Computer Security Incident Response Sample Clauses

Computer Security Incident Response o Have a detailed, documented plan for responding to computer security incidents that includes processes and procedures for assessing the severity of the incident, identifying the cause of the incident, repairing the cause of the incident, restoring normal operations, and documenting the results of the response o Report the detection of any computer security incident involving the networks, systems, or applications used to provide services under this Agreement to Customer within 2 hours of discovery, if such incident jeopardizes Customer security or Data confidentiality, and provide regular status updates at four-hour intervals (or at mutually agreed upon times throughout the day) for the duration of the incident. This report must be made by calling 1-800 MER HELP (637 4357). The attendant will input a trouble ticket and route it to the IS&P queue. o Provide Customer, within five (5) Business Days of the closure of the incident, with a written report describing the incident, actions taken during the response, and plans for future actions to prevent a similar incident from occurring in the future.
AutoNDA by SimpleDocs

Related to Computer Security Incident Response

  • INDIRECT/SPECIAL/CONSEQUENTIAL DAMAGES Notwithstanding any other provision set forth herein, in no event shall the Custodian be liable for any special, indirect, incidental, punitive or consequential damages of any kind whatsoever (including, without limitation, lost profits) with respect to the services provided pursuant to this Agreement, regardless of whether either party has been advised of the possibility of such damages.

  • Security Against Unauthorized Use of Funds’ Recordkeeping Systems Financial Intermediary agrees to provide such security as is necessary to prevent any unauthorized use of the Funds’ recordkeeping system, accessed via (a) the world wide web or any URL maintained by the Funds or JPMDS, (b) a networking/data access arrangement or (c) computer hardware or software provided to Financial Intermediary by JPMDS.

  • Business Interruption Plan ALPS shall maintain in effect a business interruption plan, and enter into any agreements necessary with appropriate parties making reasonable provisions for emergency use of electronic data processing equipment customary in the industry. In the event of equipment failures, ALPS shall, at no additional expense to the Fund, take commercially reasonable steps to minimize service interruptions.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Mail Service Interruption If by reason of any interruption of mail service, actual or threatened, any notice to be given to the Trustee would reasonably be unlikely to reach its destination by the time notice by mail is deemed to have been given pursuant to Section 14.3, such notice shall be valid and effective only if delivered at the appropriate address in accordance with Section 14.3.

  • Description of Services (a) Services Provided on an Ongoing Basis, If Applicable.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Substantial Damage Upon the occurrence of Substantial Damage (as hereinafter defined) to the Property after the Effective Date and before the Closing Date, Seller shall promptly deliver notice thereof to Purchaser, and Purchaser may, at its option, either (a) terminate this Agreement by written notice thereof given to Seller and Escrow Agent within fifteen (15) days after receipt of notice from Seller as to such Substantial Damage, whereupon the Deposit will be returned to Purchaser, and the parties shall have no further obligations under this Agreement, except for those which expressly survive any termination of this Agreement, or (b) proceed to close the transaction contemplated herein without any delay pursuant to the terms hereof, in which event Seller shall deliver to Purchaser at the Closing, or as soon as available, any insurance proceeds actually received by Seller and attributable to the Property damaged by such casualty (other than on account of business or rental interruption relating to the period prior to Closing but including all business or rental interruption relating to the period on or after Closing), shall assign to Purchaser any right it may have to receive insurance proceeds attributable to the Property damaged by such casualty (other than on account of business or rental interruption relating to the period prior to Closing but including all business or rental interruption relating to the period on or after Closing), and Purchaser shall receive a credit against the Purchase Price in the amount of the deductible. If Purchaser has not terminated this Agreement due to the Substantial Damage, Seller shall timely file and process a claim respecting the Substantial Damage with its insurer, but shall not settle or adjust the claim without obtaining Purchaser’s approval, which shall not be unreasonably withheld, delayed or conditioned. For purposes of this Agreement, “Substantial Damage” shall mean any casualty or loss resulting in a repair expense in excess of Two Hundred Fifty Thousand Dollars ($250,000.00) or any damage which results in the Franchisor refusing to enter into the New Franchise Agreement. If the Scheduled Closing Date is less than the full fifteen (15) day period for Purchaser to make its determination of whether to terminate or close, the Scheduled Closing Date shall be extended to five (5) business days after expiration of the full fifteen (15) day period.

  • Loss of Note Upon receipt by the Company of evidence satisfactory to it of the loss, theft, destruction or mutilation of this Note or any Note exchanged for it, and indemnity satisfactory to the Company (in case of loss, theft or destruction) or surrender and cancellation of such Note (in the case of mutilation), the Company will make and deliver in lieu of such Note a new Note of like tenor.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

Time is Money Join Law Insider Premium to draft better contracts faster.