Security Breach Procedures Sample Clauses

Security Breach Procedures. For purposes of this section, the term
AutoNDA by SimpleDocs
Security Breach Procedures. 4.1 Supplier shall notify Buyer as soon as practicable, and in any event within 24 hours, after Supplier becomes aware of any Security Incident or Security Breach.
Security Breach Procedures. (a) In the event of a Security Breach, as defined above, Member shall:
Security Breach Procedures. (A) Immediately upon the Consultant’s awareness or reasonable belief of a Security Breach, the Consultant shall (i) notify the Manager of the Security Breach, such notice to be given first by telephone at the following telephone number, followed promptly by email at the following email address: (000) 000-0000 / SJVIA- Xxxxx@xxxxxxxxxxxxxx.xxx (which telephone number and email address the SJVIA may update by providing notice to the Consultant), and (ii) preserve all relevant evidence (and cause any affected Authorized Person to preserve all relevant evidence) relating to the Security Breach. The notification shall include, to the extent reasonably possible, the identification of each type and the extent of Personal Information that has been, or is reasonably believed to have been, breached, including but not limited to, compromised, or subjected to unauthorized Use, Disclosure, or modification, or any loss or destruction, corruption, or damage.
Security Breach Procedures. For purposes of this Contract, “
Security Breach Procedures. If Handshake discovers or is notified of a breach or potential breach of security relating to Institution Confidential Information or Institution Content, Handshake shall promptly: (1) notify Institution of such breach or potential breach without unreasonable delay and in no case later than five (5) calendar days after discovery of the potential breach, (2) in consultation with Institution, investigate and remediate such breach or potential breach at least to the extent required by law, (3) if the breach or potential breach resulted from a failure or weakness in systems or procedures that were Handshake’s responsibility, provide Institution with satisfactory assurances that the breach or potential breach will not recur, and (4) to the extent that the breach or potential breach resulted from acts or omissions of Handshake, Handshake shall be responsible for all costs reasonably determined to be incurred by Institution or Handshake in connection with the foregoing activities. Handshake shall cooperate fully to assist Institution in: (1) identifying individuals potentially affected by the breach; (2) conducting any risk assessment required by applicable law; and (3) providing any notifications required by applicable law. If the Parties, acting reasonably, determine that establishment of a toll-free telephone contact number is necessary to handle inquiries relating to the breach, and requests Handshake to provide staffing to respond to calls to the toll-free number, Handshake shall provide the requested staffing at its cost.
Security Breach Procedures. Galvanize maintains an Incident Response Plan managed by its Security Incident Response Team (SIRT). Galvanize will notify Customer without undue delay if Galvanize determines that the security of the Cloud Products’ systems has been breached and this results in Customer Data being accessed by or disclosed to an individual or entity who is not authorized to access or receive such information. Notice will include a brief description of the incident, including the nature of the breach, the date it occurred and, if known, the general type(s) of data involved. Galvanize will report to Customer on the corrective action being taken and will cooperate with Customer to mitigate the effects of any lost or compromised Customer Data. Galvanize will conduct a root cause analysis to determine the cause of the incident and to ensure corrective actions are focused on the true root cause of the incident. Customer will implement any corrective measures required by Galvanize.
AutoNDA by SimpleDocs
Security Breach Procedures. For purposes of this section, the term “Security Breach” shall mean (i) any act or omission that materially compromises either the security, confidentiality or integrity of personal information or the physical, technical, administrative or organizational safeguards put in place by Custodian (or any authorized persons) that relate to the protection of the security, confidentiality or integrity of personal information, or (ii) receipt of a complaint in relation to the privacy practices of Custodian (or any authorized persons) or a breach or alleged breach of this Agreement relating to such privacy practices. Custodian shall: (i) notify a Trust of a Security Breach as soon as practicable, but no later than twenty-four (24) hours after Custodian becomes aware of it; and (ii) notify a Trust of any Security Breaches by and with a copy by e-mail to Custodian’s primary business contact within the Trust. Immediately following Custodian’s notification to a Trust of a Security Breach, the parties shall coordinate with each other to investigate the Security Breach. Custodian agrees to cooperate with the Trust in the Trust’s handling of the matter, including, without limitation: (i) assisting with any investigation; (ii) providing the Trust with physical access to the facilities and operations affected; (iii) facilitating interviews with Custodian’s employees and others involved in the matter; and (iv) making available all relevant records, logs, files, data reporting and other materials required to comply with applicable law, regulation, industry standards or as otherwise reasonably required by the Trust. Custodian shall immediately remedy any Security Breach and prevent any further Security Breach at Custodian’s expense in accordance with applicable privacy rights, laws, regulations and standards. Custodian shall reimburse the Trust for actual costs incurred by the Trust in responding to, and mitigating damages caused by, any Security Breach, including all costs of notice and/or remediation pursuant to this paragraph.
Security Breach Procedures a. Provider shall:
Security Breach Procedures a. Once we become aware that a security incident has or may have occurred, we will conduct an investigation. Steps are immediately taken to help mitigate any known risks and our incident response plan is initiated and executed.
Time is Money Join Law Insider Premium to draft better contracts faster.