BIG Language Solutions – April 30, 2024
This Privacy Policy (“Privacy Policy”) is a legal agreement between you or an entity that you are representing (“you,” “your”) and Big Language Solutions, a Delaware corporation (”BIG Language,” “we,” “our” or “us”). This Privacy Policy governs your use of the products and services made available to you directly or indirectly by us and/or by any of our Corporate Entities (as defined below), including websites (including our website available at biglanguage.com.com (the “BIG Language Website”) and other websites made available by any of our other Corporate Entities and that are refenced from the BIG Language Website or that reference this Agreement) (all such websites, collectively, the “Website”), services and functionality providing or facilitating translation of documents or any other data, software, hardware, mobile applications, cloud-based software, systems or services, application programing interfaces (APIs), artificial intelligence (AI) features and functionality, any other technology, products, services and/or content made available by us or by any of our Corporate Entities (collectively, the “Services”). . The Terms and Conditions agreement (the “Agreement”) available at our Website governs your use of the Services, and in connection with that Agreement and as a condition to using the Services, you agree to accept and be legally bound by this Privacy Policy. If you are accessing the Services on behalf of an entity (for example, a company, non-profit entity, university, or other business or organization), you represent to us that you have authority to bind that entity to this Privacy Policy, and that entity accepts this Privacy Policy, and the term “you” or “your” will apply to such entity. This Privacy Policy applies to all of our Services. By using any of the Services, you agree to this Privacy Policy and to any other agreements or policies referenced within this Privacy Policy. If you do not agree to this Privacy Policy, you are not allowed to use the Services.
Effective [03/25/2024]
Effective Date: January 1, 2020
Last Reviewed on: January 31, 2020
This Privacy Notice for California Residents supplements the information contained in Big Language Solutions’ Privacy Policy and applies solely to all visitors, users, and others who reside in the State of California (“consumers” or “you”). We adopt this notice to comply with the California Consumer Privacy Act of 2018 (CCPA) and any terms defined in the CCPA have the same meaning when used in this notice.
Information We Collect
Our website collects information that identifies, relates to, describes, references, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or device (“personal information“). In particular, Big Language Solutions’ Website has collected the following categories of personal information from its consumers within the last twelve (12) months:
Personal information does not include:
BIG IP obtains the categories of personal information listed above from the following categories of sources:
Use of Personal Information
We may use or disclose the personal information we collect for one or more of the following business purposes:
Big Language Solutions will not collect additional categories of personal information or use the personal information we collected for materially different, unrelated, or incompatible purposes without providing you notice.
Sharing Personal Information
Big Language Solutions may disclose your personal information to a third party for a business purpose. When we disclose personal information for a business purpose, we enter a contract that describes the purpose and requires the recipient to both keep that personal information confidential and not use it for any purpose except performing the contract.
We share your personal information with the following categories of third parties:
Disclosures of Personal Information for a Business Purpose
In the preceding twelve (12) months, Company has disclosed the following categories of personal information for a business purpose:
Category A: Identifiers.
Category B: California Customer Records personal information categories.
Category C: Protected classification characteristics under California or federal law.
Category D: Commercial information.
Category F: Internet or other similar network activity.
Category H: Sensory data.
Category K: Inferences drawn from other personal information.
We disclose your personal information for a business purpose to the following categories of third parties:
Sales of Personal Information
In the preceding twelve (12) months, Company has not sold personal information.
Your Rights and Choices
The CCPA provides consumers (California residents) with specific rights regarding their personal information. This section describes your CCPA rights and explains how to exercise those rights.
Access to Specific Information and Data Portability Rights
You have the right to request that BIG IP disclose certain information to you about our collection and use of your personal information over the past 12 months. Once we receive and confirm your verifiable consumer request (see Exercising Access, Data Portability, and Deletion Rights), we will disclose to you:
Deletion Request Rights
You have the right to request that Big Language Solutions delete any of your personal information that we collected from you and retained, subject to certain exceptions. Once we receive and confirm your verifiable consumer request (see Exercising Access, Data Portability, and Deletion Rights), we will delete (and direct our service providers to delete) your personal information from our records, unless an exception applies.
We may deny your deletion request if retaining the information is necessary for us or our service provider(s) to:
Exercising Access, Data Portability, and Deletion Rights
To exercise the access, data portability, and deletion rights described above, please submit a verifiable consumer request to us by either:
Only you, or a person registered with the California Secretary of State that you authorize to act on your behalf, may make a verifiable consumer request related to your personal information. You may also make a verifiable consumer request on behalf of your minor child.
You may only make a verifiable consumer request for access or data portability twice within a 12-month period. The verifiable consumer request must:
We cannot respond to your request or provide you with personal information if we cannot verify your identity or authority to make the request and confirm the personal information relates to you.
Making a verifiable consumer request does not require you to create an account with us.
We will only use personal information provided in a verifiable consumer request to verify the requestor’s identity or authority to make the request.
For instructions on exercising sale opt-out rights, see Personal Information Sales Opt-Out and Opt-In Rights.
Response Timing and Format
We endeavor to respond to a verifiable consumer request within forty-five (45) days of its receipt. If we require more time (up to 90 days), we will inform you of the reason and extension period in writing.
If you have an account with us, we will deliver our written response to that account. If you do not have an account with us, we will deliver our written response by mail or electronically, at your option.
Any disclosures we provide will only cover the 12-month period preceding the verifiable consumer request’s receipt. The response we provide will also explain the reasons we cannot comply with a request, if applicable. For data portability requests, we will select a format to provide your personal information that is readily useable and should allow you to transmit the information from one entity to another entity without hindrance.
We do not charge a fee to process or respond to your verifiable consumer request unless it is excessive, repetitive, or manifestly unfounded. If we determine that the request warrants a fee, we will tell you why we made that decision and provide you with a cost estimate before completing your request.
Non-Discrimination
We will not discriminate against you for exercising any of your CCPA rights. Unless permitted by the CCPA, we will not:
However, we may offer you certain financial incentives permitted by the CCPA that can result in different prices, rates, or quality levels. Any CCPA-permitted financial incentive we offer will reasonably relate to your personal information’s value and contain written terms that describe the program’s material aspects. Participation in a financial incentive program requires your prior opt-in consent, which you may revoke at any time. We currently do not provide financial incentives.
Other California Privacy Rights
California’s “Shine the Light” law (Civil Code Section § 1798.83) permits users of our website that are California residents to request certain information regarding our disclosure of personal information to third parties for their direct marketing purposes. To make such a request, please send an email to [email protected] or write us at: Big Language Solutions, 3424 Peachtree Rd, NE, Suite 2060, Atlanta, GA 30326
Changes to Our Privacy Notice
Big Language Solutions reserves the right to amend this privacy notice at our discretion and at any time. When we make changes to this privacy notice, we will post the updated notice on the website and update the notice’s effective date. Your continued use of our website following the posting of changes constitutes your acceptance of such changes.
Contact Information
If you have any questions or comments about this notice, the ways in which Big Language Solutions collects and uses your information described below and in the Privacy Policy, your choices and rights regarding such use, or wish to exercise your rights under California law, please do not hesitate to contact us at:
Phone: 800-642-6290
Website: https://biglanguage.com#contact/
Email: [email protected]
Postal Address:
Big Language Solutions
Attn: Compliance
3424 Peachtree Rd, NE
Suite 2060
Atlanta, GA 30326
The European Union (E.U.) has introduced the General Data Protection Regulation 2016/679 (“GDPR”), which is a new privacy regulation containing security and privacy requirements to fully protect data belonging to E.U. based individuals. GDPR was adopted by the European Parliament in April 2016 and goes into effect on May 25, 2018. GDPR is applicable for companies based in and out of the E.U. where data collection and personal data handling from EU-based individuals is in play. Any information which can be used on its own or with other information to locate, contact or identify a single person such as names, identification numbers, online identifiers, location data, or any other factors specific to the individual’s genetic, physical, mental, physiological, cultural, economic, or social identity is considered to be Personally Identifiable Information (PII). In order to be in compliance with GDPR, any company handling or collecting PII. I pertaining to EU-based individuals needs to ensure their data management protocol adheres to all requirements detailed within GDPR.
Included in the requirements for GDPR are cross-border data flow mechanisms, technical/operational security measures, notice & consent, accountability and data minimization. Specifically:
For over a year, BIG Language Solutions has been re-addressing security at all levels to account for broad changes. The Company has carefully assessed all relevant GDPR details and has ensured they have been appropriately matched with the Company’s privacy roadmap and security policies and controls. The Company has decided to offer the same level of compliance for any user, regardless of their nationality or place of residence, in anticipation of GDPR spreading globally. BIG Language Solutions’ technology and service offerings have pre-established privacy and security features already in place, putting our customers in control. BIG Language Solutions’ commitment is to help customers, regardless of location or nationality, maintain stringent controls and accountability for all online and offline offerings through which a customer’s data may be attainable. BIG Language Solutions’s Cloud-based offering relies on industry-leading partners and data providers, each with S.O.C. 2 reports that are re-issued on an annual basis. Data protection is managed throughout the entire data lifecycle, and our commitment is to continuously improve on data handling throughout our existence as a service provider. As needed, please contact your BIG Language Solutions representative for further clarification. Disclaimer: This document is not to be used as legal advice about any law or regulation. To understand the GDPR, customers must seek their own legal counsel.
Last Modified: 03/25/2024
These Terms and Conditions (this “Agreement”) is a legal agreement between you or an entity that you are representing (“you,” “your”) and Big Language Solutions, a Delaware corporation (”BIG Language,” “we,” “our” or “us”). This Agreement governs your use of the products and services made available to you directly or indirectly by us and/or by any of our Corporate Entities (as defined below), including websites (including our website available at biglanguage.com.com (the “BIG Language Website”) and other websites made available by any of our other Corporate Entities and that are refenced from the BIG Language Website or that reference this Agreement) (all such websites, collectively, the “Website”), services and functionality providing or facilitating translation of documents or any other data, software, hardware, mobile applications, cloud-based software, systems or services, application programing interfaces (APIs), artificial intelligence (AI) features and functionality, any other technology, products, services and/or content made available by us or by any of our Corporate Entities (collectively, the “Services”). If you are accessing the Services on behalf of an entity (for example, a company, non-profit entity, university, or other business or organization), you represent to us that you have authority to bind that entity to these terms, and that entity accepts these terms, and the term “you” or “your” will apply to such entity. By using any of the Services, you agree to this Agreement and any other agreements or policies referenced within this Agreement, such as the Privacy Policy and each applicable Separate Agreement (as defined in Section 2 below). If you do not agree to this Agreement, then you are not allowed to use the Services. SECTION 11 OF THIS AGREEMENT INCLUDES A BINDING ARBITRATION CLAUSE, A WAIVER OF YOUR RIGHT TO FILE A LAWSUIT AND OF YOUR RIGHT TO A TRIAL BY JURY, AND A WAIVER OF YOUR RIGHT TO PARTICIPATE IN A CLASS ACTION OR LITIGATE ON A CLASS-WIDE BASIS. THESE ARE IMPORTANT RIGHTS THAT YOU CHOOSE TO WAIVE WHEN YOU ENTER INTO THIS AGREEMENT. PLEASE REVIEW SECTION 11 BEFORE YOU CHOOSE TO USE ANY OF THE SERVICES.
According to standard definitions, an Information Security Policy is a set of rules enacted by an organization to ensure that all users or networks of the IT structure within the organization’s domain abide by the regulations regarding the security of data stored digitally within the boundaries where the organization stretches its authority. Attaining this goal involves setting up an Information Security Policy for the organization and ensuring its adherence. The ISP is governing the protection of information, which is an asset that the organization needs to protect. Information may be printed, written, spoken, or visually explained.
The organization has implemented the ISP with the goal of identifying, assessing, and taking steps to avoid or to mitigate risk to the organization’s information assets. Information security is achieved by implementing a suitable set of controls, including policies, organizational structures and software, and hardware functions.
The ISSG has established security objectives to:
The security objectives are monitored and analyzed yearly and recorded IAW the 05M01 CMS. These controls are established, implemented, monitored and controlled to ensure that the specific security and business objectives of the organization are met. The same is executed in conjunction with ISO 9001 and ISO 27001 processes implemented by the organization.
Capital planning and investment requests include the resources needed to implement the security program, employ a business case; and the organization ensures the resources are available for expenditure as planned. The Management Review Meeting captures any additional resources needed and any improvement projects IAW 09P01 Management Review SOP.
Within the Information Security Policy, roles and responsibilities have been defined and assigned to specific individuals or groups within its organization. The Management Team, including the Information Security Officer (ISO), has established an 07F18 Security Management Structure document. Information security responsibilities are clearly defined, maintained, and communicated. These responsibilities include the security of the organization’s information assets and information technology that are accessed, processed, communicated to, or managed by external parties.
The table below uses the RACI (R= Responsible, A= Accountable., C= Consulted, I= Informed) model for identifying roles and responsibilities during an organizational change process
Area of Responsibility | ISSG | ISO | IAO | User |
Establish the Information Security Program (ISP) | A | R | C | N/A |
Implement and Operate the ISP | A | R | C | N/A |
Monitor and Review the ISP | A/R | R | C | N/A |
Maintain and Improve the ISP | A/R | R | C | N/A |
Management Responsibility | A/R | R | C | N/A |
Resource Management | A | R | I | N/A |
Provision of Resources | A/R | C | I | N/A |
Training, Awareness and Competence | A/R | R | C | I |
Internal ISP Audits | A/R | R | C | I |
Establish Controls | A | R | C | I |
Storage of Source Code | N/A | R | N/A | N/A |
Asset Protection from unauthorized access, disclosure, modification, destruction or interference | ||||
Report of security event or risks | A/R | R | R | I |
The organization has defined the expectations and principles relating to how system setup and credential privileges should be managed. User accounts and privileges shall be managed correctly to ensure authorized user access to information systems is possible, while unauthorized access is not, including but not limited to:
All Customer requests for support must be submitted to [email protected] and vendor requests are to be submitted to [email protected]. Requests are categorized into three tiers:
All calls received after hours are routed to customer support who are on call. Otherwise during regular business hours the number of staff supporting the service. For all tier 3 requests, a ticket will need to be created with GCP or AWS.
BigLS has deployed a change management process in order to prevent unintended service disruptions and to maintain the integrity of all company services. All changes identified as causing disruption are planned and approved by management, without exception.
All requests are processed per IAW 07P08 IT Service Desk SOP. Rollback procedures are documented in case there is a need to go back to a previous status, even though change plans are mostly related to minimal marketable features (MMF). All MMFs are tested thoroughly after a fully automated deployment in the testing environment, before authorizing the deployment into production. Layers of authorization and logging exist so that production changes are controlled and monitored. Only authorized engineers are able to perform production changes. The organization communicates to different stakeholders when the services might be adversely affected.
The organization supports and manages changes to Workspace in the cloud including their operating system and applications and covers major, minor and patches.
The Management team meets every month to discuss any upcoming change. This meeting is known as the Replenishment Meeting.
Risk assessments shall identify, quantify, and prioritize threats that may become relevant to the organization. The results shall guide and determine appropriate organization action and priorities for managing information security risks and for implementing controls needed to protect information assets.
The organization protects its devices at all times by access controls, usage restrictions, connection requirements, encryption, virus protections, firewalls and physical protections.
Please see 04M06 Password Policy
Policy may be made available upon signing a non-disclosure agreement.
10.2.1 Policy
The sensitivity of applications/systems is explicitly identified and documented. The organization’s solution to the Translation Industry is a security-first approach to the handling of any request. The classification of the data of our infrastructure, architecture and home grown software development is carefully selected to handle the most sensitive information available. The following information provides guidance and sets the expectation for the processing and classification of information and customer data:
Data Classification
Type | Description |
Restricted Information | Highly sensitive data that should not leave managed systems. It includes any information that is extremely sensitive in nature such as, but not limited to, Personally Identifiable Information (PII); Payment Card Industry (PCI) and Intellectual Property (IP) is classified as Restricted. Its unauthorized disclosure could seriously and adversely impact the organization, its customers, its business partners, and its external providers. |
Confidential Information |
Sensitive data that could leave managed systems over secure communications channels only. Its unauthorized disclosure could adversely impact the organization, its customers, its business partners, and its external provider. An example of confidential information may include knowledge regarding systems or processes used by the company that is not considered IP, secret, or a threat to the company’s security. |
NOTE: Any information not explicitly classified as Confidential or Restricted shall be considered as Confidential and treated as outlined in this document.
Please see 04M07 Data Classification Policy for additional information. Policy may be made available upon signing a non-disclosure agreement.
The following information sets the rules and expectations for the security and accessing of information:
Resources (employee, external provider, and consultant) shall understand the sensitivity of their data and treat them accordingly per IAW 04M07 Data Classification Policy. Even if technical security mechanisms fail or are absent, every user should still attempt to maintain data security commensurate with its sensitivity.
The organization shall provide resources with access to the information they need to carry out their responsibilities in as effective and efficient a manner as possible.
The organization places reasonable restrictions on removal media. The use of removable media is prohibited on all equipment owned by the organization. Exceptions are managed IAW 07P10 Antivirus and Malware SOP and the 07P08 IT Service Desk SOP and must be approved by the ISO. Restricted Workspaces are prohibited to use removable media, no exceptions.
Please see 04M08 Information Access Control Policy for additional information. Policy may be made available upon signing a non-disclosure agreement.
1 Policy
2 Requirements
Please see 04M10 Remote Access Control Policy for additional information. Policy may be made available upon signing a non-disclosure agreement.
2 Software Use
3 Software from Other Sources
Please see 04M12 Acceptable Use Policy for additional information. Policy may be made available upon signing a non-disclosure agreement.
Please see 04M16 Intellectual Property Policy for additional information. Policy may be made available upon signing a non-disclosure agreement.
details of our selected controls and how they have been implemented and measured are considered confidential information and restricted to the organization. the following sections have been removed to make this document available to the public: security policy, organization of information security, asset management, human resources security, physical and environmental security, communications and operations management, access control, information systems acquisition, development and maintenance, information security incident management, business continuity management, and compliance
This MASTER SERVICES AGREEMENT (the “Agreement”) is entered into by and between Big Language Solutions, LLC, a Delaware limited liability company with an address at 3424 Peachtree Road NE, Suite 2060, Atlanta, GA 30326 (“Big Language”) and the entity identified in a Project (as defined below) that references this Agreement (“Customer”) (each of Big Language and Customer, a “Party”). This Agreement is effective as of the date when the Parties entered into the first Project that references this Agreement (the “Effective Date”). The Parties agree as follows:
1.2 Projects. Customer and any Provider may enter into one or more Projects from time to time. All Projects entered into by Customer and any Provider will be subject to this Agreement, and will be considered a part of this Agreement. A “Project” means any work order, statement of work, quotation, email exchange, or similar arrangement that is approved by authorized representatives of both Customer and of a Provider, or any other written instructions or communications between Customer and a Provider that are accepted via email by authorized representatives of both Customer and the Provider. Each Project will describe the Professional Services to be provided by Provider to Customer, and the fees, costs and expenses to be paid by the Customer to Provider, and will become effective upon execution or written approval by authorized representatives of both Parties (email acceptable). Projects may only be modified with the written approval of authorized representatives of both Customer and the respective Provider. To ensure fairness and lack of surprises for both Customer and each Provider, any instruction or request made by Customer in a Project that (a) describes turn-around times, deadlines or services that are shorter or otherwise inconsistent with those specified or normally made available by the respective Provider, or (b) is shorter or otherwise inconsistent with the past engagement pattern between Customer and the respective Provider, will not be considered accepted by either Customer or Provider unless specifically acknowledged and approved by authorized representatives of both Customer and Provider with a specific written acknowledgement (email acceptable) that reasonably acknowledges the unusual nature of such instruction or request and reasonably confirms that both Customer and Provider are aware of the respective departure from the normal operating process. Once the first Project is entered into by the Parties and references this Agreement, this Agreement becomes effective, and all subsequent Projects between Customer and any Provider that do not reference either this Agreement or any other agreement entered into by the Parties will be subject to this Agreement.
Client Location | Affiliate | Applicable Law | Venue |
Germany | Law Linguist | Laws of Germany | Arbitration conducted by the International Chamber of Commerce in Germany in Stuttgart, Germany |
Italy | Law Linguist | Laws of Italy | Arbitration conducted by the International Chamber of Commerce in Italy in Milan, Italy |
Europe (other than Germany and Italy) | Dora Wirth Languages, Protranslating, Language Link, BIG IP, ISI Language Solutions | Laws of England and Wales | Arbitration conducted by the London Court of International Arbitration (“LCIA”) in London, UK |
United States | Protranslating, Language Link, BIG IP, ISI Language Solutions, Law Linguist, or Dora Wirth Languages | Laws of the State of New York, USA | Arbitration conducted by JAMS. in New York, NY, USA |
8.2 Force Majeure. Each Provider will be excused from performance of its obligations under this Agreement if such a failure to perform arises from compliance with any requirement of applicable law, acts of God, fire, strike, pandemic, embargo, terrorist attack, war, insurrection or riot or other causes beyond the reasonable control of that Provider. Any delay resulting from any of such causes will extend performance accordingly or excuse performance, in whole or in part, as may be reasonable under the circumstances.
8.3 Notices. All notices required by or relating to this Agreement will be in writing and will be sent by means of certified mail, postage prepaid, to the Parties to the Agreement and addressed, if to Customer, as set forth on the Cover Page, or if to Big Language, as follows:
Big Language Solutions, LLC
3424 Peachtree Road NE, Suite 2060
Atlanta, GA 30326
Attention: CFO
or addressed to such other address as that Party may have given by written notice in accordance with this provision. All notices required by or relating to this Agreement may also be communicated by facsimile, provided that the sender receives and retains confirmation of successful transmittal to the recipient. Such notices will be effective on the date indicated in such confirmation. In the event that either Party delivers any notice hereunder by means of facsimile transmission in accordance with the preceding sentence, such Party will promptly thereafter send a duplicate of such notice in writing by means of certified mail, postage prepaid, to the receiving Party, addressed as set forth above or to such other address as the receiving Party may have previously substituted by written notice to the sender.
8.4 Assignment; Delegation. Each Party may assign this Agreement without the need for any consent in connection with any corporate restructuring, or in connection with a sale or transfer of all or substantially all of its assets, stock or business. This Agreement will be binding upon and inure to the benefit of Big Language and Customer and their successors and permitted assigns.
8.5 Independent Contractors. Customer and Big Language acknowledge and agree that the relationship arising from this Agreement does not constitute or create any joint venture, partnership, employment relationship or franchise between them, and the Parties are acting as independent contractors in making and performing this Agreement.
8.6 Amendment. No amendment to this Agreement or any Agreement will be valid unless such amendment is made in writing and is signed by the authorized representatives of the Parties.
8.7 Waiver. No waiver under this Agreement will be valid or binding unless set forth in writing and duly executed by the Party against whom enforcement of such waiver is sought. Any such waiver will constitute a waiver only with respect to the specific matter described therein and will in no way impair the rights of the Party granting such waiver in any other respect or at any other time. Any delay or forbearance by either Party in exercising any right hereunder will not be deemed a waiver of that right.
8.8 Severability. If any provision of this Agreement is invalid or unenforceable for any reason in any jurisdiction, such provision will be construed to have been adjusted to the minimum extent necessary to cure such invalidity or unenforceability. The invalidity or unenforceability of one or more of the provisions contained in this Agreement will not have the effect of rendering any such provision invalid or unenforceable in any other case, circumstance or jurisdiction, or of rendering any other provisions of this Agreement invalid or unenforceable whatsoever.
8.9 Export. Each Party agrees not to export, directly or indirectly, any data acquired from the other Party or any products utilizing such data to countries outside the United States of America, which export may be in violation of the United States of America export laws or regulations or the laws and regulations of any other applicable jurisdiction.
8.10 No Third-Party Beneficiaries. The Parties acknowledge that the covenants set forth in this Agreement are intended solely for the benefit of the Parties, their successors and permitted assigns. Nothing herein, whether express or implied, will confer upon any person or entity, other than the Parties, their successors and permitted assigns, any legal or equitable right whatsoever to enforce any provision of this Agreement.
8.11 Counterparts. Each Project may be executed in any number of counterparts, each of which when so executed will be deemed to be an original and all of which when taken together will constitute one Agreement. Execution of each Project may occur in writing or electronically (e.g., through an electronic signature platform such as DocuSign), and both electronic and written signatures of each Party will be valid.+
8.12 Headings. The headings in this Agreement are inserted merely for the purpose of convenience and will not affect the meaning or interpretation of this Agreement.
8.13 Entire Agreement. This Agreement, and any relevant Project referencing this Agreement, sets forth the entire agreement and understanding between the Parties hereto with respect to the subject matter hereof and, except as specifically provided herein, supersedes and merges all prior oral and written agreements, discussions and understandings between the Parties with respect to the subject matter hereof, and neither of the Parties will be bound by any conditions, inducements or representations other than as expressly provided for herein.
8.14 Order of Precedence. In the event that a conflict is deemed to arise between the provisions of this Agreement and the provisions of any Project, the provisions of this Agreement will govern unless otherwise expressly specified otherwise in such Project.
THIS NOTICE DESCRIBES HOW MEDICAL INFORMATION ABOUT YOU MAY BE USED AND DISCLOSED AND HOW YOU CAN GET ACCESS TO THIS INFORMATION. PLEASE REVIEW IT CAREFULLY.
This Notice is effective: April 15, 2015. If you have any questions about this Notice please contact our Privacy Officer, [email protected].
This Notice of Privacy Practices (“Notice”) describes how BIG Language Solutions LLC (“BIG”) may use and disclose your Protected Health Information (PHI) under the Health Insurance Portability and Accountability Act (HIPAA) to assist in your treatment, to facilitate payment for treatment you have received, for BIG’s operations, and for other purposes that are permitted or required by law.
This Notice also describes your rights to access and control your Protected Health Information. “Protected Health Information” is information that may identify you and that relates to your past, present, or future physical or mental health or condition; and related health care services. We are required by law to abide by the terms of this Notice. Your health care providers, health insurance company or other representatives may have different policies or notices regarding the use and disclosure of your Protected Health Information.
HOW WE MAY USE AND DISCLOSE YOUR PROTECTED HEALTH INFORMATION
Your Protected Health Information may be used and disclosed by BIG’s interpreters or translators, your physician, and other who are involved in your care and treatment for the purpose of providing health care services to you. Your Protected Health Information may also be used and disclosed to pay your health care bills.
The following categories describe different types of uses and disclosures of your Protected Health Information that BIG is allowed to make. Not every type of use or disclosure within in a category will be listed. However, all of the ways in which we are permitted to use or disclose your Protected Health Information will fall into one of the categories listed.
Treatment:
BIG will use and disclose your Protected Health Information to assist your health care providers in providing your treatment, or to coordinate or manage your health care and any related services. For example, we would disclose your Protected Health Information, as necessary, to a health care provider that provides care to you to assist in diagnosis and treatment.
Payment:
Your Protected Health Information will be used and disclosed, as needed, to assist appropriate parties in obtaining payment for your health care services provided by your health care provider. This may include providing services in connection with certain activities that your health insurance plan may undertake before it approves or pays for the health care services recommended for you such as: determining eligibility or coverage for insurance benefits, reviewing services provided to you for medical necessity, and undertaking utilization review activities.
Health Care Operations:
We may use or disclose, as needed, your Protected Health Information in order to support the business activities of BIG. These activities include, but are not limited to, quality assessment activities, employee review activities, training of interpreters and translators, licensing, and conducting or arranging for other business activities.
We will share your Protected Health Information with third party “business associates” or “subcontractors” that perform various activities (for example, interpretation or translation services) for BIG. Whenever an arrangement between our company and a business associate or subcontractor involves the use or disclosure of your Protected Health Information, we will have a written contract that contains terms that will protect the privacy of your Protected Health Information.
We may use or disclose your Protected Health Information, as necessary, to provide you with appointment reminders and information about benefits and services that may be of interest to you. You may contact our Privacy Officer to request that these materials not be sent to you.
Other Permitted and Required Uses and Disclosures That We May Make Without Your Authorization or Opportunity to Agree or Object:
We may use or disclose your Protected Health Information in the following situations without your authorization or providing you the opportunity to agree or object. These situations include:
Required By Law:
We may use or disclose your Protected Health Information to the extent that the use or disclosure is required by law. For example, we may disclose your Protected Health Information when required by a court order in a litigation proceeding, such as a malpractice action. The use or disclosure will be made in compliance with the law and will be limited to the relevant requirements of the law. You will be notified, if required by law, of any such uses or disclosures.
Public Health:
We may disclose your Protected Health Information for public health activities and purposes to a public health authority that is permitted by law to collect or receive such information. For example, a disclosure may be made for the purpose of preventing or controlling disease, injury or disability.
Communicable Diseases:
We may disclose your Protected Health Information, if authorized by law, to a person who may have been exposed to a communicable disease or may otherwise be at risk of contracting or spreading the disease or condition.
Health Oversight:
We may disclose Protected Health Information to a health oversight agency for activities authorized by law, such as audits, investigations, and inspections. Oversight agencies seeking this information include government agencies that oversee the health care system, government benefit programs, other government regulatory programs and civil rights laws.
Abuse or Neglect:
We may disclose your Protected Health Information to a public health authority that is authorized by law to receive reports of child abuse or neglect. In addition, we may disclose your Protected Health Information if we believe that you have been a victim of abuse, neglect or domestic violence to the governmental entity or agency authorized to receive such information. In this case, the disclosure will be made consistent with the requirements of applicable federal and state laws.
Food and Drug Administration:
We may disclose your Protected Health Information to a person or company required by the Food and Drug Administration for the purpose of quality, safety, or effectiveness of FDA-regulated products or activities, including; to report adverse events, product defects or problems, biologic product deviations; to track products; to enable product recalls; to make repairs or replacements; or to conduct post marketing surveillance, as required.
Legal Proceedings:
We may disclose Protected Health Information in the course of any judicial or administrative proceeding, in response to an order of a court or administrative tribunal (to the extent such disclosure is expressly authorized), or in certain conditions in response to a subpoena, discovery request or other lawful process.
Law Enforcement:
We may also disclose Protected Health Information, so long as applicable legal requirements are met, for law enforcement purposes. These law enforcement purposes include (1) legal processes and otherwise required by law, (2) limited information requests for identification and location purposes, (3) information pertaining to victims of a crime, and (4) suspicion that death or injury has occurred as a result of criminal conduct.
Coroners, Funeral Directors, and Organ Donation:
We may disclose Protected Health Information to a coroner or medical examiner. For example, such disclosure may be necessary for identification purposes or to determine the cause of death. Protected health information may also be used and disclosed for cadaveric organ, eye or tissue donation purposes.
Criminal Activity:
We may disclose your Protected Health Information if we believe that the use or disclosure is necessary to prevent or lessen a serious and imminent threat to the health or safety of a person or the public. We may also disclose Protected Health Information if it is necessary for law enforcement authorities to identify or apprehend an individual.
Military Activity and National Security:
When the appropriate conditions apply, we may use or disclose Protected Health Information of individuals who are Armed Forces personnel (1) for activities deemed necessary by appropriate military command authorities; (2) for the purpose of a determination by the Department of Veterans Affairs of your eligibility for benefits, or (3) to foreign military authority if you are a member of that foreign military services. We may also disclose your Protected Health Information to authorized federal officials for intelligence, counterintelligence, and other national security activities authorized by law.
Workers’ Compensation:
We may disclose your Protected Health Information as authorized to comply with workers’ compensation laws and other similar legally-established programs.
Inmates:
We may use or disclose your Protected Health Information to a correctional facility law enforcement official if you are an inmate of the correctional facility or under the custody of the law enforcement official. This disclosure would be necessary: (a) for the correctional institution to provide you with health care, (b) to protect your health and safety or the health and safety of others, or (c) for the safety and security of the correctional institution.
Uses and Disclosures of Protected Health Information Based upon Your Written Authorization:
BIG will make other uses and disclosures of your Protected Health Information only with your written authorization, unless otherwise permitted or required by law as described below. For example, we will not use your Protected Health Information for marketing purposes or sell your Protected Health Information without your prior authorization. Additionally, if your Protected Health Information includes psychotherapy notes, we will not use or disclose this information without your prior authorization. You may revoke any such authorizations in writing at any time. If you revoke your authorization, we will no longer use or disclose your Protected Health Information for the reasons covered by your written authorization. Please understand that we cannot retroactively take back any disclosures already made with your authorization.
Other Permitted and Required Uses and Disclosures That Require Providing You the Opportunity to Agree or Object:
Unless you object, we may disclose to a member of your family, a relative, a close friend or any other person you identify, your Protected Health Information that directly relates to that person’s involvement in your health care. If you are unable to agree or object to such a disclosure, we may disclose such information as necessary if your health care provider determines that it is in your best interest. We may use or disclose Protected Health Information to notify or assist in notifying a family member, personal representative or any other person that is responsible for your care of your location, general condition or death. Finally, we may use or disclose your Protected Health Information to an authorized public or private entity to assist in disaster relief efforts and to assist disclosures to family or other individuals involved in your health care.
YOUR RIGHTS
You have the following rights regarding Protected Health Information we maintain about you:
Right to inspect and copy.
You have the right to inspect and obtain a copy of Protected Health Information about you for so long as we maintain the Protected Health Information. As permitted by federal or state law, we may charge you a reasonable copy fee for a copy of your records. We may deny your request to inspect and copy in certain limited circumstances. If you are denied access to your Protected Health Information, you may request that the denial be reviewed. Please contact our Privacy Officer if you have questions about access to your records.
Right to request a restriction.
You have the right to request a restriction or limitation on the Protected Health Information we disclose for the purposes of treatment, payment or health care operations. You also have the right to request a restriction or limitation on the Protected Health Information we disclose to family members or friends who may be involved in your care or for notification purposes as described in this Notice. If you are paying out of pocket, you also have the right to request a restriction on the disclosure of your Protected Health Information to a health plan for payment purposes. Your request must state the specific restriction requested and to whom you want the restriction to apply. You may request a restriction by submitting a written request to the Privacy Officer listed above.
BIG is not required to agree to a restriction that you may request. If we do not agree to the requested restriction, we may not use or disclose your Protected Health Information in violation of that restriction unless it is needed to assist your health care provider in providing emergency treatment. With this in mind, please discuss any restriction you wish to request with your health care provider.
Right to Request Confidential Communications.
You have the right to request to receive confidential communications from BIG by alternative means or at an alternative location. We will accommodate reasonable requests. We will not request an explanation from you as to the basis for your request. Please make this request in writing to the Privacy Officer listed above.
Right to Amend.
You may have the right to have BIG amend your Protected Health Information. You may request an amendment of your Protected Health Information that is contained in a designated record set for so long as we maintain this information. We may deny your request for an amendment in certain cases. If we deny your request for amendment, you have the right to file a statement of disagreement with us. We may prepare a rebuttal to your statement and will provide you with a copy of any such rebuttal. Please contact our Privacy Officer if you have questions about amending your Protected Health Information.
Right to Accounting.
You have the right to receive an accounting of disclosures we have made, if any, for purposes other than treatment, payment or health care operations. You must submit a request for accounting to the Privacy Officer listed above. This right excludes disclosures we may have made to you if you authorized us to make the disclosure to family members or friends involved in your care, or for notification purposes, for national security or intelligence, to law enforcement or correctional facilities, as part of a limited data set disclosure. You have the right to receive specific information regarding these disclosures, subject to applicable exceptions, restrictions and limitations.
Right to Paper Copy of Notice.
You have the right to obtain a paper copy of this Notice from us, upon request, even if you have agreed to accept this Notice electronically. You may obtain a paper copy by visiting our website, or by contacting the Privacy Officer listed above.
Right to Notice of Breach.
We will let you know promptly if a breach occurs that may have compromised the privacy or security of your Protected Health Information.
CHANGES TO THIS NOTICE
BIG may change the terms of this Notice, at any time. The new Notice will be effective for all Protected Health Information that we maintain at that time. Upon your request, we will provide you with a copy of any revised Notice. You may request a revised Notice by visiting our website, or by contacting the Privacy Officer listed above.
COMPLAINTS
You may submit a complaint to us or to the Secretary of Health and Human Services if you believe your privacy rights have been violated by BIG. You may file a complaint with us by notifying our Privacy Officer. We will not retaliate against you for filing a complaint. You may contact the Privacy Officer listed above for further information about the complaint process
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |