Breach Notifications Sample Clauses

Breach Notifications. A breach is, generally, an impermissible use or disclosure under the Privacy Rule that compromises the security or privacy of the protected health information. Following a breach of unsecured protected health information, Fidelis will provide notification of the breach to affected individuals, the Secretary of the Department of Health and Human Services, and, in certain circumstances, to the media, as required by law or regulations. Fidelis will provide this notice in written form without unreasonable delay and no later than 60 days following the discovery of the breach. Fidelis will provide a description of the types of information that were involved in the breach, the steps affected individuals should take to protect themselves from potential harm, a brief description of what Fidelis is doing to investigate the breach, mitigate the harm, and prevent further breaches, as well as contact information for Fidelis. If you believe your privacy rights have been violated, you may file a complaint with Fidelis or the Secretary of the U.S. Department of Health and Human Services. You may file a complaint with Fidelis by writing to 00-00 Xxxxxx Xxxxxxxxx, Xxxx Xxxx, New York 11374.
AutoNDA by SimpleDocs
Breach Notifications. In the event of a Security Breach, Databricks shall provide written notice to Customer without undue delay and in no event later than seventy-two (72) hours after becoming aware of the Security Breach and will provide updates to Customer, including the type of data affected and the identity of affected person(s) as soon as such information becomes known to Databricks. Databricks will reasonably cooperate with Customer as required to fulfill Customer’s obligations under Applicable Data Protection Laws. Databricks shall take measures and actions appropriate and reasonable to remedy or mitigate the effects of the Security Breach.
Breach Notifications. 9.1. The Parties agree to accord assistance and necessary support in case of any data breach.
Breach Notifications. A party must notify the disclosing party in writing, giving full details known to it immediately, when it becomes aware of any actual, suspected, likely or threatened:
Breach Notifications. TCP will promptly report to Client any unauthorized access to Client Data within TCP’s or its Subprocessors’ systems upon discovery and in accordance with applicable data breach notification laws. TCP will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. TCP’s notification of or response to any security incident under this Section 3.2 shall not be construed as an acknowledgment by TCP of any fault or liability with respect to such security incident.
Breach Notifications. 7.1 Plecto maintains security incident management policies and procedures and shall, notify Subscriber without undue delay after becoming aware of the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Subscriber Data, including Personal Data, transmitted, stored or otherwise Processed by Plecto or its Sub-processors of which Plecto becomes aware (a “Customer Data Incident”).
Breach Notifications. In respect of any personal data breach involving the Client Personal Data, Com Laude shall, without undue delay, notify Client of the breach and provide Client with details of the breach. Com Laude will take all reasonable steps necessary to mitigate the effects and minimise any damage resulting from such personal data breach.
AutoNDA by SimpleDocs
Breach Notifications. If any of your personal data is stolen, lost or illegally accessed - known as a personal data breach - we would inform you as well as the respective data protection agencies as to such accidents without undue delay. We would also inform you directly if there are serious risks related to your personal data or privacy due to the personal data breach. We will do our best to minimize any possible risks related to personal data breach. We hope this Privacy Policy helped you to understand how we process your personal data at the COM- PANY. If you have any questions or comments with regard to this Privacy Policy, please do not hesitate to contact us at xx@xxxx.xxxxxxxxxx. Our contact information Blueprint Hawk LTD., registered number 182391,
Breach Notifications. Within one (1) day of a Breach first becoming known to PhishingBox, PhishingBox will notify Customer by an email to the contact information provided on the latest Order or, if there is no Order, via Customer’s account. The email shall contain a summary of all facts then known about the Breach. In no case later than two (2) days after the date upon on which a Breach first becomes known to PhishingBox, PhishingBox will provide Customer with a more-detailed notification than that required by Section 8.1, again by email to the contact information provided on the latest Order, containing at least the following information, except to the extent to which the same cannot be discovered through reasonable efforts within such timeframe: (a) the identification and address of each Breach Subject; (b) a brief description of what happened, including, without limitation, the date of the Breach and the date of the discovery of the Breach; (c) a description of the types of Personal Information that were involved in the Breach; (d) a detailed list of all steps that Breach Subjects should take to protect themselves from potential harm that will or may result from the Breach; (e) a brief description of what PhishingBox is doing to investigate the Breach, mitigate the harm to Breach Subjects, and protect against further Breaches; (f) a brief description of what PhishingBox plans to do in the immediate future to further investigate the Breach, mitigate the harm to Breach Subjects, and protect against further Breaches; and (g) complete contact information for a management-level person at PhishingBox for further communications with Customer regarding the Breach. Breach Updates. PhishingBox will promptly notify Customer by email to the contact information provided on the latest Order with updates of the items specified in Section 8.2 when PhishingBox becomes aware of further information relating to the Breach.
Time is Money Join Law Insider Premium to draft better contracts faster.