Security Breach Notifications Sample Clauses

Security Breach Notifications. Notice must be given by the Subrecipient to anyone whose PSCI could have been breached in accordance with HIPAA, the Information Practices Act of 1977, and State policy.
AutoNDA by SimpleDocs
Security Breach Notifications. Notice must be given by the Subrecipient to anyone whose confidential, sensitive and/or personal identifying information could have been breached in accordance with HIPAA, the Information Practices Act of 1977, and State policy.
Security Breach Notifications. TCP will promptly report to Client any unauthorized access to Client Data within TCP’s or its Subprocessors’ systems upon discovery and in accordance with applicable data breach notification laws. TCP will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. TCP’s notification of or response to any security incident under this Section 3.2 shall not be construed as an acknowledgment by TCP of any fault or liability with respect to such security incident.‌
Security Breach Notifications. If Lative becomes aware of a Security Incident for which notification to Customer is required under applicable Data Protection Laws, Lative will, without undue delay: (a)notify Customer of the Security Incident:
Security Breach Notifications. Within thirty (30) days of discovering an unauthorized release, disclosure or acquisition of Customer Data (“Security Breach”), ALI will notify Customer in writing that a Security Breach has occurred. XXX will investigate the causes and consequences of the Security Breach and will attempt to minimize the risk of any further unauthorized releases, disclosures, or acquisitions. If Customer elects to or is required to notify individuals whose data was or may have been involved in the Security Breach, Customer will be solely responsible for making such notifications. For Review
Security Breach Notifications. If either party discovers that there has been an unauthorized release, disclosure, or acquisition of Customer Data or unauthorized access to the Service (a “Security Breach”), the party discovering the Security Breach will inform the other party in writing within twenty-four (24) hours of discovering the Security Breach. The parties will investigate the causes and consequences of the Security Breach and will attempt to minimize the risk of any further unauthorized releases, disclosures, or acquisitions. Each party agrees to provide reasonable and expeditious assistance to the other party in investigating a Security Xxxxxx. If Customer elects to or is required by law any governmental agencies or individuals whose data was or may have been involved in the Security Breach, Customer will be solely responsible for making such notifications.
Security Breach Notifications. Humanity will promptly report to Client any unauthorized access to Client Data within Humanity’s or its Subprocessors’ systems upon discovery and in accordance with applicable data breach notification laws. Humanity will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. Humanity’s notification of or response to any security incident under this Section 4.2 shall not be construed as an acknowledgment by Humanity of any fault or liability with respect to such security incident.
AutoNDA by SimpleDocs
Security Breach Notifications. TCP will promptly report to Client any unauthorized access to Client Data within TCP’s or its Subprocessors’ systems upon discovery and in accordance with applicable data breach notification laws. TCP will use diligent efforts to promptly remedy any breach of security that permitted such unauthorized access. TCP’s notification of or response to any security incident under this Section 3.2 shall not be construed as an acknowledgment by TCP of any fault or liability with respect to such security incident. Data Backup and Retention. TCP shall undertake commercially reasonable efforts to backup Client Data with a restore point objective of twenty-four (24) hours. Client Data shall be backed up and retained in accordance with TCP’s retention policy as set forth in the Privacy Policy. Data Privacy. TCP will process Employee Personal Data in accordance with the terms of this Agreement, the Privacy Policy and all applicable data protection laws. Client must maintain its own data collection, disclosure, retention, and storage policies in compliance with applicable law. Biometric Data. To the extent that Client collects, captures, stores, or otherwise uses Biometric Data relating to an individual, Client must (i) first inform the individual from whom Biometric Data will be collected, in writing and prior to collecting his or her Biometric Data, that Biometric Data is being collected, stored, and/or used; (ii) indicate, in writing, the specific purpose(s) (which may not be other than employment-related purposes) and length of time for which Biometric Data is being collected, stored, and/or used; and (iii) receive a written release from the individual (or his or her legally authorized representative) authorizing the Client, TCP, TCP’s third-party service providers (who are subject to restrictions no less restrictive than those imposed on TCP herein) to collect, store, and/or use the Biometric Data and authorizing the Client to disclose such Biometric Data to TCP and TCP’s third-party service providers.
Security Breach Notifications. Equinix will contact Customer via phone or email of any actual or attempted unauthorized access of Customer’s Licensed Space (i.e., private cage or cabinet) (“Breach”) within twenty-four (24) hours of discovery, or as soon as is practical given the circumstances. In the provision of Licensed Space and Services, Equinix does not manage nor monitor Customer’s Equipment and does not monitor any Cross Connects. Customer is solely responsible for monitoring Customer’s Equipment and its network traffic.

Related to Security Breach Notifications

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

  • Data Breach Notification Seller will promptly notify Buyer of any actual or potential exposure or misappropriation of Buyer data ("breach") that comes to Seller's attention. Seller will cooperate with Xxxxx and in investigating any such breach, at Xxxxxx's expense. Seller will likewise cooperate with Buyer and, as applicable, with law enforcement agencies in any effort to notify injured or potentially injured parties, and such cooperation will be at Seller's expense, except to the extent that the breach was caused by Xxxxx. The remedies and obligations set forth in this subsection are in addition to any others Buyer may have, including, but not limited to, any requirements in the “Privacy, Confidentiality, and Security” provisions of this Agreement.

  • Breach Notification a. In the event of a Breach of unsecured PHI or disclosure that compromises the privacy or security of PHI obtained from DSHS or involving DSHS clients, Business Associate will take all measures required by state or federal law.

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request. In addition to the requirements set forth in any applicable Business Associate Agreement as may be attached to this Contract, in the event of any actual security breach or reasonable belief of an actual security breach the Contractor either suffers or learns of that either compromises or could compromise State Data (a “Security Breach”), the Contractor shall notify the State within 24 hours of its discovery. Contractor shall immediately determine the nature and extent of the Security Breach, contain the incident by stopping the unauthorized practice, recover records, shut down the system that was breached, revoke access and/or correct weaknesses in physical security. Contractor shall report to the State: (i) the nature of the Security Breach; (ii) the State Data used or disclosed; (iii) who made the unauthorized use or received the unauthorized disclosure; (iv) what the Contractor has done or shall do to mitigate any deleterious effect of the unauthorized use or disclosure; and (v) what corrective action the Contractor has taken or shall take to prevent future similar unauthorized use or disclosure. The Contractor shall provide such other information, including a written report, as reasonably requested by the State. Contractor shall analyze and document the incident and provide all notices required by applicable law. In accordance with Section 9 V.S.A. §2435(b)(3), the Contractor shall notify the Office of the Attorney General, or, if applicable, Vermont Department of Financial Regulation (“DFR”), within fourteen (14) business days of the Contractor’s discovery of the Security Breach. The notice shall provide a preliminary description of the breach. The foregoing notice requirement shall be included in the subcontracts of any of Contractor’s subcontractors, affiliates or agents which may be “data collectors” hereunder. The Contractor agrees to fully cooperate with the State and assume responsibility at its own expense for the following, to be determined in the sole discretion of the State: (i) notice to affected consumers if the State determines it to be appropriate under the circumstances of any particular Security Breach, in a form recommended by the AGO; and (ii) investigation and remediation associated with a Security Breach, including but not limited to, outside investigation, forensics, counsel, crisis management and credit monitoring, in the sole determination of the State. The Contractor agrees to comply with all applicable laws, as such laws may be amended from time to time (including, but not limited to, Chapter 62 of Title 9 of the Vermont Statutes and all applicable State and federal laws, rules or regulations) that require notification in the event of unauthorized release of personally-identifiable information or other event requiring notification. In addition to any other indemnification obligations in this Contract, the Contractor shall fully indemnify and save harmless the State from any costs, loss or damage to the State resulting from a Security Breach or the unauthorized disclosure of State Data by the Contractor, its officers, agents, employees, and subcontractors.

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • WORK NOTIFICATIONS Purchaser shall notify the Contract Administrator a minimum of 3 business days before work begins.

Time is Money Join Law Insider Premium to draft better contracts faster.