent the explicit authorization of the covered entity.

      • 2.3.2. de-identify any and all Protected Health Information provided that the deidentification conforms to the requirements of 45 C.F.R. § 164.514(b), and further provided that the Covered Entity maintains the documentation required by 45 C.F.R. § 164.514(b) which may be in the form of a written assurance from the Business Associate. Pursuant to 45 C.F.R. § 164.502(d)(2), de-identified information does not constitute Protected Health Information and is not subject to the terms of this Agreement.

  • 3. Responsibilities of the Parties with Respect to Protected Health Information

    • 3.1. Responsibilities of the Business Associate. With regard to its use and/or disclosure of Protected Health Information, the Business Associate will:

      • 3.1.1. comply with the portions of the HIPAA Privacy Rule and Security Rule applicable to Business Associates.

      • 3.1.2. use and/or disclose the Protected Health Information only as permitted or required by this Agreement or as Required by Law and to use appropriate safeguards to prevent impermissible use or disclosure of PHI.

      • 3.1.3. report to the designated HIPAA Compliance Officer of the Covered Entity, in writing, any use and/or disclosure of the Protected Health Information that is not permitted or required by this Agreement of which Business Associate becomes aware within three (3) business days of the Business Associate’s discovery of such unauthorized use and/or disclosure.

      • 3.1.4. mitigate, to the greatest extent possible, any deleterious effects from any improper use and/or disclosure of Protected Health Information or other Sensitive Personal Information of which the Business Associate becomes aware and/or reports to the Covered Entity.

      • 3.1.5. implement Administrative, Physical, and Technical Safeguards consistent with industry standards that reasonably and appropriately maintain the security of, prevent unauthorized use and/or disclosure of, and protect the confidentiality, integrity, and availability of any Electronic Protected Health Information or other Sensitive Personal Information it creates, receives, maintains, or transmits on behalf of Covered Entity.

      • 3.1.6. At a minimum, Business Associate shall employ Safeguards that are compliant with 45 C.F.R. Part 164, Subpart C and the National Institute of Standards and Technology (“NIST”) guidelines.

      • 3.1.7. require all of its subcontractors and agents that create, receive, maintain, or transmit Protected Health Information under this Agreement to agree, in the form of a Business Associate Agreement that meets the requirements at 45 C.F.R. § 164.314(a), to adhere to substantially similar or more stringent restrictions and conditions on the use and/or disclosure of Protected Health Information that apply to the Business Associate pursuant to Section 3 of this Agreement.

      • 3.1.8. ensure that any agent, including a subcontractor, agrees to implement reasonable and appropriate safeguards to protect the confidentiality, integrity, and availability of the Electronic Protected Health Information that it creates, receives, maintains, or transmits on behalf of the Covered Entity.

      • 3.1.9. make available all records, books, agreements, policies, and procedures relating to the use and/or disclosure of Protected Health Information to the Secretary, in the time and manner designated by the Secretary, for purposes of the Secretary’s determination that the Covered Entity and Business Associate have complied with the Privacy Rule, subject to attorney-client and other applicable legal privileges.

      • 3.1.10. within fourteen (14) days of receiving a written request from the Covered Entity, provide satisfactory assurances to the Covered Entity for purposes of proving Business Associate’s compliance relating to the use and/or disclosure of Protected Health Information and the terms of this Agreement.

      • 3.1.11. within fifteen (15) days of receiving a written request from the Covered Entity, provide to the Covered Entity such information as is requested by the Covered Entity to permit the Covered Entity to respond to a request by an Individual for an accounting of the disclosures of the Individual's Protected Health Information in accordance with 45 C.F.R. § 164.528.

      • 3.1.12. to the extent that Business Associate is obligated to carry out one or more of Covered Entity’s obligations under the Privacy Rule, comply with the Privacy Rule requirements that apply to the Covered Entity in the performance of such obligations.

      • 3.1.13. subject to Section 5.4 below, return to the Covered Entity or destroy, within sixty (60) days of the termination of this Agreement, the Protected Health Information in its possession and retain no copies.

      • 3.1.14. disclose to its subcontractors, agents or other third parties only the minimum Protected Health Information necessary to perform or fulfill a specific function required or permitted under the Services Agreement or this Agreement.

      • 3.1.15. report to the designated HIPAA Compliance Officer of the Covered Entity, in writing, any Security Incident or unintentional use or disclosure of Unsecured PHI, identified internal/external breach of data, or disaster occurrence of which Business Associate becomes aware within three (3) business days of the Business Associate’s discovery of such incident. The Business Associate must include the following information, to the extent known, when reporting a breach:

        • 3.1.15.1. Identification of the individual whose Unsecured PHI has been or is reasonably believed by the Business Associate to have been, accessed, acquired, used, or disclosed during a breach.

        • 3.1.15.2. Circumstances of the breach.

        • 3.1.15.3. Date of the breach.

        • 3.1.15.4. Date of the discovery.

        • 3.1.15.5. Type of PHI involved (such as full name, Social Security number, date of birth, home address, account number, or medical record number); and

        • 3.1.15.6. Any other additional information the Covered Entity requests. This Section 3.1 will survive the termination of this Agreement solely with respect to the Protected Health Information that Business Associate obtains in accordance with Section 5.4 below because it is not feasible to return or destroy such Protected Health Information.

      • 3.2. Responsibilities of the Covered Entity. With regard to the use and/or disclosure of Protected Health Information by the Covered Entity to the Business Associate or the use and/or disclosure of Protected Health Information by the Business Associate, the Covered Entity will:

        • 3.2.1. provide Business Associate with a copy of its notice of privacy practices (the “Notice”) that the Covered Entity provides to Individuals pursuant to 45 C.F.R. §164.520.notify the Business Associate, in writing, of any changes in, or revocation of, the consent or authorization provided to the Covered Entity by Individuals pursuant to 45 C.F.R. §164.506 or §164.508, to the extent such changes may affect Business Associate's use or disclosure of Protected Health Information.

        • 3.2.2. notify the Business Associate, in writing and in a timely manner, of any arrangements permitted or required of the Covered Entity under 45 C.F.R. parts 160 and 164 that may impact in any manner the use and/or disclosure of Protected Health Information by the Business Associate under this Agreement, including, but not limited to, restrictions on use and/or disclosure of Protected Health Information as provided for in 45 C.F.R. § 164.522 agreed to by the Covered Entity, to the extent such restrictions may affect Business Associate's use or disclosure of Protected Health Information.

        • 3.2.3. Rule if done by the Covered Entity.

  • 4. Additional Responsibilities of the Parties with Respect to Protected Health Information

    • 4.1. Responsibilities of the Business Associate with Respect to Handling of Designated Record Set. In the event that the Parties mutually agree in writing that the Protected Health Information constitutes a Designated Record Set, the Business Associate will:

      • 4.1.1. within fifteen (15) days of receipt of a written request by the Covered Entity, provide access to the Protected Health Information to the Covered Entity or the Individual to whom such Protected Health Information relates or his or her authorized representative in order to meet a request by such Individual under 45 C.F.R. § 164.524.

      • 4.1.2. within fifteen (15) days of receipt of a written request by Covered Entity, make any amendment(s) to the Protected Health Information that the Covered Entity directs pursuant to 45 C.F.R. § 164.526. Provided, however, that the Covered Entity makes the determination that the amendment(s) are necessary because the Protected Health Information that is the subject of the amendment(s) has been, or could foreseeably be, relied upon by the Business Associate or others to the detriment of the Individual who is the subject of the Protected Health Information to be amended.

    • 4.2. Responsibilities of the Covered Entity with Respect to the Handling of the Designated Record Set. In the event that the Parties mutually agree in writing that the Protected Health Information constitutes a Designated Record Set, the Covered Entity will:

      • 4.2.1. notify the Business Associate, in writing, of any Protected Health Information that Covered Entity seeks to make available to an Individual pursuant to 45 C.F.R. § 164.524 and the time, manner and form in which the Business Associate will provide such access.

      • 4.2.2. notify the Business Associate, in writing, of any amendment(s) to the Protected Health Information in the possession of the Business Associate that the Business Associate will be required to make and inform the Business Associate of the time, form and manner in which such amendment(s) will be made.

    • 4.3. HITECH Act Obligations. Business Associate acknowledges that:

      • 4.3.1. Sections 164.306, 164.308, 164.310, 164.312, 164.314 and 164.316 of title 45 of the Code of Federal Regulations (regarding administrative, physical, and technical security standards) apply to Business Associate in the same manner in which such sections apply to Covered Entity. The provisions of the HITECH Act that impose additional requirements and standards on Covered Entities with respect to health information security are also applicable to Business Associate and are hereby incorporated into the Agreement.

      • 4.3.2. The HITECH Act requires it to use or disclose PHI only if such use or disclosure is in compliance with all applicable requirements of Section 164.504(e) of the Privacy Rule. The additional requirements of the HITECH Act impose requirements and standards on Covered Entities with respect to privacy are also applicable to Business Associate and are hereby incorporated into the Agreement.

    • 4.4. Survival. Sections 4.1 and 4.2 of this Agreement will survive the termination of this Agreement, provided that Covered Entity determines that the Protected Health Information being retained pursuant to Section 5.4 below constitutes a Designated Record Set.

  • 5. Term and Termination

    • 5.1. Term. This Agreement will become effective on June 1, 2023 and will continue in effect until all obligations of the Parties have been met, unless terminated as provided in this Section 5. In addition, certain provisions and requirements of this Agreement will survive its expiration or other termination in accordance with Section 5.4 herein.

    • 5.2. Termination by the Covered Entity. As provided for under 45 C.F.R. § 164.504(e)(2)(iii), the Covered Entity may immediately terminate this Agreement and any Services Agreement if the Covered Entity makes the determination that the Business Associate has breached a material term of this Agreement. Alternatively, the Covered Entity may choose to:

      • 5.2.1. provide the Business Associate with thirty (30) days written notice of the existence of an alleged material breach; and

      • 5.2.2. afford the Business Associate an opportunity to cure said alleged material breach upon mutually agreeable terms. Nonetheless, in the event that mutually agreeable terms cannot be achieved within thirty (30) days, Business Associate must cure said breach within thirty (30) days. Failure to cure in the manner set forth in this paragraph is grounds for the immediate termination of this Agreement and any Services Agreement. Nothing contained in this Section 5.2 will be deemed to require the Covered Entity to terminate this Agreement and the Services Agreement upon breach by Business Associate of a material term of this Agreement if termination is not feasible, and the Covered Entity will have the right to report any such breach to the Secretary as provided for under 45 C.F.R. § 164.504(e)(1)(ii).

    • 5.3. Termination by Business Associate. If the Business Associate makes the determination that a material condition of performance has changed under any Services Agreement or this Agreement, or that the Covered Entity has breached a material term of this Agreement, Business Associate may provide thirty (30) days written notice of its intention to terminate this Agreement and the Services Agreement. Business Associate agrees, however, to in good faith cooperate with Covered Entity to find a mutually satisfactory resolution to the matter prior to terminating and further agrees that, notwithstanding this provision, it will not terminate this Agreement so long as any Services Agreement is in effect.

    • 5.4. Effect of Termination. Upon termination of a Services Agreement, Business Associate will return or destroy all Protected Health Information pursuant to 45 C.F.R. § 164.504(e) (2)(ii)(I), if it is feasible to do so. Prior to doing so, the Business Associate will recover any Protected Health Information in the possession of its subcontractors or agents. If it is not feasible for the Business Associate to return or destroy said Protected Health Information, the Business Associate will notify the Covered Entity in writing. The notification will include:

      • 5.4.1. a statement that the Business Associate has determined that it is not feasible to return or destroy the Protected Health Information in its possession; and

      • 5.4.2. the specific reasons for such a determination. Business Associate will extend any and all protections, limitations and restrictions contained in this Agreement to the Business Associate’s use and/or disclosure of any Protected Health Information retained after the termination of this Agreement and limit any further uses and/or this Agreement, and to limit any further uses and/or disclosures to the purposes that make the return or destruction of the Protected Health Information infeasible. Business Associate obligations under this Section 5.4 will not apply to Protected Health Information that is the subject of other agreements between Covered Entity and Business Associate to the extent those other agreements survive the termination, and Business Associate may retain any Protected Health Information necessary to Business Associate’s services under any other agreements with Covered Entity.

  • 6. Acknowledgements

    • 6.1 Each Party acknowledges and agrees that:

      • 6.1.1. it is duly organized, validly existing, and in good standing under the laws of the jurisdiction in which it is organized or licensed, it has the full power to enter into this Agreement and to perform its obligations hereunder, and that the performance by it of its obligations under this Agreement have been duly authorized by all necessary corporate or other actions and will not violate any provision of any license, corporate charter or by laws.

      • 6.1.2. neither the execution of this Agreement, nor its performance hereunder, will directly or indirectly violate or interfere with the terms of another agreement to which it is a party, or give any governmental entity the right to suspend, terminate, or modify any of its governmental authorizations or assets required for its performance hereunder. Each Party certifies to the other Party that it will not enter into any agreement the execution and/or performance of which would violate or interfere with this Agreement.

      • 6.1.3. it is not currently the subject of a voluntary or involuntary petition in bankruptcy, does not currently contemplate filing any such voluntary petition, and is not aware of any claim for the filing of an involuntary petition.

      • 6.1.4. all of its employees, agents, representatives and members of its workforce, whose services may be used to fulfill obligations under this Agreement are or will be appropriately informed of the terms of this Agreement and are under legal obligation to each Party, respectively, by contract or otherwise, sufficient to enable each Party to fully comply with all provisions of this Agreement including, without limitation, the requirement that modifications or limitations to which the Covered Entity has agreed to adhere regarding the use and disclosure of Protected Health Information of any Individual that materially affect and/or limit the uses and disclosures that are otherwise permitted under the Privacy Rule will be communicated to the Business Associate, in writing, and in a timely fashion.

      • 6.1.5. it will reasonably cooperate with the other Party in the performance of their mutual obligations under this Agreement and their respective obligations under HIPAA.

  • 7. Indemnification

    • 7.1. The Parties will indemnify, defend, and hold harmless each other and each other’s respective employees, directors, officers, subcontractors, agents or other members of its workforce, each of the foregoing hereinafter referred to as “indemnified party,” against all actual and direct loss suffered by the indemnified party and all liability to third parties arising from or in connection with any breach of this Agreement or of any warranty here under or from any negligence or wrongful acts or omissions, including failure to perform its obligations under the Privacy Rule, the Security Rule, or the HITECH Act by the indemnifying party or its employees, directors, officers, subcontractors, agents, or other members of its workforce. This indemnification provision is enforceable against Covered Entity only to the extent authorized under the constitution.

  • 8. Miscellaneous

    • 8.1. Business Associate. For purposes of this Agreement, Business Associate will include the named Business Associate herein. However, if the Business Associate is otherwise a covered entity under the Privacy Rule, that entity may appropriately designate a healthcare component of the entity, pursuant to 45 C.F.R. § 164.504(a), as the Business Associate for purposes of this Agreement.

    • 8.2. Amendments; Waiver. This Agreement may not be modified, nor will any provision hereof be waived or amended, except in a writing duly signed by authorized representatives of the Parties. The Parties agree to take such action as is necessary to amend this Agreement from time to time as is necessary for Covered Entity to comply with the requirements of the Privacy Rule, the Security Rule, HIPAA, and the HITECH Act. A waiver with respect to one event will not be construed as continuing, or as a bar to or waiver of any right or remedy as to subsequent events.

    • 8.3. No Third-Party Beneficiaries. Nothing expressed or implied in this Agreement is intended to confer, nor will anything herein confer, upon any person other than the Parties and the respective successors or assigns of the Parties, any rights, remedies, obligations, or liabilities whatsoever.

    • 8.4. Notices. Any notices to be given under this Agreement will be made via U.S. Mail or express courier to such Party’s address given below, and/or (other than for the delivery of fees) via facsimile to the facsimile telephone numbers listed below. If to Business Associate:

      • To:
      • easyTEK.technology, LLC (D.B.A. easyTEK.technology)
        ATTN: Chad S. Clark (Managing Member)
        11052 Twenty Mile RD, APT 200,
        Parker, Douglas County, Colorado, 80134-5101
        United States of America
        +1 720-807-4500 - Phone
        +1 720-817-3964 - Fax
        [email protected] – E-mail

      • 8.4.1 Each Party may change its address and that of its representative for notice by the giving of notice thereof in the manner herein above provided.

    • 8.5. Counterparts; Facsimiles. This Agreement may be executed in any number of counterparts, each of which will be deemed an original. Facsimile copies hereof will be deemed to be originals.

    • 8.6. Disputes. If any controversy, dispute, or claim arises between the Parties with respect to this Agreement, the Parties will make good faith efforts to resolve such matters informally.

    • 8.7. Interpretation. Any ambiguity in this Agreement will be resolved in favor of a meaning that permits Covered Entity to comply with the Privacy Rule and the Security Rule.
Hi, How Can We Help You?