Security Breach Management Sample Clauses

Security Breach Management. Producer shall notify The Hartford within 72 hours following discovery of any Security Breach via e-mail to Xxxxxxxxxxx_Xxxxxxxx_Xxxxxxxx@xxxxxxxxxxx.xxx, or as otherwise directed by The Hartford. Producer shall: (a) immediately remedy the Security Breach; (b) provide all necessary assistance and cooperation to enable The Hartford to remedy any impact of the Security Breach, and to meet its obligations with respect to the Security Breach; (c) participate in a virtual control verification and remediate any medium or high risk control gaps as required by The Hartford; and (d) indemnify and reimburse The Hartford for costs and expenses incurred by The Hartford in connection with the Security Breach.
AutoNDA by SimpleDocs
Security Breach Management. 8.1 Contract Eagle will comply with all applicable laws requiring notification to The Subscriber of any accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data Processed by Contract Eagle or its Sub-Processors of which it becomes aware (Breach Incident).
Security Breach Management. Meraki maintains security incident management policies and procedures, including detailed security incident escalation procedures. If Meraki becomes aware of any unlawful destruction, loss, alteration or unauthorized disclosure of Customer Data (a “Security Incident”), then Meraki will notify Customer without undue delay and provide Customer with relevant information about the Security Incident, including the type of Customer Data involved, the volume of Customer Data disclosed, the circumstances of the incident, mitigation steps taken, and remedial and preventative action taken. The obligations in this Section 7 do not apply to Security Incidents caused by Customer or Customer’s Network Users.
Security Breach Management. Notify Company within 72 hours following discovery of any Security Breach via e-mail to Xxxxxxxxxxx_Xxxxxxxx_Xxxxxxxx@xxxxxxxxxxx.xxx, or as otherwise directed by Company. Producer shall: (a) immediately remedy the Security Breach; (b) provide all necessary assistance and cooperation to enable Company to remedy any impact of the Security Breach, and to meet its obligations with respect to the Security Breach; (c) participate in a virtual control verification and remediate any medium or high risk control gaps as required by Company, and (d) indemnify and reimburse Company for costs and expenses incurred by Company in connection with the Security Breach.
Security Breach Management. 8.1 We will comply with all Applicable Data Protection Laws requiring notification to you of any accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data Processed by us or our Sub-Processors of which we become aware (Breach Incident).
Security Breach Management. 7.1 Each of the Parties shall have the manpower, system, facilities and equipment in place to properly monitor access to Personal Data, and to monitor and identify a Security Breach.
Security Breach Management. 7.1 Notice. *****.
AutoNDA by SimpleDocs
Security Breach Management 

Related to Security Breach Management

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

  • Patch Management All workstations, laptops and other systems that process and/or 20 store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or 21 transmits on behalf of COUNTY must have critical security patches applied, with system reboot if 22 necessary. There must be a documented patch management process which determines installation 23 timeframe based on risk assessment and vendor recommendations. At a maximum, all applicable 24 patches must be installed within thirty (30) calendar or business days of vendor release. Applications 25 and systems that cannot be patched due to operational reasons must have compensatory controls 26 implemented to minimize risk, where possible.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

Time is Money Join Law Insider Premium to draft better contracts faster.