Security Breach Response Sample Clauses

Security Breach Response. A. In the event of a breach of Section 5 [Sprint Provided Content Protection and Security] above with respect to Service Provider’s physical facilities or infrastructure, which breach affects any item of Content (a “Security Breach”), Service Provider agrees to notify Sprint of such Security Breach within twenty-four (24) hours of detection, if reasonably practicable, and follow such notification with a preliminary written assessment of the severity of the breach or failure within an additional forty-eight (48) hours, with proposed ways of redressing the problem(s) identified. For a Security Breach of any DRM Requirement involving any of the software and/or devices then in use by Users, Service Provider agrees to notify Sprint of the Security Breach within twenty-four (24) hours from the time Service Provider learns of the Security Breach, and follow such notification with a preliminary assessment of the severity of the Security Breach within an additional seventy-two (72) hours, with proposed ways of redressing the problem identified. Additionally, Sprint reserves the right, with written notice to Service Provider, to pull the Sprint Provided Content in whole or in part from Service Provider’s service within twenty-four (24) hours of Security Breach discovery.
AutoNDA by SimpleDocs
Security Breach Response. Upon becoming aware of a confirmed Security Breach, Campaign Monitor will notify Customer without undue delay after becoming aware of a confirmed Security Breach and will provide all assistance and information relating to the Security Breach as it becomes known or as is reasonably requested by Customer. Campaign Monitor will use reasonable endeavors to mitigate and, where possible, to remedy the effect of, any Security Breach in accordance with the Security Measures. Where required by applicable Data Protection Laws, Campaign Monitor shall document the Security Breach and the facts surrounding it, the effects and any remedial action taken.
Security Breach Response. Immediately upon becoming aware of a Security Breach of Moderate or High information, or of circumstances that could have resulted in unauthorized access to or disclosure or use of University Data, Supplier will notify University, fully investigate the incident. Supplier will cooperate fully with the University’s investigation of and response to the incident, including providing University or its agents, or both, with access (physical and logical) to Supplier’s related documents and facilities. Except as otherwise required by law, Supplier will not provide notice of the incident directly to individuals whose Personal Information was involved, regulatory agencies, or other entities, without University’s prior written permission.
Security Breach Response. Client agrees and acknowledges that Company's notification of or response to a Security Breach will not be construed as an acknowledgment by Company of any fault or liability with respect to the Security Incident.
Security Breach Response. In the event CrowdStrike discovers a Security Breach, CrowdStrike shall:
Security Breach Response. Manager shall document responsive actions taken in connection with any incident involving a breach of security, and mandatory post-incident review of events and actions taken, if any, to make changes in business practices relating to protection of Owner Data.
Security Breach Response. (a) Upon becoming aware of any unauthorized or accidental access to or use or disclosure of any In-Scope Personal Data which is in the Service Provider’s custody or control, or the Service Provider having reasonable belief that any such access, use or disclosure has occurred or is at risk of occurring (which shall include, without limitation, the loss of or the inability to locate definitively any media, device or equipment on which In-Scope Personal Data is or may be stored), the Service Provider shall:
AutoNDA by SimpleDocs
Security Breach Response 

Related to Security Breach Response

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Emergency Response Partners must develop, maintain, and carry out a response plan for public water system emergencies, including disease outbreaks, spills, operational failures, and water system contamination. Partners must notify DWS in a timely manner of emergencies that may affect drinking water supplies.

  • Incident Response Operator shall have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of any portion of Data, including PII, and agrees to provide LEA, upon request, an executive summary of the written incident response plan.

  • Government’s Response Please refer to the Q&A from the first question.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • BREACH DISCOVERY AND NOTIFICATION 23 1. Following the discovery of a Breach of Unsecured PHI, CONTRACTOR shall notify 24 COUNTY of such Breach, however both parties agree to a delay in the notification if so advised by a 25 law enforcement official pursuant to 45 CFR § 164.412.

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Timely and Sustained Response Interconnection Customer shall ensure that the Small Generating Facility’s real power response to sustained frequency deviations outside of the deadband setting is automatically provided and shall begin immediately after frequency deviates outside of the deadband, and to the extent the Small Generating Facility has operating capability in the direction needed to correct the frequency deviation. Interconnection Customer shall not block or otherwise inhibit the ability of the governor or equivalent controls to respond and shall ensure that the response is not inhibited, except under certain operational constraints including, but not limited to, ambient temperature limitations, physical energy limitations, outages of mechanical equipment, or regulatory requirements. The Small Generating Facility shall sustain the real power response at least until system frequency returns to a value within the deadband setting of the governor or equivalent controls. An Applicable Reliability Standard with equivalent or more stringent requirements shall supersede the above requirements.

Time is Money Join Law Insider Premium to draft better contracts faster.