Reporting an Information Security Breach or Successful Security Incident Sample Clauses

Reporting an Information Security Breach or Successful Security Incident. GA agrees to report to Company any Information Security Breach and any successful Security Incident of which it becomes aware. Any report made pursuant to this Section 2(b) shall be made as soon as possible, but in no event later than five (5) business days following the date that GA becomes aware of the Information Security Breach or successful Security Incident. GA shall take action(s) requested by Company to document and mitigate the Information Security Breach or successful Security Incident. GA shall cooperate in evaluating the necessity of providing any and all notices of an Information Security Breach or successful Security Incident as deemed advisable or as otherwise required under applicable laws or regulations.
AutoNDA by SimpleDocs
Reporting an Information Security Breach or Successful Security Incident. Special Agent agrees to report to Company any Information Security Breach and any successful Security Incident of which it becomes aware. Any report made pursuant to this Section 2(b) shall be made as soon as possible, but in no event later than five (5) business days following the date that Special Agent becomes aware of the Information Security Breach or successful Security Incident. Special Agent shall take action(s) requested by Company to document and mitigate the Information Security Breach or successful Security Incident. Special Agent shall cooperate in evaluating the necessity of providing any and all notices of an Information Security Breach or successful Security Incident as deemed advisable or as otherwise required under applicable laws or regulations.

Related to Reporting an Information Security Breach or Successful Security Incident

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request. In addition to the requirements set forth in any applicable Business Associate Agreement as may be attached to this Contract, in the event of any actual security breach or reasonable belief of an actual security breach the Contractor either suffers or learns of that either compromises or could compromise State Data (a “Security Breach”), the Contractor shall notify the State within 24 hours of its discovery. Contractor shall immediately determine the nature and extent of the Security Breach, contain the incident by stopping the unauthorized practice, recover records, shut down the system that was breached, revoke access and/or correct weaknesses in physical security. Contractor shall report to the State: (i) the nature of the Security Breach; (ii) the State Data used or disclosed; (iii) who made the unauthorized use or received the unauthorized disclosure; (iv) what the Contractor has done or shall do to mitigate any deleterious effect of the unauthorized use or disclosure; and (v) what corrective action the Contractor has taken or shall take to prevent future similar unauthorized use or disclosure. The Contractor shall provide such other information, including a written report, as reasonably requested by the State. Contractor shall analyze and document the incident and provide all notices required by applicable law. In accordance with Section 9 V.S.A. §2435(b)(3), the Contractor shall notify the Office of the Attorney General, or, if applicable, Vermont Department of Financial Regulation (“DFR”), within fourteen (14) business days of the Contractor’s discovery of the Security Breach. The notice shall provide a preliminary description of the breach. The foregoing notice requirement shall be included in the subcontracts of any of Contractor’s subcontractors, affiliates or agents which may be “data collectors” hereunder. The Contractor agrees to fully cooperate with the State and assume responsibility at its own expense for the following, to be determined in the sole discretion of the State: (i) notice to affected consumers if the State determines it to be appropriate under the circumstances of any particular Security Breach, in a form recommended by the AGO; and (ii) investigation and remediation associated with a Security Breach, including but not limited to, outside investigation, forensics, counsel, crisis management and credit monitoring, in the sole determination of the State. The Contractor agrees to comply with all applicable laws, as such laws may be amended from time to time (including, but not limited to, Chapter 62 of Title 9 of the Vermont Statutes and all applicable State and federal laws, rules or regulations) that require notification in the event of unauthorized release of personally-identifiable information or other event requiring notification. In addition to any other indemnification obligations in this Contract, the Contractor shall fully indemnify and save harmless the State from any costs, loss or damage to the State resulting from a Security Breach or the unauthorized disclosure of State Data by the Contractor, its officers, agents, employees, and subcontractors.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Sale of Note; Change of Loan Servicer; Notice of Grievance The Note or a partial interest in the Note (together with this Security Instrument) can be sold one or more times without prior notice to Borrower. A sale might result in a change in the entity (known as the “Loan Servicer”) that collects Periodic Payments due under the Note and this Security Instrument and performs other mortgage loan servicing obligations under the Note, this Security Instrument, and Applicable Law. There also might be one or more changes of the Loan Servicer unrelated to a sale of the Note. If there is a change of the Loan Servicer, Borrower will be given written notice of the change which will state the name and address of the new Loan Servicer, the address to which payments should be made and any other information RESPA requires in connection with a notice of transfer of servicing. If the Note is sold and thereafter the Loan is serviced by a Loan Servicer other than the purchaser of the Note, the mortgage loan servicing obligations to Borrower will remain with the Loan Servicer or be transferred to a successor Loan Servicer and are not assumed by the Note purchaser unless otherwise provided by the Note purchaser. Neither Borrower nor Lender may commence, join, or be joined to any judicial action (as either an individual litigant or the member of a class) that arises from the other party’s actions pursuant to this Security Instrument or that alleges that the other party has breached any provision of, or any duty owed by reason of, this Security Instrument, until such Borrower or Lender has notified the other party (with such notice given in compliance with the requirements of Section 15) of such alleged breach and afforded the other party hereto a reasonable period after the giving of such notice to take corrective action. If Applicable Law provides a time period which must elapse before certain action can be taken, that time period will be deemed to be reasonable for purposes of this paragraph. The notice of acceleration and opportunity to cure given to Borrower pursuant to Section 22 and the notice of acceleration given to Borrower pursuant to Section 18 shall be deemed to satisfy the notice and opportunity to take corrective action provisions of this Section 20.

Time is Money Join Law Insider Premium to draft better contracts faster.