Common use of Security Breaches Clause in Contracts

Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify ▇▇▇▇▇ of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to ▇▇▇▇▇ required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to ▇▇▇▇▇ during regular business hours as a contact regarding such Information Party’s obligations under this Section. (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to ▇▇▇▇▇ in investigating, remedying and taking any other reasonable action ▇▇▇▇▇ deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) shall provide ▇▇▇▇▇ with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at ▇▇▇▇▇ or the transactions contemplated hereunder) also notify ▇▇▇▇▇ of any third-party legal process relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).

Appears in 2 contracts

Sources: Receivables Purchase and Administration Agreement (T-Mobile US, Inc.), Receivables Purchase and Administration Agreement (T-Mobile US, Inc.)

Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify ▇▇▇▇▇ of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to ▇▇▇▇▇ required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to ▇▇▇▇▇ during regular business hours as a contact regarding such Information Party’s obligations under this Section. (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to ▇▇▇▇▇ in investigating, remedying and taking any other reasonable action ▇▇▇▇▇ deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) shall provide ▇▇▇▇▇ with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at ▇▇▇▇▇ or the transactions contemplated hereunder) also notify ▇▇▇▇▇ of any third-party legal process relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).

Appears in 2 contracts

Sources: Receivables Purchase and Administration Agreement (T-Mobile US, Inc.), Receivables Purchase and Administration Agreement (T-Mobile US, Inc.)

Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify ▇▇▇▇▇ of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to ▇▇▇▇▇ required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to ▇▇▇▇▇ during regular business hours as a contact regarding such Information Party’s obligations under this Section.. T-Mobile (EIP) Third A&R RPAA (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to ▇▇▇▇▇ in investigating, remedying and taking any other reasonable action ▇▇▇▇▇ deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) shall provide ▇▇▇▇▇ with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at ▇▇▇▇▇ or the transactions contemplated hereunder) also notify ▇▇▇▇▇ of any third-party legal process relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).

Appears in 1 contract

Sources: Receivables Purchase and Administration Agreement (T-Mobile US, Inc.)

Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify ▇▇▇▇▇ of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to ▇▇▇▇▇ required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to ▇▇▇▇▇ during regular business hours as a contact regarding such Information Party’s obligations under this Section. (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to ▇▇▇▇▇ in investigating, remedying and taking any other reasonable action ▇▇▇▇▇ deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) shall provide ▇▇▇▇▇ with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at ▇▇▇▇▇ or the transactions contemplated hereunder) also notify ▇▇▇▇▇ of any third-party legal process 736942168 19632398738387080 relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).

Appears in 1 contract

Sources: Receivables Purchase and Administration Agreement (T-Mobile US, Inc.)