Security Breaches Sample Clauses
The Security Breaches clause defines the obligations and procedures that apply when a party experiences an unauthorized access to, or disclosure of, sensitive data. Typically, this clause requires the affected party to promptly notify the other party of the breach, take steps to mitigate any harm, and cooperate in any investigation or remedial actions. Its core function is to ensure that both parties are prepared to respond effectively to data security incidents, thereby minimizing potential damage and ensuring compliance with legal or contractual data protection requirements.
POPULAR SAMPLE Copied 287 times
Security Breaches. In addition, the Client acknowledges and assumes the following, namely;
Security Breaches. Without limiting any provisions regarding Security Breaches set forth in the Agreement, for the purposes of this Exhibit E a Security Breach shall include any alleged or actual compromise, unauthorized access, disclosure, theft, or unauthorized use of a Card or Cardholder information or User credentials, regardless of cause, including, without limitation, a breach of or intrusion into any system, or failure, malfunction, inadequacy, or error affecting any server, wherever located, or hardware or software of any system, through which User credentials or Card or Cardholder information resides, passes through, and/or could have been compromised. User shall notify Autobooks immediately if User becomes aware of or suspects a Security Breach (including at a User service provider). User will fully cooperate with Autobooks, Bank, and any Card Brand with respect to any investigation and/or additional requirements related to any actual or suspected Security Breach. User will preserve and provide to Autobooks or its designated agents or representatives copies of all records in connection with any Security Breach, and will fully cooperate with any forensic investigators or other third parties engaged in connection with the identification and remediation of such Security Breach. This section shall survive termination of this Exhibit E
Security Breaches. In the event of a security breach that relates to the IT Services, the Parties shall, subject to any applicable Law, cooperate with each other in good faith regarding the timing and manner of (a) notification to their respective customers, potential customers, employees and/or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Entities.
Security Breaches. In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.
Security Breaches. In the event SELLER becomes aware of any actual or suspected security breach including but not limited to, physical trespass on a secure facility, unauthorized intrusion or access into SELLER’s information systems or computer-related networks, loss/theft of a PC (laptop or desktop), loss or theft of printed materials, or any unauthorized compromise or use of SELLER’s data or information that may potentially affect or adversely impact BUYER, SELLER shall take appropriate immediate actions to investigate, eradicate and contain such security breach, at its own expense and carry out any recovery reasonably necessary to remedy any impact of such security breach. SELLER shall notify BUYER as soon as reasonably practical but in no event later than seventy- two (72) hours after learning of such an incident. SELLER shall, without limitation, pay for or reimburse BUYER for all costs, losses and expenses incurred by BUYER and shall indemnify BUYER for any payments made by BUYER as a result of any such incident regardless of whether SELLER was aware of such an incident. BUYER shall have the right to immediately suspend accepting transactions and data from SELLER’s systems until incidents are resolved; provided however, that BUYER will use commercially reasonable best efforts to limit any such suspension to only that which is reasonably necessary to permit the SELLER to investigate the severity of the incident, devise a remedy or otherwise secure the data/affected systems. Upon the request of BUYER, SELLER shall cooperate with and assist in any effort by BUYER or a third party engaged by BUYER to evaluate the security of SELLER’s information systems or computer-related networks.
Security Breaches. In the event of a security breach that relates to the Transition Services, the Parties shall, subject to any applicable Law, cooperate with each other in good faith regarding the timing and manner of (a) notification to their respective customers, potential customers, employees and/or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Entities.
Security Breaches. If any Party discovers (a) any material breach of the Security Regulations or of the systems used to provide the Services or (b) any breach or threatened breach of the Security Regulations that involves or may reasonably be expected to involve unauthorized access, disclosure or use of the other Party’s or its Affiliates’ Confidential Information (each of (a) and (b), a “Security Incident”), such Party shall, at the cost of the Party responsible for the Security Incident, (i) promptly (both orally, if practicable, and in any event in writing) notify the other Party of the Security Incident and (ii) reasonably cooperate with the other Party (1) to take commercially reasonable measures necessary to control and contain the security of such Confidential Information, (2) to remedy any such Security Incident, including using commercially reasonable efforts to identify and address any root causes for such Security Incident, (3) to furnish full details of the Security Incident to the other Party and keep such other Party advised of all material measures taken and other developments with respect to such Security Incident, (4) in any litigation or formal action with third parties or in connection with any regulatory, investigatory or other action of any Governmental Authority and (5) in notifying the other Party’s or its Affiliates’ customers and Personnel and other persons of the Security Incident to the extent reasonably requested by the other Party.
Security Breaches. Each party shall promptly provide the other party with notice of (i) any disclosure, access to or use of any Personal Information in breach of this Agreement and (ii) any unauthorized intrusion into systems containing Customer’s Personal Information.
Security Breaches. 16.12.1 If a party becomes aware that the other party’s Confidential Information is used or disclosed in any manner not permitted under the Agreement, if a party is unable to account for any Confidential Information of the other party, or if a party knows any security breach or other incident has occurred that could compromise the security or integrity of any system in which it stores or processes Confidential Information of the other party (each, a “Security Breach”), such party shall notify the other party by email and/or telephone promptly. Such notice is to describe the Security Breach in sufficient detail (accounting for the information then available to such party) for the other party to assess its risk. The Manager shall send its email notice addressed to and/or telephone primary point of contact. The Manager shall also maintain a log of all such incidents and either retain such records for as long as it is performing services under this Agreement or provide the records (or copies of such records) to the FRBNY prior to destruction of the records under the Manager’s normal record retention policy.
16.12.2 The affected party shall take all measures reasonably required to recover information, to mitigate the effects of the unauthorized use or disclosure or loss, to prevent further unauthorized use or disclosure or loss and reoccurrence of a breach of security of that same nature, and to cooperate with the other party and its agents in any investigation that the other party may undertake relating to the unauthorized use or disclosure or loss. The affected party shall keep the other party informed as soon as practicable of developments regarding the Security Breach, including, without limitation, effects being observed in the affected system(s), investigation of the Security Breach and its effects and the root cause, and periodic progress made toward completion of action plans for remediation. The affected party shall send the other party information about developments in its investigation and remediation activities as directed by the other party (which, for the FRBNY is to be by email to the address above and/or by telephone to the FRBNY’s primary point of contact unless directed otherwise). The FRBNY may share information about any Security Breach with any the Board of Governors, the UST, and any other Reserve Bank that the FRBNY reasonably believes may be adversely impacted by the Security Breach. The affected party shall bear the costs of all such me...
Security Breaches. Notwithstanding the Operator’s other rights under this Tariff, Operator, at its sole discretion, may deny access to any User, its employees, agents, contractors, guests or invitees upon breaches any of the security rules and regulations which apply to the Berth Corridor.
