Identity Protection Law Sample Clauses

Identity Protection Law. Grantee must have and maintain a formal written information security program that provides safeguards to protect Confidential Information from loss, theft, and disclosure to unauthorized persons, as required by the Oregon Consumer Information Protection Act, ORS 646A.600-646A.628. If Grantee or its agents discover or are notified of a potential or actual “Breach of Security”, as defined by ORS 646A.602(1)(a), or a failure to comply with the requirements of ORS 646A.600 – 628, (collectively, “Breach”) with respect to Confidential Information, Grantee must promptly but in any event within one calendar day (i) notify the Agency Grant Manager of such Breach and (ii) if the applicable Confidential Information was in the possession of Grantee or its agents at the time of such Breach, Grantee must (a) investigate and remedy the technical causes and technical effects of the Breach and (b) provide Agency with a written root cause analysis of the Breach and the specific steps Grantee will take to prevent the recurrence of the Breach or to ensure the potential Breach will not recur. For the avoidance of doubt, if Agency determines notice required of any such Breach to any individual(s) or entity(ies), Agency will have sole control over the timing, content, and method of such notice, subject to Grantee’s obligations under applicable law.
AutoNDA by SimpleDocs
Identity Protection Law. Grantee must have and maintain a formal written information security program that provides safeguards to protect Confidential Information from loss, theft, and disclosure to unauthorized persons, as required by the Oregon Consumer Information Protection Act, ORS 646A.600-628. If Grantee or its agents discover or are notified of a potential or actual “Breach of Security”, as defined by ORS 646A.602(1)(a), or a failure to comply with the requirements of ORS 646A.600-628, (collectively, “Breach”) with respect to Confidential Information, Grantee must promptly but in any event within one calendar day (i) notify the Agency Grant Manager of such Breach and (ii) if the applicable Confidential Information was in the possession of Grantee or its agents at the time of such Breach, Grantee must (a) investigate and remedy the technical causes and technical effects of the Breach and (b) provide Agency with a written root cause analysis of the Breach and the specific steps Grantee will take to prevent the recurrence of the Breach or to ensure the potential Breach will not recur. For the avoidance of doubt, if Agency determines notice is required of any such Breach to any individual(s) or entity(ies), Agency will have sole control over the timing, content, and method of such notice, subject to Grantee’s obligations under applicable law. Subgrants/Contracts. Grantee must require any subgrantees, contractors or subcontractors under this Grant who are exposed to or acquire Confidential Information to treat and maintain such information in the same manner as is required of Grantee under subsections 10.1 and 10.2 of this Section.
Identity Protection Law. City must have and maintain a formal written information security program that provides safeguards to protect Confidential Information from loss, theft, and disclosure to authorized persons, as required by Oregon Consumer Information Protection Act, ORS 646A.600-628. If City or its agents discover or are notified of a potential or actual “Breach of Security”, as defined by ORS 646A.602(1)(a), or a failure to comply with the requirements of ORS 646A.600-628, (collectively, “Breach”) with respect to Confidential Information, City must promptly but in any event within one (1) calendar day (i) notify the Agency’s Authorized Representative of such Breach and (ii) if the applicable Confidential Information was in the possession of City or its agents at the time of such Breach, City must (a) investigate and remedy the technical causes and technical effects of the Breach and (b) provide Agency with a written root cause analysis of the Breach and the specific steps City will take to prevent the recurrence of the Breach or to ensure the potential Breach will not recur. For the avoidance of doubt, if Agency determines notice is required of any such Breach to any individual(s) or entity(ies), agency will have sole control over the timing, content, and method of such notice, subject to City’s obligations under applicable law.
Identity Protection Law. Grantee must have and maintaina formal writteninformation security program that provides safeguards to protect Confidential Information from loss, theft, and disclosure to unauthorized persons, as required by the Oregon Consumer Information Protection Act, ORS 646A.600-628. If Grantee or its agents discover or are notified of a potential or actual “Breach of Security”, as defined by ORS 646A.602(1)(a), or a failure to comply with the requirements of ORS 646A.600-628, (collectively, “Breach”) with respect to Confidential Information, Grantee must promptly but inany event within one calendar day (i) notify the Agency Grant Manager of such Breach and (ii) if the applicable Confidential Information was in the possession of Grantee or its agents at the time of such Breach, Grantee must (a) investigate and remedy the technical causes and technical effects of the Breach and (b) provide Agency with a written root cause analysis of the Breach and the specific steps Grantee will take to prevent the recurrence of the Breach or to ensure the potential Breach will not recur. For the avoidance of doubt, if Agency determines noticeis required of any such Breach to anyindividual(s)or entity(ies), Agency will have sole control over the timing, content, and method of such notice, subject to Grantee’s obligations underapplicable law.
Identity Protection Law. Grantee must have and maintain a formal written information security program that provides safeguards to protect Confidential Information from loss, theft, and disclosure to unauthorized persons, as required by the Oregon Consumer Information Protection Act, ORS 646A.600-646A.628. If Grantee or its agents discover or are notified of a potential or actual “Breach of Security”, as defined by ORS 646A.602(1)(a), or a failure to comply with the requirements of ORS 646A.600 – 628, (collectively, “Breach”) with respect to Confidential Information, Grantee must promptly but in any event within one calendar day (i) notify the Agency Grant Manager of such Breach and (ii) if the applicable Confidential Information was in the possession of Grantee or its agents at the time of such Breach, Grantee must (a) investigate and remedy the technical causes and technical effects of the Breach and

Related to Identity Protection Law

  • Fire Protection Contractor shall take adequate and reasonable precautions to protect the Work against damage by fire and smoke. For example, without limitation, Contractor shall do the following:

  • Data Protection Act 7.1.1 The Supplier shall (and shall procure that its entire Staff) comply with any notification requirements under the DPA and both Parties will duly observe all their obligations under the DPA which arise in connection with the Contract.

  • System Protection To prevent compromise of systems which contain DSHS Data or through which that Data passes:

  • Hearing Protection Hearing protection devices that reduce noise exposure below 90 dba shall be worn in all posted high noise areas, when performing work that generates noise above 90 dba, or when required by CCI Management.

  • Privacy Protection Each of the Corporation and the Subsidiaries have security measures and safeguards in place to protect personal information it collects from registered patients and customers and other parties from illegal or unauthorized access or use by its personnel or third parties or access or use by its personnel or third parties in a manner that violates the privacy rights of third parties. The Corporation and the Subsidiaries have complied, in all material respects, with all applicable privacy and consumer protection legislation and neither has collected, received, stored, disclosed, transferred, used, misused or permitted unauthorized access to any information protected by privacy laws, whether collected directly or from third parties, in an unlawful manner. The Corporation and the Subsidiaries have taken all reasonable steps to protect personal information against loss or theft and against unauthorized access, copying, use, modification, disclosure or other misuse.

Time is Money Join Law Insider Premium to draft better contracts faster.