Cyber-attack Clause Samples

POPULAR SAMPLE Copied 5 times
Cyber-attack. The Supplier represents and warrants that before signing the Contract DALO has been provided with information regarding any cyber attacks the Supplier has been exposed to, where the firewall has been broken down or where the Supplier suspects that the attack was targeted on the Contract. The Supplier represents and warrants that in the event the Supplier is exposed to cyber attacks, where the firewall has been broken down or where the Supplier suspects that the attack was targeted on this Contract after signing the Contract the Supplier shall provide hereon information to DALO within 3 (three) Days from the occurrence of the attack / the Suppliers awareness of the attack. The information given to DALO about the attack shall in detail describe the attack, inclu d- ing a list of the data, documents, pictures etc. that could have been compromised.
Cyber-attack. Issue I- 1. Cyber-warfare: Most developed nations cur- rently posess a national agency engaged in defence, and attack, through the Internet, against the cyberspace services and resources of rival nations. These agencies seek to gain access and defend against access by others to public and secret information about technology (especially military technology), politics and commerce. Such agencies also fre- quently engage in disruption of the same systems. Probably the most famous example of such activity is the development and deployment of the Stuxnet virus (actually called the Olympic Games virus by its developers) [10], [?] . Stuxnet is a very sophisticated malware program de- signed to attack industrial cyber-physical systems [9]. It tar- getted a specific industrial laboratory – the Natanz uranium enrichment plant [9]. The challenge was that this plant is completely isolated from the Internet [2]. Stuxnet is designed to be autonomous [10]. It used four zero day exploits [2], which made it difficult to detect or prevent using the security technologies available at the time. The development and deployment of Stuxnet has been noted as a major backward step in the standard of behaviour that might be expected in cyberspace. Any agreement, tech- nology, or architecture that is able to prevent recurrences of this behaviour will be universally applauded, but it is unlikely that any nation will adopt measures which do that unless they can be certain that these measures apply to all entities equally. Cyberwarfare is the most critical of all the issues we consider, and also has the greatest natural association with the question of regulating good behaviour. If a social contract can help us with this issue, it deserves our strong support. Viruses are developed by state actors, such as the agen- cies referred to in I-1, by criminal organisations, working to generate income by extortion or fraud, and by individuals.
Cyber-attack. The Lessor represents and warrants that before signing the Contract DALO has been provided with information regarding any cyber-attacks the Lessor has been exposed to, where the firewall has been broken down or where the Lessor suspects that the attack was targeted on the Contract. The Lessor represents and warrants that in the event the Lessor is exposed to cyber-attacks, where the firewall has been broken down or where the Lessor suspects that the attack was targeted on this Contract after signing the Contract the Lessor shall provide hereon information to DALO within 3 (three) Days from the occurrence of the attack / the Lessors awareness of the attack. The information given to DALO about the attack shall in detail describe the attack, including a list of the data, documents, pictures etc. that could have been compromised.
Cyber-attack an act or attempt by a third party to expose, alter, disable, destroy, steal or gain unauthorised access to or make unauthoriseduse of computer informationsystems, infrastructures, computer networks, or personal computingdevices.
Cyber-attack. In the event that Seller or any of its personnel become aware of or suspect a data security breach, an unauthorized access, use, loss, theft, damage or acquisition of Buyer’s data, or any other event that compromises the security, confidentiality or integrity of Buyer’s data (“Incident”), Seller shall (a) promptly communicate the nature of the Incident to Buyer; (b) assist Buyer with mitigating the damages resulting from the Incident; and (c) allow Buyer to have sole control over the timing, content, and method of providing notification to the impacted individuals and governmental authorities, if applicable. In addition to any other remedies available to Buyer under this Agreement, in law or in equity, for any Incident resulting, in whole or in part, from the acts or omissions of Seller or its personnel, Seller shall: (i) take any corrective actions necessary to remedy the Incident; and (ii) reimburse Buyer for its costs and expenses relating to the Incident such as (1) Buyer’s costs incurred in notifying impacted individuals, governmental authorities, and credit bureaus, (2) Buyer’s attorneys’ fees and public relations’ fees incurred in response to the Incident; (3) Buyer’s costs of obtaining credit monitoring services and identity theft insurance for the benefit of the impacted individuals; (4) call center support to notify impacted individuals; (5) all fines, penalties or charges assessed by any governmental entity; and (6) forensic IT services and e-discovery services used by Buyer relating to the Incident, where (1)-(6) are deemed direct damage and are not subject to any caps on liability or exclusion of damages set forth elsewhere in this Agreement or in any other document or agreement (if any).
Cyber-attack. In the event of a Cyber Attack, Recipient must allow (and must ensure that its Subcontractors allow) Discloser and other government bodies such as Digital Victoria (CIRS), OVIC, ACSC and OAIC, and third parties nominated by Discloser to have full visibility of and be involved in incident response, incident analysis, incident recovery and post-incident reviews, as well as request and receive copies of breached data sets.
Cyber-attack. ▇▇ updated on the member communications following a cyber attack on their third party administrator. The Environment Agency (EA) has created a Cyber incident hub on their member website full of useful information. EA has offered an enhanced Experian service to members who are affected. This allows them to check for their details being used to open new accounts. ▇▇ offered to answer help any other fund with communications if they suffer a cyber attack.

Related to Cyber-attack

  • Network Authorization For services that cannot be provided by a network provider, you can request a network authorization to seek services from a non-network provider. With an approved network authorization, the network benefit level will apply to the authorized covered healthcare service. If we approve a network authorization for you to receive services from a non- network provider, our reimbursement will be based on the lesser of our allowance, the non-network provider’s charge, or the benefit limit. For more information, please see the How Non-Network Providers Are Paid section.

  • Catalog Information about Hawthorn University is published in a school catalog that contains a description of certain policies, procedures, and other information about the school. Hawthorn University reserves the right to change any provision of the catalog at any time. Notice of changes will be communicated in a revised catalog, an addendum or supplement to the catalog, or other written format. Students are expected to read and be familiar with the information contained in the school catalog, in any revisions, supplements and addenda to the catalog, and with all school policies. By enrolling in Hawthorn University, the student agrees to abide by the terms stated in the catalog and all school policies.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Developer Attachment Facilities Developer shall design, procure, construct, install, own and/or control the Developer Attachment Facilities described in Appendix A hereto, at its sole expense.

  • Contract Database Metadata Elements Title: Sayville Union Free School District and Sayville Union Free School Custodial and Maintenance Employees Unit, United Public Service Employees Union (UPSEU), Local 424 (2011) Employer Name: Sayville Union Free School District Union: Sayville Union Free School Custodial and Maintenance Employees Unit, United Public Service Employees Union (UPSEU) Local: 424 Effective Date: 07/01/2011 Expiration Date: 06/30/2015 PERB ID Number: 6131 Unit Size: 55 Number of Pages: 24 For additional research information and assistance, please visit the Research page of the Catherwood website - ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇▇▇▇.▇▇▇/library/research/ For additional information on the ILR School - ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇▇▇▇.▇▇▇/ 55 People TABLE OF CONTENTS ARTICLE Page XXII ANNUAL LEAVE DAYS 14 XXV BREAKS 18 XXVI CIVIL SERVICE LAW ARTICLE SECTION 75 18 XXVIII DURATION 19 XIV EMERGENCY WORK 11 XXI FOUL WEATHER CLOTHING 14 XI GRIEVANCE PROCEDURE 9 XVI HIGHER JOB CLASSIFICATION 12 XVIII HOLIDAYS 13 XV HOLIDAY AND WEEKEND BUILDING CHECKS 12 V INSURANCE 4 X LAYOFF, DISPLACEMENT AND RECALL ORDER 8 VII MANAGEMENT RIGHTS 7 XXVII MISCELLANEOUS 19 XVII NOTICES OF PROMOTIONS 13 XIII OVERTIME 10 II PAYROLL DEDUCTIONS 1 III PERSONNEL FILES 2 XXIV PHYSICAL EXAMINATIONS 18 XXIII RETIREMENT 16 IX STRIKES AND LOCKOUTS 7 XIX VACATIONS 13 XX VISITATION 14 IV WAGES 3 VI WORKERS' COMPENSATION 6 XII WORKWEEK 10 VIII WRITTEN BOARD POLICY 8 APPENDIX A 20 4/20/2016 AGREEMENT made and entered into this day of November 2013 between the SAYVILLE UNION FREE SCHOOL DISTRICT (hereinafter referred to as the “District”) and United Public Service Employees Union, ▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇, ▇▇▇▇▇▇▇▇▇▇, N.Y. 11779 (hereinafter referred to as the “Union”).