Security Breach Notifications Sample Clauses

Security Breach Notifications. Notice must be given by the Subrecipient to anyone whose PSCI could have been breached in accordance with HIPAA, the Information Practices Act of 1977, and State policy.
AutoNDA by SimpleDocs
Security Breach Notifications. Notice must be given by the Subrecipient to anyone whose confidential, sensitive and/or personal identifying information could have been breached in accordance with HIPAA, the Information Practices Act of 1977, and State policy.
Security Breach Notifications. TCP will promptly report to Client any unauthorized access to Client Data within TCP’s or its Subprocessors’ systems upon discovery and in accordance with applicable data breach notification laws. TCP will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. TCP’s notification of or response to any security incident under this Section 3.2 shall not be construed as an acknowledgment by TCP of any fault or liability with respect to such security incident.‌
Security Breach Notifications. If Lative becomes aware of a Security Incident for which notification to Customer is required under applicable Data Protection Laws, Lative will, without undue delay: (a)notify Customer of the Security Incident:
Security Breach Notifications. Within thirty (30) days of discovering an unauthorized release, disclosure or acquisition of Customer Data (“Security Breach”), ALI will notify Customer in writing that a Security Breach has occurred. XXX will investigate the causes and consequences of the Security Breach and will attempt to minimize the risk of any further unauthorized releases, disclosures, or acquisitions. If Customer elects to or is required to notify individuals whose data was or may have been involved in the Security Breach, Customer will be solely responsible for making such notifications. For Review
Security Breach Notifications. If either party discovers that there has been an unauthorized release, disclosure, or acquisition of Customer Data or unauthorized access to the Service (a “Security Breach”), the party discovering the Security Breach will inform the other party in writing within twenty-four (24) hours of discovering the Security Breach. The parties will investigate the causes and consequences of the Security Breach and will attempt to minimize the risk of any further unauthorized releases, disclosures, or acquisitions. Each party agrees to provide reasonable and expeditious assistance to the other party in investigating a Security Xxxxxx. If Customer elects to or is required by law any governmental agencies or individuals whose data was or may have been involved in the Security Breach, Customer will be solely responsible for making such notifications.
Security Breach Notifications. Humanity will promptly report to Client any unauthorized access to Client Data within Humanity’s or its Subprocessors’ systems upon discovery and in accordance with applicable data breach notification laws. Humanity will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. Humanity’s notification of or response to any security incident under this Section 4.2 shall not be construed as an acknowledgment by Humanity of any fault or liability with respect to such security incident.
AutoNDA by SimpleDocs
Security Breach Notifications. TCP will promptly report to Client any unauthorized access to Client Data within TCP’s or its Subprocessors’ systems upon discovery and in accordance with applicable data breach notification laws. TCP will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. TCP’s notification of or response to any security incident under this Section 3.2 shall not be construed as an acknowledgment by TCP of any fault or liability with respect to such security incident. Data Backup and Retention. TCP shall undertake commercially reasonable efforts to backup Client Data with a restore point objective of twenty-four (24) hours. Client Data shall be backed up and retained in accordance with TCP’s retention policy as set forth in the Privacy Policy. Data Privacy. TCP will process Employee Personal Data in accordance with the terms of this Agreement, the Privacy Policy and all applicable data protection laws. Client must maintain its own data collection, disclosure, retention, and storage policies in compliance with applicable law. Biometric Data. To the extent that Client collects, captures, stores, or otherwise uses Biometric Data relating to an individual, Client must (i) first inform the individual from whom Biometric Data will be collected, in writing and prior to collecting his or her Biometric Data, that Biometric Data is being collected, stored, and/or used; (ii) indicate, in writing, the specific purpose(s) (which may not be other than employment-related purposes) and length of time for which Biometric Data is being collected, stored, and/or used; and (iii) receive a written release from the individual (or his or her legally authorized representative) authorizing the Client, TCP, TCP’s third-party service providers (who are subject to restrictions no less restrictive than those imposed on TCP herein) to collect, store, and/or use the Biometric Data and authorizing the Client to disclose such Biometric Data to TCP and TCP’s third-party service providers.
Security Breach Notifications. Equinix will contact Customer via phone or email of any actual or attempted unauthorized access of Customer’s Licensed Space (i.e., private cage or cabinet) (“Breach”) within twenty-four (24) hours of discovery, or as soon as is practical given the circumstances. In the provision of Licensed Space and Services, Equinix does not manage nor monitor Customer’s Equipment and does not monitor any Cross Connects. Customer is solely responsible for monitoring Customer’s Equipment and its network traffic.
Time is Money Join Law Insider Premium to draft better contracts faster.