Breaches of Security Sample Clauses

Breaches of Security. 88. It is a criminal offence to knowingly or recklessly and without the consent of the data controller: • obtain • disclose or • procure the disclosure of personal data, or to sell or offer to sell personal data obtained in the above manner.
AutoNDA by SimpleDocs
Breaches of Security. 12.1 Any breaches in security should be reported and monitored within each organisation following their own incident reporting policies, and relevant partner organisations should be informed.
Breaches of Security. 1. In case of a breach of security, the Competent Security Authority in whose state the breach of security occurred shall inform the Competent Security Authority of the other Party in due time and shall ensure the appropriate investigation. The other Party shall, if required, cooperate in the investigation.
Breaches of Security. All known or suspected breaches of security in relation to terminals and any information shared under this agreement - such as misuse or abuse of the system, misuse or abuse of information shared, unauthorised processing of data, unauthorised disclosure of information, malicious software attack, denial of service attack - are to be reported to the respective organisations’ Information Security Officer, Data Protection Officer or equivalent. Once notified of a breach of security an investigation will take place to identify, where possible, who carried out the breach, what information has been compromised, whether the integrity of the system has been compromised etc. Where any breach of security may amount to criminal activity, this must be reported to Police Service of Scotland who will investigate the matter and, where appropriate, report the circumstances to the Procurator Fiscal. Where relevant or necessary, partner organisations are to be informed of any breach and provided with sufficient details which will enable them to retain assurance in the confidentiality, integrity and availability of the information and the processes supporting information exchange, and to undertake their own risk assessments.
Breaches of Security. DMI shall implement reasonable and appropriate security procedures consistent with prevailing industry standards to protect Client Data from unauthorized access by physical and electronic intrusion; provided, however, unless resulting from the failure of DMI to perform the forgoing obligations, the parties agree that DMI shall not, under any circumstances, be held responsible or liable for situations (i) where data or transmissions are accessed by third parties through illegal or illicit means, or (ii) where the data or transmissions are accessed through the exploitation of security gaps, weaknesses, or flaws unknown to either party at the time. DMI will promptly report to Client any unauthorized access to Client Data promptly upon discovery. DMI will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. In the event notification to persons included in such Client Data is required, DMI will provide reasonable assistance to Client; however, Client shall be solely responsible for any and all such notifications at its expense.
Breaches of Security. (1) In cases where unauthorized disclosure, misuse or loss of Classified Information covered under this Agreement is suspected or confirmed, the Competent Security Authority of the receiving Party shall be notified thereof at once.
Breaches of Security. Breach of Security” shall mean any loss, misuse, compromise, or unauthorized access to Confidential or Personal Information that a party (“Receiving Party”) collects, generates, or obtains from or on behalf of the other party (“Disclosing Party”), or any act or omission that compromises or undermines the physical, technical, or organizational safeguards put in place by the Receiving Party in processing such information or otherwise providing services under this Agreement. If there is an actual or suspected Breach of Security involving Confidential or Personal Information that is CERTAIN CONFIDENTIAL INFORMATION CONTAINED IN THIS DOCUMENT, MARKED BY [***], HAS BEEN OMITTED BECAUSE OLO INC. HAS DETERMINED THE INFORMATION (I) IS NOT MATERIAL AND (II) WOULD LIKELY CAUSE COMPETITIVE HARM TO OLO INC. IF PUBLICLY DISCLOSED. stored, managed or received by, or transmitted to a party, the Receiving Party will notify the Disclosing Party as soon as possible (but In any event within [***] of becoming aware of such occurrence) and will provide such notice to the Disclosing Party by phone and email as listed here:
AutoNDA by SimpleDocs
Breaches of Security. 1. The National Security Authorities shall immediately inform each other in writing of a breach of security resulting in loss, misappropriation or unauthorised disclosure of Classified Information or suspicion of such a breach.
Breaches of Security. The Head of Security shall conduct a mandatory post-incident review of events and actions taken, if any, to make changes in business practices if necessary relating to protection of personal and proprietary information following an incident involving a breach of security. The Head of Security shall document the foregoing and provide a report to executive management. “
Breaches of Security. 8.1 All known or suspected breaches of security in relation to data shared or created under this agreement -such as: misuse or abuse of the system and the data, loss of data, unauthorised processing of the data, including unauthorised disclosure, malicious software attack, denial of service attack- are to be reported to the [Name of Laboratory]’s Information Security Officer, Data Protection Officer and Defra’s core Data Protection Team (xxxx.xxxxxxxxxx@xxxxx.xxx.xx) within 12 hours of one party becoming aware of the breach. Once notified of a breach of security, the relevant officers and staff and the respective Information Assurance Officers, Data Protection Officers and Defra’s core Data Protection Team or equivalent, will undertake an investigation to identify, where possible, who carried out the breach, what information has been compromised and whether the integrity of the system has been compromised.
Time is Money Join Law Insider Premium to draft better contracts faster.