Breach Response Sample Clauses

Breach Response. In the event of any unauthorized access to, unauthorized disclosure of, loss of, damage to or inability to account for any Personal Information (a "Breach"), Xxxxxxx agrees that it shall promptly, at its own expense (i) report such Breach to the Grantor by telephone with immediate written confirmation sent by e-mail and by mail, describing in detail any accessed materials and identifying any individual(s) who may have been involved in such Breach; (ii) take all actions necessary or reasonably requested by the Grantor to stop, limit or minimize the Breach; (iii) restore and/or retrieve, as applicable, and return all Personal Information that was lost, damaged, accessed, copied or removed; (iv) cooperate in all reasonable respects to minimize the damage resulting from such Breach; (v) provide any notice to Illinois residents as required by 815 ILCS 530/10 or applicable federal law, in consultation with the Grantor; and
AutoNDA by SimpleDocs
Breach Response. Xxxxxx will promptly take all actions relating to its Security Measures that it deems necessary and advisable to identify and remediate the cause of a Personal Data Breach.
Breach Response. Soundtrap has an incident response plan as well as appropriate procedures to detect, contain, and respond to security incidents.
Breach Response. (a) In general.
Breach Response. To provide Breach Response Services to the Insured Organisation because of an actual or reasonably suspected Data Breach or Security Breach that the Insured first discovers during the Policy Period. First Party Loss To indemnify the Insured Organisation for: Business Interruption Loss Business Interruption Loss that the Insured Organisation sustains as a result of a Security Breach or System Failure that the Insured first discovers during the Policy Period. Dependent Business Interruption Loss Dependent Business Loss that the Insured Organisation sustains as a result of a Dependent Security Breach or a Dependent System Failure that the Insured first discovers during the Policy Period.
Breach Response. [This paragraph 9 is inoperative, and all references herein to “paragraph 9” shall be deemed to refer to the XXX breach responses provisions, if the contract incorporates the XXX by reference. See paragraph 8.1.4 above]
Breach Response. (a) In general. In the event of a breach of PII/PHI held by the Business Associate, the Business Associate shall follow the breach response requirements set forth in this Part V, which is designed to satisfy both the Privacy Act and HIPAA as applicable. If a breach involves PII without PHI, then the Business Associate shall comply with DoD Privacy Act Issuance breach response requirements only; if a breach involves PHI (a subset of PII), then the Business Associate shall comply with both Privacy Act and HIPAA breach response requirements. A breach involving PHI may or may not constitute an HHS Breach. If a breach is not an HHS Breach, then the Business Associate has no HIPAA breach response obligations. In such cases, the Business Associate must still comply with breach response requirements under the DoD Privacy Act Issuances. If the DHA Privacy Office determines that a breach is an HHS Breach, then the Business Associate shall comply with both the HIPAA Breach Rule and DoD Privacy Act Issuances, as directed by the DHA Privacy Office, regardless of whether the breach occurs at DHA or at one of the Service components. If the DHA Privacy Office determines that the breach does not constitute an HHS Breach, then the Business Associate shall comply with DoD Privacy Act Issuances, as directed by the applicable Service-Level Privacy Office. [The Service-Level Privacy Office may wish to add more specific provisions here and below addressing what is required when the incident is not an HHS Breach. The only DHA Privacy Office role in that situation is to track the Service-level breach response.] The following provisions of Part V set forth the Business Associate’s Privacy Act and HIPAA breach response requirements for all breaches, including but not limited to HHS breaches. This Part V is designed to satisfy the DoD Privacy Act Issuances and the HIPAA Breach Rule as implemented by the DoD HIPAA Issuances. In general, for breach response, the Business Associate shall report the breach to the Covered Entity, assess the breach incident, notify affected individuals, and take mitigation actions as applicable. Because DoD defines “breach” to include possible (suspected) as well as actual (confirmed) breaches, the Business Associate shall implement these breach response requirements immediately upon the Business Associate’s discovery of a possible breach.
AutoNDA by SimpleDocs
Breach Response. The Fund will provide Breach Response Services to the Fund Member because of an actual or reasonably suspected Data Breach or Security Breach that the Fund Member first discovers during the Participation Period.
Breach Response. DocuSign shall take reasonable measures to mitigate the cause of any Data Breach and shall take reasonable corrective measures to prevent future Data Breaches. As information is collected or otherwise becomes available to DocuSign and unless prohibited by law, DocuSign shall provide information regarding the nature and consequences of the Data Breach that are reasonably requested to allow Customer to notify affected individuals, government agencies and/or credit bureaus. Due to the encryption configuration and security controls associated with DocuSign Signature, DocuSign will not have access to or know the nature of the information contained within Customer’s eDocuments and, as such, the Parties acknowledge that it may not be possible for DocuSign to provide Customer with a description of the type of information or the identity of individuals who may be affected by a Data Breach. Customer is solely responsible for determining whether to notify impacted individuals and for providing such notice, and for determining if regulatory bodies or enforcement commissions applicable to Customer or Customer’s use of DocuSign Signature need to be notified of a Data Breach.
Breach Response. Notification Sublimit - a minimum limit of fifty percent (50%) of the policy aggregate
Time is Money Join Law Insider Premium to draft better contracts faster.