Other incidents Sample Clauses

Other incidents. NTT will notify Client promptly if NTT becomes aware of:
AutoNDA by SimpleDocs
Other incidents. Security Incidents do not include any incident that results in no unauthorized access to Customer Data (as defined in the MSA) or to Khoros’s Applications, websites, or cloud servers involving pings and other broadcast attacks on firewalls or edge servers, phishing (even if successful), port scans, unsuccessful log-on attempts, denial of service attacks, packet sniffing (or other unauthorized access to traffic data that does not result in access beyond headers), or similar incidents not caused by any fault of Khoros. These incidents shall not be considered a breach of this DPA, the MSA, or SLA. Nonetheless, to the extent that a successful phishing attack leads to the compromise of Personal Data, Khoros will work with Customer to fulfil any ADPL reporting requirements.
Other incidents. Vendor will notify NTT promptly if Vendor becomes aware of:
Other incidents. The following matters or events are classified as Other Incidents:
Other incidents. Security Incidents do not include any incident that results in no unauthorized access, destruction, loss, or alteration to Customer Data or to Khoros’s Services, websites, or cloud servers involving pings and other broadcast attacks on firewalls or edge servers, phishing (even if successful), port scans, unsuccessful log-on attempts, denial of service attacks, packet sniffing (or other unauthorized access to traffic data that does not result in access beyond headers), or similar incidents not caused by any fault of Khoros. These incidents shall not be considered a breach of this DPA, the MSA, or SLA. Nonetheless, to the extent that a successful phishing attack leads to the compromise of Personal Data, Xxxxxx will work with Customer to fulfil any ADPL reporting requirements.
Other incidents. Verizon or Customer can create Other Incident tickets for service related incidents on the Serviced Devices that are not related to an Availability or Health incident. They can be logged on a 24x7 basis.
Other incidents. Lost or stolen patient-identifiable information (records, prescriptions). It’s not just accidents and hazards that should be reported. Errors or oversights in practice should also be reported to provide a clear record of what has occurred and how it can be prevented in the future. The incident reporting form should be completed as soon as possible after the event. An incident report should be an objective account of what happened. Ideally the person directly involved in the incident should complete the form, but any pharmacy staff member can do it. A Care Trust incident report form must be completed in addition to any internal reporting procedures within the pharmacy/company. Incident reporting and monitoring should be a supportive process and is not about “blame”.
AutoNDA by SimpleDocs
Other incidents. 5) Maintenance (Scheduled and Urgent) The standard time for scheduled operations (maintenance) is from 21.00 to 06.00 hours on Saturday and Sunday and from 00.00 to 06.00 from Monday to Friday in Estonian time. Table 1. Agreed interruptions and notifications № Position Indicators Notification of the Customer Additional terms 1 Scheduled operations performance The total duration of breaks is not more than 6 hours per year. The intervals between the breaks - not less than 90 calendar days At least 48 hours before the break Time of operations is agreed with the Customer 2 Urgent operations performance The break time is equal to the actual time of work At least 12 hours before the break The estimated duration of operations is reported to the Customer The CONTRACTOR shall inform the CUSTOMER about all the interruptions in the services provision with indication of the time when the service provision will be interrupted, as well as the time of service restoration:

Related to Other incidents

  • Data Incidents If Apple becomes aware that Personal Data has been altered, deleted, or lost as a result of any unauthorized access to the Service (a “Data Incident”), Apple will notify Institution without undue delay if required by law, and Apple will take reasonable steps to minimize harm and secure the data. Notification of, or response to, a Data Incident by Apple will not be construed as an acknowledgment by Apple of any responsibility or liability with respect to a Data Incident. Institution is responsible for complying with applicable incident notification laws and fulfilling any third-party obligations related to Data Incident(s). Apple will not access the contents of Personal Data in order to identify information subject to any specific legal requirements.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • Significant Incidents In addition to notifying the appropriate authorities, Grantee will submit notice to the SUD email box, XxxxxxxxxXxxxx.Xxxxxxxxx@xxxx.xxxxx.xx.xx and Substance Use Xxxxxxxx@xxxx.xxxxx.xx.xx significant incidents involving substantial disruption of Grantee’s program operation or affecting or potentially affecting the health, safety or welfare of the System Agency funded clients or participants within three (3) calendar days of discovery.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

  • Notification of Incidents If Contractor becomes aware of or has reasonable suspicion of a privacy incident or security incident regarding any State data, Contractor must report such incident to the State and the State Chief Information Security Officer as soon as possible, but no later than twenty-four (24) hours after such incident. The decision to notify the affected data subjects and the form of such notice following report of a privacy incident or security incident are the responsibility of the State. Notwithstanding anything to the contrary in this Contract, Contractor will indemnify, hold harmless and defend the State and its officers, and employees for and against any claims, damages, costs and expenses related to any privacy incident or security incident involving any State data. For purposes of clarification, the foregoing sentence shall in no way limit or diminish Contractor’s obligation(s) to indemnify, save, hold harmless, or defend the State under any other term of this Contract. Contractor will reasonably mitigate any harmful effects resulting from any privacy incident or security incident involving any State data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!