Investigating incidents Sample Clauses

Investigating incidents. All students will be required to write an incident form and some may be verbally asked questions to verify or clarify their statements. This information will be collated and carefully examined before any decisions are made. We will ensure that relevant staff receive adequate and appropriate training for the conduct of any investigations, including in respect of the recording of evidence and the taking of incident statements. • We will provide adequate non-contact time for the conduct of investigations. • We will notify the police and other relevant bodies of incidents where it is appropriate to do so. • We will complete all investigations within a reasonable timescale which will not normally exceed five days. • We will ensure that appropriate feedback from any investigation undertaken is provided to relevant persons together with recommendations for action. • We will offer anonymity where possible, but this may not always be viable.
AutoNDA by SimpleDocs
Investigating incidents. “Post Mortem” Detection Computer security incidents can be detected either on the network layer or on the compromised host. In both cases the following steps have to be taken: Evidence for a security incident: Is the recorded event really a security incident or does it only look like one? For example, a legitimate traffic rush might cause an anomaly on the network. Therefore, the first step is to find evidence of a compromise or malicious event. Extent of the incident: The extent of the incident must be investigated. The incident often affects more than one host. As compromised machines are usually abused to attack other systems on Internet, it is crucial to determine the full extent of an incident. This can be done in the following ways: ○ Analysis of netflows: If the incident was detected on the network layer, the netflows from and to the affected host or network reveal other involved systems. For example, the netflows to an attacked host can identify hosts that are involved in a DDoS attack. The same technique can be applied to explore the extent of a botnet following the netflows to or from the C&C server. ○ Forensic analysis of a compromised host: This aims to identify the vulnerability which has been abused in order to compromise the system. The vulnerability needs to be known to recover from the incident without taking the risk of a re- infection. The forensic analysis also aims to explore the activity of the attacker on the compromised system. This may reveal malware or recorded logfiles the attacker left behind, which can be used to identify other systems affected by the incident.

Related to Investigating incidents

  • Reporting Incidents The Interconnection Parties shall report to each other in writing as soon as practical all accidents or occurrences resulting in injuries to any person, including death, and any property damage arising out of the Interconnection Service Agreement.

  • Investigation of Accidents The Occupational Health and Safety Committees, as provided in Clause 22.2, shall be notified of each accident or injury and shall investigate and report to the Union and Employer on the nature and cause of the accident or injury. In the event of a fatality the Employer shall immediately notify the President of the nature and circumstances of the accident.

  • Complaints Investigation ‌ An employee who complains of harassment under the provisions of the Human Rights Code of British Columbia may refer the complaint to either one or other of the following processes:

  • Data Incidents Merchant must report all instances of a Data Incident (as defined in the American Express Merchant Operating Guide) immediately to ISO after discovery of the incident. Merchant must ensure data quality and that Transaction Data and customer information is processed promptly, accurately, and completely, and complies with the American Express Technical Specifications. THE FOLLOWING SERVICES ARE PROVIDED BY ISO ONLY. Bank shall not have any obligation or liability of any nature in connection with such services. PART THREE

  • Investigation of Grievances The investigation of grievances shall not interfere with the orderly process of education in District 281.

  • Investigatory Interview When the employee under investigation is to be interviewed concerning the alleged conduct which could result in discharge or other discipline, the employee and his or her representative shall be notified in writing, at least forty-eight (48) hours prior to the interview. In the event of an emergency, such reasonable notice as the circumstances permit shall be given. The notice shall state that an official investigation is being conducted and shall state the subject matter of the investigatory interview.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

  • Investigatory Interviews When an employee is required by the City to attend an interview conducted by the City for purposes of investigating an incident which may lead to discipline/discharge of that employee because of that particular incident, the employee shall have the right to request that the employee be accompanied at the investigatory interview by a representative of the Union. If the employee makes such a request, the request shall be made to the City representative conducting the investigatory interview. The City, when faced with such a request, may:

  • Adverse Weather Shall be only weather that satisfies all of the following conditions: (1) unusually severe precipitation, sleet, snow, hail, or extreme temperature or air conditions in excess of the norm for the location and time of year it occurred based on the closest weather station data averaged over the past five years, (2) that is unanticipated and would cause unsafe work conditions and/or is unsuitable for scheduled work that should not be performed during inclement weather (i.e., exterior finishes), and (3) at the Project.

  • Defense of Third Party Claims Upon receipt by the Indemnifying Party of a notice from the Indemnified Party with respect to any claim of a third party against the Indemnified Party, for which the Indemnified Party seeks indemnification hereunder, the Indemnifying Party shall have the right to assume the defense of such claim, and the Indemnified Party shall cooperate to the extent reasonably requested by the Indemnifying Party in defense or prosecution thereof and shall furnish such records, information and testimony and attend all such conferences, discovery proceedings, hearings, trials and appeals as may be reasonably requested by the Indemnifying Party in connection therewith. If the Indemnifying Party shall elect to assume the defense of such claim, the Indemnified Party shall have the right to employ its own counsel in any such case, but the fees and expenses of such counsel shall be at the expense of the Indemnified Party. If the Indemnifying Party has assumed the defense of any claim against the Indemnified Party, the Indemnifying Party shall have the right to settle any claim for which indemnification has been sought and is available hereunder; provided that, to the extent that such settlement requires the Indemnified Party to take, or prohibits the Indemnified Party from taking, any action or purports to obligate the Indemnified Party, then the Indemnifying Party shall not settle such claim without the prior written consent of the Indemnified Party, such consent not to be unreasonably withheld, conditioned or delayed. If the Indemnifying Party does not assume the defense of a third party claim and disputes the Indemnified Party’s right to indemnification, the Indemnified Party shall have the right to assume control of the defense of such claim through counsel of its choice, the reasonable costs of which shall be at the Indemnifying Party’s expense in the event that the Indemnified Party’s right of indemnification is ultimately established through settlement, compromise or other legal proceeding. In no circumstance may the Indemnified Party compromise or settle a claim with a third party for which it seeks indemnification from the Indemnifying Party without first obtaining the prior written consent of the Indemnifying Party, such consent not to be unreasonably withheld, conditioned or delayed.

Time is Money Join Law Insider Premium to draft better contracts faster.