Notification and Data Breaches Sample Clauses

Notification and Data Breaches. Vendor agrees to comply with all applicable laws that require the notification of individuals in the event of unauthorized release of personally identifiable information or other event requiring notification. In the event of a data breach of any Vendor's security obligations or other event requiring notification under applicable law, Vendor agrees to assume responsibility for informing all such individuals in accordance with applicable laws and to indemnify, hold harmless and defend FIU against any claims, damages, or other harm related to such event.
AutoNDA by SimpleDocs
Notification and Data Breaches. For purposes of this article, the term, “Breach,” has the meaning given to it under the applicable Florida (F.S. 501.171) or federal law. Immediately upon discovery of a confirmed or suspected Breach, Contractor shall report both orally and in writing to FIU. In no event shall the report be made more than two (2) business days after Contractor knows or reasonably suspects a Breach has or may have occurred. In the event of a suspected Breach, Contractor shall keep FIU informed regularly of the progress of its investigation until the uncertainty is resolved. Contractor’s report shall identify: (i) The nature of the unauthorized access, use or disclosure, (ii) The data accessed, used or disclosed, (iii) The person(s) who accessed, used and disclosed and/or received data (if known), (iv) What Contractor has done or will do to mitigate any deleterious effect of the unauthorized access, use or disclosure, and (v) What corrective action Contractor has taken or will take to prevent future unauthorized access, use or disclosure. Contractor shall provide such other information, including a written report, as reasonably requested by FIU. In the event of a Breach, Contractor will: (1) immediately preserve any potential forensic evidence relating to the breach; (2) promptly (within 2 business days) designate a contact person to whom FIU will direct inquiries, and who will communicate Contractor responses to FIU inquiries; (3) as rapidly as circumstances permit, apply appropriate resources to remedy the breach condition, investigate, document, restore FIU service(s) as directed by FIU, and undertake appropriate response activities; (4) provide status reports to FIU on Breach response activities, either on a daily basis or a frequency approved by FIU;
Notification and Data Breaches to comply with all applicable laws that require the notification of individuals in the event of unauthorized release of personally identifiable information or other event requiring notification in accordance therewith. In the event of a data breach of any Vendor’s security obligations or other event requiring notification under applicable law (a “Notification Event”), Vendor agrees to assume responsibility for informing all such individuals in accordance with applicable laws and to indemnify, hold harmless and defend FIU against any claims, damages, or other harm related to such Notification Event.
Notification and Data Breaches to comply with all applicable laws that require the notification of individuals in the event of unauthorized release of personally identifiable information or other event requiring notification in accordance therewith. In the event of a data breach of any Contractor’s security obligations or other event requiring notification under applicable law (a “Notification Event”), Contractor agrees to assume responsibility for informing all such individuals in accordance with applicable laws and to indemnify, hold harmless and defend UWF against any claims, damages, or other harm related to such Notification Event.

Related to Notification and Data Breaches

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process:

  • Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Notification of Breach During the term of this Agreement:

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Termination and Breach 13.1 The termination of this Agreement or any part thereof however caused and the serving of notice to terminate shall be without prejudice to any obligations or rights of any of the parties which have accrued prior to such termination and shall not affect any provision of this Agreement which is expressly or by implication provided to come into effect on or to continue in effect after such termination

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • Notification of Breach / Compliance Reports The Adviser shall notify the Trust immediately upon detection of (i) any material failure to manage any Fund in accordance with its investment objectives and policies or any applicable law; or (ii) any material breach of any of the Funds’ or the Adviser’s policies, guidelines or procedures. In addition, the Adviser shall provide a quarterly report regarding each Fund’s compliance with its investment objectives and policies, applicable law, including, but not limited to the 1940 Act and Subchapter M of the Code, as applicable, and the Fund’s policies, guidelines or procedures as applicable to the Adviser’s obligations under this Agreement. The Adviser agrees to correct any such failure promptly and to take any action that the Board may reasonably request in connection with any such breach. Upon request, the Adviser shall also provide the officers of the Trust with supporting certifications in connection with such certifications of Fund financial statements and disclosure controls pursuant to the Xxxxxxxx-Xxxxx Act. The Adviser will promptly notify the Trust in the event (i) the Adviser is served or otherwise receives notice of any action, suit, proceeding, inquiry or investigation, at law or in equity, before or by any court, public board, or body, involving the affairs of the Trust (excluding class action suits in which a Fund is a member of the plaintiff class by reason of the Fund’s ownership of shares in the defendant) or the compliance by the Adviser with the federal or state securities laws or (ii) an actual change in control of the Adviser resulting in an “assignment” (as defined in the 0000 Xxx) has occurred or is otherwise proposed to occur.

  • BREACH DISCOVERY AND NOTIFICATION 23 1. Following the discovery of a Breach of Unsecured PHI, CONTRACTOR shall notify 24 COUNTY of such Breach, however both parties agree to a delay in the notification if so advised by a 25 law enforcement official pursuant to 45 CFR § 164.412.

  • Personal Data Breaches 5.7.1 The Data Processor shall give immediate notice to the Data Controller if a breach occurs, that can lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to, personal data transmitted, stored or otherwise processed re the Personal Data processed on behalf of the Data Controller (a “Personal Data Breach”).

Time is Money Join Law Insider Premium to draft better contracts faster.