Cyber Security Event Sample Clauses

Cyber Security Event. An identified occurrence of a system, service or network state indicating a potential or actual breach of Sensitive and Classified Information security procedures, processes and requirements, a failure of Sensitive and Classified Information security procedure, process and requirement safeguards or a previously unknown or unencountered occurrence of a system, service or network state which is or may be relevant to Sensitive and Classified Information security procedures, processes and requirements. Cyber Security Incident A single or series of unwanted or unexpected Cyber Security Events that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.
AutoNDA by SimpleDocs
Cyber Security Event. An identified occurrence of a system, service or network state indicating a potential or actual breach of Sensitive and Classified Information security procedures, processes and requirements, a failure of Sensitive and Classified Information security procedure, process and requirement safeguards or a previously unknown or unencountered occurrence of a system, service or network state which is or may be relevant to Sensitive and Classified Information security procedures, processes and requirements. Cyber Security Incident A single or series of unwanted or unexpected Cyber Security Events that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security. Data Provision Checklist The worksheets contained within the excel workbook titled "Data Provision Checklist" available at xxxxx://xxx.xxxxxxx.xxx.xx/XxxxxxXxxxxxxxxx/xxxxxxxxx/XxxxXxxxxxxxXxxxxxxx/Xxxxxxx.xxx, as updated, superseded or replaced from time to time. Data Supplier Any person identified as a "Data Supplier" or "Estate Data Supplier" in the Defence Estate Information Management Requirements, including a contract administrator, designer, contractor, subcontractor or any person engaged by the Commonwealth to design, construct or otherwise provide services in relation to the Works or a Stage.
Cyber Security Event. An identified occurrence of a system, service or network state indicating a potential or actual breach of Sensitive and Classified Information security procedures, processes and requirements, a failure of Sensitive and Classified Information security procedure, process and requirement safeguards or a previously unknown or unencountered occurrence of a system, service or network state which is or may be relevant to Sensitive and Classified Information security procedures, processes and requirements. Cyber Security Incident A single or series of unwanted or unexpected Cyber Security Events that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security. day For the purposes of: the Panel Agreement, means calendar day; the Terms of Engagement and any Engagement, has the meaning set out in clause 1.1 of the Terms of Engagement. Defence Department of Defence. Defence Estate and Infrastructure Group or EIG Defence Estate and Infrastructure Group within the Department of Defence. Defence Security Manual Is a reference to that document as amended from time to time. Defence Strategic Interest Issue Means any issue that involves an actual, potential or perceived risk of an adverse effect on the interests of the Commonwealth including: protecting Australia’s national security requirements, in accordance with all Commonwealth Requirements and Statutory Requirements (including the Australian Government Protective Security Policy, the Australian Government Protective Security Framework, the Australian Government Protective Security Manual, the Australian Government Physical Security Management Protocol, the Australian Government Personnel Security Management Protocol, the Australian Government Information Security Manual and the Defence Security Manual); ensuring that the whole (or any part of) the Confidential Information is not exported (or capable of being exported) outside of Australia or is not disclosed or transmitted (or capable of being disclosed or transmitted) to any person who does not hold (or is not eligible to hold) an Australian Defence security clearance, unless the Commonwealth has given its prior written consent (in its absolute discretion); and ensuring compliance by the Consultant with Australia’s national security requirements, in accordance with all Commonwealth Requirements and Statutory Requirements (including the Australian Government Protective Secu...
Cyber Security Event. An observable, measurable occurrence in respect to an information asset that is a deviation from normal operations.
Cyber Security Event. An identified occurrence of a system, service or network state indicating a potential or actual breach of Sensitive and Classified Information security procedures, processes and requirements, a failure of Sensitive and Classified Information security procedure, process and requirement safeguards or a previously unknown or unencountered occurrence of a system, service or network state which is or may be relevant to Sensitive and Classified Information security procedures, processes and requirements. Cyber Security Incident A single or series of unwanted or unexpected Cyber Security Events that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security. day For the purposes of: the Panel Agreement, means calendar day; the Terms of Engagement and any Engagement, has the meaning set out in clause 1.1 of the Terms of Engagement. Defence Department of Defence. Defence Estate and Infrastructure Group or EIG Defence Estate and Infrastructure Group within the Department of Defence. Defence Security Manual Is a reference to that document as amended from time to time.
Cyber Security Event. An identified occurrence of a system, service or network state indicating a potential or actual breach of Sensitive and Classified Information security procedures, processes and requirements, a failure of Sensitive and Classified Information security procedure, process and requirement safeguards or a previously unknown or unencountered occurrence of a system, service or network state which is or may be relevant to Sensitive and Classified Information security procedures, processes and requirements. Cyber Security Incident A single or series of unwanted or unexpected Cyber Security Events that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security. Data Provision Checklist The worksheets contained within the excel workbook titled "Data Provision Checklist" available at xxxxx://xxx.xxxxxxx.xxx.xx/EstateManagement/lifecycle/PlanHandoverTakeover/Default.asp, as updated, superseded or replaced from time to time Data Supplier Any person identified as a "Data Supplier" or "Estate Data Supplier" in the Defence Estate Information Management Requirements, including a contract administrator, designer, contractor, subcontractor or any person engaged by the Commonwealth to design, construct or otherwise provide services in relation to the Works or a Stage.

Related to Cyber Security Event

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Server Security Servers containing unencrypted PHI COUNTY discloses to 4 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 5 must have sufficient administrative, physical, and technical controls in place to protect that data, based 6 upon a risk assessment/system security review.

  • Liquidity Event If there is a Liquidity Event before the termination of this Safe, this Safe will automatically be entitled (subject to the liquidation priority set forth in Section 1(d) below) to receive a portion of Proceeds, due and payable to the Investor immediately prior to, or concurrent with, the consummation of such Liquidity Event, equal to the greater of (i) the Purchase Amount (the “Cash-Out Amount”) or (ii) the amount payable on the number of shares of Common Stock equal to the Purchase Amount divided by the Liquidity Price (the “Conversion Amount”). If any of the Company’s securityholders are given a choice as to the form and amount of Proceeds to be received in a Liquidity Event, the Investor will be given the same choice, provided that the Investor may not choose to receive a form of consideration that the Investor would be ineligible to receive as a result of the Investor’s failure to satisfy any requirement or limitation generally applicable to the Company’s securityholders, or under any applicable laws. Notwithstanding the foregoing, in connection with a Change of Control intended to qualify as a tax-free reorganization, the Company may reduce the cash portion of Proceeds payable to the Investor by the amount determined by its board of directors in good faith for such Change of Control to qualify as a tax-free reorganization for U.S. federal income tax purposes, provided that such reduction (A) does not reduce the total Proceeds payable to such Investor and (B) is applied in the same manner and on a pro rata basis to all securityholders who have equal priority to the Investor under Section 1(d). In connection with Section 1(b)(i) , the Purchase Amount will be due and payable by the Company to the Investor immediately prior to, or concurrent with, the consummation of the Liquidity Event. If there are not enough funds to pay

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS.

  • Authority Event of Default Any of the following events shall constitute an event of default by the Authority ("Authority Event of Default”), when not caused by a Developer Event of Default:

  • Data Disposition When the contracted work has been completed or when the Data is no longer needed, except as noted above in Section 5.b, Data shall be returned to DSHS or destroyed. Media on which Data may be stored and associated acceptable methods of destruction are as follows: Data stored on: Will be destroyed by: Server or workstation hard disks, or Removable media (e.g. floppies, USB flash drives, portable hard disks) excluding optical discs Using a “wipe” utility which will overwrite the Data at least three (3) times using either random or single character data, or Degaussing sufficiently to ensure that the Data cannot be reconstructed, or Physically destroying the disk Paper documents with sensitive or Confidential Information Recycling through a contracted firm, provided the contract with the recycler assures that the confidentiality of Data will be protected. Paper documents containing Confidential Information requiring special handling (e.g. protected health information) On-site shredding, pulping, or incineration Optical discs (e.g. CDs or DVDs) Incineration, shredding, or completely defacing the readable surface with a coarse abrasive Magnetic tape Degaussing, incinerating or crosscut shredding

  • Payment of the Grant 8.1 The Commonwealth agrees to pay the Grant to the Grantee in accordance with the Grant Details.

  • Default Events (a) Any material breach of the Funding Agreement by the Recipient, including those set out below, will be an event of default (“Default Event”):

  • Flip-in Event (a) Subject to Subsection 3.1(b) and Section 5.1, in the event that prior to the Expiration Time a Flip-in Event shall occur, each Right shall constitute, effective at the close of business on the tenth Trading Day after the Share Acquisition Date, the right to purchase from the Company, upon exercise thereof in accordance with the terms hereof, that number of Shares having an aggregate Market Price on the date of consummation or occurrence of such Flip-in Event equal to twice the Exercise Price for an amount in cash equal to the Exercise Price (such right to be appropriately adjusted in a manner analogous to the applicable adjustment provided for in Section 2.3 in the event that after such consummation or occurrence, an event of a type analogous to any of the events described in Section 2.3 shall have occurred).

Time is Money Join Law Insider Premium to draft better contracts faster.