Breach Process. In the event of a Breach, PowerSchool will follow the following process: 5.1. The security breach notification will be written in plain language, will be titled “Notice of Data Breach,” and will present the information described herein under the following headings: “What Happened,” "What Information Was Involved," "What We Are Doing," "What You Can Do," and "For More Information." Additional information may be provided as a supplement to the notice. 5.2. The security breach notification described above in Section 4.1 will include, at a minimum, the following information: 5.2.1. The name and contact information of Customer’s Designee or his/her designee for this purpose. 5.2.2. A list of the types of Customer Data that were or are reasonably believed to have been the subject of a Breach. 5.2.3. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification will also include the date of thenotice. 5.2.4. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice isprovided. 5.2.5. A general description of the Breach, if that information is possible to determine at the time the notice is provided.
Appears in 1 contract
Sources: Main Services Agreement
Breach Process. In the event of a Breach, PowerSchool will follow the following process:
5.1. The security breach notification will be written in plain language, will be titled “Notice of Data Breach,” and will present the information described herein under the following headings: “What Happened,” "What Information Was Involved," "What We Are Doing," "What You Can Do," and "For More Information." Additional information may be provided as a supplement to the notice.
5.2. The security breach notification described above in Section 4.1 will include, at a minimum, the following information:
5.2.1. The name and contact information of Customer▇▇▇▇▇▇▇▇’s Designee or his/her designee for this purpose.
5.2.2. A list of the types of Customer Data that were or are reasonably believed to have been the subject of a Breach.
5.2.3. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification will also include the date of thenotice.
5.2.4. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice isprovided.
5.2.5. A general description of the Breach, if that information is possible to determine at the time the notice is provided.
Appears in 1 contract
Sources: Main Services Agreement