Security Breach Management Clause Samples

The Security Breach Management clause outlines the procedures and responsibilities for responding to unauthorized access or compromise of sensitive data or systems. Typically, it requires the affected party to promptly notify the other party of a breach, investigate the incident, and take corrective actions such as mitigating harm and preventing future occurrences. This clause ensures that both parties are prepared to handle security incidents efficiently, minimizing potential damage and maintaining trust by establishing clear protocols for breach response.
POPULAR SAMPLE Copied 2 times
Security Breach Management. Meraki maintains security incident management policies and procedures, including detailed security incident escalation procedures. If Meraki becomes aware of any unlawful destruction, loss, alteration or unauthorized disclosure of Customer Data (a “Security Incident”), then Meraki will notify Customer without undue delay and provide Customer with relevant information about the Security Incident, including the type of Customer Data involved, the volume of Customer Data disclosed, the circumstances of the incident, mitigation steps taken, and remedial and preventative action taken. The obligations in this Section 7 do not apply to Security Incidents caused by Customer or Customer’s Network Users.
Security Breach Management. Producer shall notify The Hartford within 72 hours following discovery of any Security Breach via e-mail to ▇▇▇▇▇▇▇▇▇▇▇_▇▇▇▇▇▇▇▇_▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇.▇▇▇, or as otherwise directed by The Hartford. Producer shall: (a) immediately remedy the Security Breach; (b) provide all necessary assistance and cooperation to enable The Hartford to remedy any impact of the Security Breach, and to meet its obligations with respect to the Security Breach; (c) participate in a virtual control verification and remediate any medium or high risk control gaps as required by The Hartford; and (d) indemnify and reimburse The Hartford for costs and expenses incurred by The Hartford in connection with the Security Breach.
Security Breach Management. 8.1 We will comply with all Applicable Data Protection Laws requiring notification to you of any accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data Processed by us or our Sub-Processors of which we become aware (Breach Incident). 8.2 We will make reasonable efforts to identify the cause of that Breach Incident, notify you within a timely manner to allow you to meet your obligations to report a Breach Incident, cooperate with you in good faith and provide any assistance reasonably necessary for you to comply with your obligations under Applicable Data Protection Laws with respect to a Breach Incident, including any obligations you have under Applicable Data Protection Laws to report, notify or investigate a Breach Incident, and take steps we consider necessary and reasonable to remediate the cause of the Breach Incident, to the extent remediation is within our reasonable control.
Security Breach Management. Notify Company within 72 hours following discovery of any Security Breach via e-mail to ▇▇▇▇▇▇▇▇▇▇▇_▇▇▇▇▇▇▇▇_▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇.▇▇▇, or as otherwise directed by Company. Producer shall: (a) immediately remedy the Security Breach; (b) provide all necessary assistance and cooperation to enable Company to remedy any impact of the Security Breach, and to meet its obligations with respect to the Security Breach; (c) participate in a virtual control verification and remediate any medium or high risk control gaps as required by Company, and (d) indemnify and reimburse Company for costs and expenses incurred by Company in connection with the Security Breach.
Security Breach Management. 7.1 Notice. *****.
Security Breach Management. 7.1 Each of the Parties shall have the manpower, system, facilities and equipment in place to properly monitor access to Personal Data, and to monitor and identify a Security Breach. 7.2 If the Recipient becomes aware of any Security Breach on its personnel, premises, facilities, system, or equipment, it shall, within a reasonable period, notify the Company of the Security Breach, investigate the Security Breach and provide the Company with information about the Security Breach, and take reasonable steps to mitigate the effects and to minimize any damage resulting from the Security Breach. (a) The Recipient shall cooperate with the Company in relation to the incident investigation requirements for any Security Breach of Personal Data. (b) The Parties agree that: (i) An unsuccessful Security Breach attempt will not be subject to this Section. An unsuccessful Security Breach attempt is one that results in no unauthorized access, processing, disclosure, alteration, loss, damage, or destruction to Personal Data or to any equipment or facilities storing Personal Data, which includes, but not limited to, pings and other broadcast attacks on firewalls or edge servers, port scans, unsuccessful log-on attempts, denial of service attacks, packet sniffing (or other unauthorized access to traffic data that does not result in access beyond internet protocol addresses or headers) or similar incidents; and (ii) the Recipient shall send the notification of any Security Breach to the Company within 24 hours from knowledge thereof.
Security Breach Management. 8.1 Contract Eagle will comply with all applicable laws requiring notification to The Subscriber of any accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data Processed by Contract Eagle or its Sub-Processors of which it becomes aware (Breach Incident). 8.2 Contract Eagle will make reasonable efforts to identify the cause of that Breach Incident, notify The Subscriber within a timely manner to allow The Subscriber to meet its obligations to report a Breach Incident, cooperate with The Subscriber in good faith and provide any assistance reasonably necessary for The Subscriber to comply with its obligations under Applicable Data Protection Laws with respect to a Breach Incident, including any obligations The Subscriber has under Applicable Data Protection Laws to report, notify or investigate a Breach Incident, and take steps Contract Eagle considers necessary and reasonable to remediate the cause of the Breach Incident, to the extent remediation is within Contract Eagle’s reasonable control.
Security Breach Management 

Related to Security Breach Management

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Patch Management All workstations, laptops and other systems that process and/or store County PHI or PI must have critical security patches applied, with system reboot if necessary. There must be a documented patch management process which determines installation timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable patches must be installed within 30 days of vendor release.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.