INFORMATION SECURITY BREACH Sample Clauses

INFORMATION SECURITY BREACH. In the event of a Breach of Security as defined in NY CLS Gen Bus §899-aa and NY CLS State Technology Law §208, or otherwise, involving AGENCY supplied Personal Information or Private Information from systems owned, operated, sub-contracted or otherwise routed through Contractors systems or networks, CONTRACTOR shall notify AGENCY immediately, without unreasonable delay. “
AutoNDA by SimpleDocs
INFORMATION SECURITY BREACH. In accordance with the Information and Security Breach Notification Act (ISBNA) (Chapter 442 of the Laws of 2005, as amended by Chapter 491 of the Laws of 2005), a Contractor with BOE shall be responsible for all applicable provisions of the ISBNA and the following terms herein with respect to any private information (as defined in the ISBNA) received by or on behalf of BOE under this Agreement. • Contractor shall supply BOE with a copy of its notification policy, which shall be modified to be in compliance with this provision, as well as BOE’s notification policy. • Contractor must encrypt any database fields and backup tapes that contain private data elements, as set forth in the ISBNA. • Contractor must ensure that private data elements are encrypted in transit to / from their systems. • In general, contractor must ensure that private data elements are not displayed to users on computer screens or in printed reports; however, specific users who are authorized to view the private data elements and who have been properly authenticated may view/receive such data. • Contractor must monitor for breaches of security to any of its systems that store or process private data owned by BOE. • Contractor shall take all steps as set forth in ISBNA to ensure private information shall not be released without authorization from BOE. • In the event a security breach occurs as defined by ISBNA Contractor shall immediately notify BOE and commence an investigation in cooperation with BOE to determine the scope of the breach. • Contractor shall also take immediate and necessary steps needed to restore the information security system to prevent further breaches. • Contractor shall immediately notify BOE following the discovery that XXX’x system security has been breached. • Unless the Contractor is otherwise instructed, Contractor is to first seek consultation and receive authorization from BOE prior to notifying the individuals whose personal identity information was compromised by the breach of security, the New York State Chief Information Security Office, the Department of State Division of Consumer Protection, the Attorney General’s Office or any consuming reporting agencies of a breach of the information security system or concerning any determination to delay notification for law enforcement investigations. • Contractor shall be responsible for providing all notices required by the ISBNA and for all costs associated with providing said notices. • This policy and proce...
INFORMATION SECURITY BREACH. Service Provider shall promptly (inline with the legal and regulatory requirements applicable, whichever is most stringent) notify Flipkart if Service Provider knows or has reason to believe or/and confirmed on there has been any misuse, compromise, loss, or unauthorized disclosure or acquisition of, or access to Flipkart’s confidential data (an “Information Security Breach”). Upon any discovery of an Information Security Breach, the Service Provider shall investigate, remediate, and mitigate the effects of the Information Security Breach, and provide Flipkart with assurances reasonably satisfactory to Flipkart that such Information Security Breach shall not recur. Service Provider shall reasonably cooperate with Flipkart in connection with each of the foregoing and shall comply with any reasonable instructions provided by Flipkart in connection therewith. Flipkart reasonably determines that a third-party security assessment is required in connection with an Information Security Breach. Service Provider shall provide, at Flipkart’s request, any information related to any such Information Security Breach or requested by Flipkart, including but not limited to, vulnerabilities or flaws, start or end date, date of discovery, and specific actions taken to contain and/or mitigate. If any Information Security Breach occurs as a result of an act or omission of a Service Provider or its personnel, the Service Provider shall, at its sole expense, undertake remedial measures.
INFORMATION SECURITY BREACH an Information Security Incident where it is confirmed that a stated organisational policy or legal requirement regarding Information Security has been contravened.
INFORMATION SECURITY BREACH. (a) Subject to the rights of Bayer specified in this Article XXX (Data Security), Supplier shall be responsible for any and all information security incidents involving Personal Data that are handled by, or on behalf of, Supplier.

Related to INFORMATION SECURITY BREACH

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Security of Confidential Information 36.1 In order to ensure that no unauthorised person gains access to any Confidential Information or any data obtained in the performance of the Contract, the Contractor undertakes to maintain security systems approved by the Authority. Any such approval shall not however thereby relieve the Contractor of any liability.

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process:

  • Shareholder Information Services (i) Make information available to shareholder servicing unit and other remote access units regarding trade date, share price, current holdings, yields, and dividend information.

Time is Money Join Law Insider Premium to draft better contracts faster.