Remediation of Unauthorized Disclosures Sample Clauses

Remediation of Unauthorized Disclosures. In the event that any unauthorized access to or acquisition of End User Data that contains personal information is caused by a breach of UWS’s security and/or privacy obligations under this Agreement, UWS shall pay the reasonable and documented costs incurred by End User in connection with the following items: (a) costs of any required forensic investigation to determine the cause of the breach, (b) providing notification of the Security Breach to applicable government and relevant industry self-regulatory agencies, to the media (if required by applicable Law) and to individuals whose Personal Data may have been accessed or acquired, (c) providing credit monitoring service to individuals whose Personal Data may have been accessed or acquired for a period of one year after the date on which such individuals were notified of the unauthorized access or acquisition for such individuals who elected such credit monitoring service, and
AutoNDA by SimpleDocs
Remediation of Unauthorized Disclosures. In the event that any unauthorized access to or acquisition of End User Data that contains personal information is caused by a breach of UWS’s security and/ or privacy obligations under this Agreement, UWS shall pay the reasonable and documented costs incurred by End User in connection with the following items: (a) costs of any required forensic investigation to determine the cause of the breach, (b) providing notification of the Security Breach to applicable government and relevant industry self−regulatory agencies, to the media (if required by applicable Law) and to individuals whose Personal Data may have been accessed or acquired, (c) providing credit monitoring service to individuals whose Personal Data may have been accessed or acquired for a period of one year after the date on which such individuals were notified of the unauthorized access or acquisition for such individuals who elected such credit monitoring service, and (d) operating a call center to respond to questions from individuals whose Personal Data may have been accessed or acquired for a period of one year after the date on which such individuals were notified of the unauthorized access or acquisition. NOTWITHSTANDING THE FOREGOING, OR ANYTHING IN THE AGREEMENT TO THE CONTRARY, UWS SHALL HAVE NO RESPONSIBILITY TO PAY COSTS OF REMEDIATION THAT ARE DUE TO RECKLESS MISCONDUCT, GROSS NEGLIGENCE, WILLFUL MISCONDUCT AND/OR FRAUD BY END USER OR ITS EMPLOYEES, AGENTS OR CONTRACTORS.
Remediation of Unauthorized Disclosures. Recipient shall notify Discloser within 48 hours of learning of any loss or unauthorized access, use or disclosure of Confidential Information (“Security Breach”). Recipient shall: (i) designate and make available to Discloser a knowledgeable contact person with whom Discloser may communicate regarding the Security Breach, (ii) submit status reports to Discloser on a daily basis or a frequency approved by Discloser and (iii) provide Discloser with information about the Security Breach as reasonably requested by Discloser. Recipient shall cooperate and coordinate with Discloser in addressing the response to the Security Breach. If Recipient’s breach of this Contract results in the loss or unauthorized access, use or disclosure of PII, Discloser may submit to Recipient an invoice for reasonable, documented costs Discloser incurs in connection with the Security Breach, including the following: (i) providing notification of the Security Breach to relevant government and industry self-regulatory agencies, credit bureaus, the media (if required by applicable law) and individuals whose PII may have been lost, accessed, misused or disclosed (“PII Subjects”); (b) providing credit monitoring and/or identity restoration services to PII Subjects who elect the service for a period of one year after the date on which those individuals were notified of the Security Breach; (c) operating a call center to respond to questions from PII Subjects for a period of one year after the date on which those individuals were notified of the Security Breach; and (d) any fines or penalties levied against Discloser.

Related to Remediation of Unauthorized Disclosures

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Authorized Disclosure Each Party may disclose Confidential Information belonging to the other Party to the extent such disclosure is reasonably necessary in the following situations:

  • Permitted Uses and Disclosures by Business Associate 1. Business Associate may only use or disclose protected health information as necessary to perform the services as outlined in the underlying agreement.

  • Unauthorised disclosure For the avoidance of doubt, a party will be responsible for any unauthorised disclosure of Confidential Information made by that party’s employees, directors, agents or advisors and by a bona fide potential purchaser to whom Confidential Information has been disclosed by that party under clause 22.2(f).

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

  • Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.

Time is Money Join Law Insider Premium to draft better contracts faster.