{"component": "clause", "props": {"groups": [{"size": 8, "samples": [{"hash": "1Zx9UkZEn3L", "uri": "/contracts/1Zx9UkZEn3L#security-breaches", "label": "Client Agreement", "score": 33.3244361877, "published": true}, {"hash": "jHtSTJMFW1O", "uri": "/contracts/jHtSTJMFW1O#security-breaches", "label": "Client Agreement", "score": 33.1576652527, "published": true}, {"hash": "k3s60WJdcfT", "uri": "/contracts/k3s60WJdcfT#security-breaches", "label": "Client Agreement", "score": 33.0782814026, "published": true}], "snippet": "In addition, the Client acknowledges and assumes the following, namely;", "snippet_links": [{"key": "in-addition", "type": "clause", "offset": [0, 11]}, {"key": "the-client-acknowledges", "type": "clause", "offset": [13, 36]}], "hash": "776653198f301e4a5c8ee48ef96ebc51", "id": 4}, {"size": 9, "samples": [{"hash": "csSXOcmE49H", "uri": "/contracts/csSXOcmE49H#security-breaches", "label": "Terms of Use and End User License Agreement", "score": 26.767282486, "published": true}, {"hash": "hiFNEu4NoG", "uri": "/contracts/hiFNEu4NoG#security-breaches", "label": "Terms of Use and End User License Agreement", "score": 26.5961666107, "published": true}, {"hash": "h0u95z83FDa", "uri": "/contracts/h0u95z83FDa#security-breaches", "label": "Terms of Use and End User License Agreement", "score": 26.5961666107, "published": true}], "snippet": "Without limiting any provisions regarding Security Breaches set forth in the Agreement, for the purposes of this Exhibit E a Security Breach shall include any alleged or actual compromise, unauthorized access, disclosure, theft, or unauthorized use of a Card or Cardholder information or User credentials, regardless of cause, including, without limitation, a breach of or intrusion into any system, or failure, malfunction, inadequacy, or error affecting any server, wherever located, or hardware or software of any system, through which User credentials or Card or Cardholder information resides, passes through, and/or could have been compromised. User shall notify Autobooks immediately if User becomes aware of or suspects a Security Breach (including at a User service provider). User will fully cooperate with Autobooks, Bank, and any Card Brand with respect to any investigation and/or additional requirements related to any actual or suspected Security Breach. User will preserve and provide to Autobooks or its designated agents or representatives copies of all records in connection with any Security Breach, and will fully cooperate with any forensic investigators or other third parties engaged in connection with the identification and remediation of such Security Breach. This section shall survive termination of this Exhibit E", "snippet_links": [{"key": "without-limiting", "type": "definition", "offset": [0, 16]}, {"key": "provisions-regarding", "type": "clause", "offset": [21, 41]}, {"key": "in-the-agreement", "type": "clause", "offset": [70, 86]}, {"key": "for-the-purposes-of", "type": "clause", "offset": [88, 107]}, {"key": "exhibit-e", "type": "definition", "offset": [113, 122]}, {"key": "unauthorized-access", "type": "definition", "offset": [189, 208]}, {"key": "use-of-a-card", "type": "clause", "offset": [245, 258]}, {"key": "cardholder-information", "type": "clause", "offset": [262, 284]}, {"key": "user-credentials", "type": "definition", "offset": [288, 304]}, {"key": "regardless-of-cause", "type": "definition", "offset": [306, 325]}, {"key": "without-limitation", "type": "clause", "offset": [338, 356]}, {"key": "breach-of", "type": "definition", "offset": [360, 369]}, {"key": "user-shall", "type": "definition", "offset": [651, 661]}, {"key": "service-provider", "type": "definition", "offset": [767, 783]}, {"key": "cooperate-with", "type": "clause", "offset": [802, 816]}, {"key": "card-brand", "type": "definition", "offset": [842, 852]}, {"key": "with-respect-to", "type": "clause", "offset": [853, 868]}, {"key": "additional-requirements", "type": "clause", "offset": [894, 917]}, {"key": "related-to", "type": "definition", "offset": [918, 928]}, {"key": "provide-to", "type": "clause", "offset": [993, 1003]}, {"key": "designated-agents", "type": "definition", "offset": [1021, 1038]}, {"key": "all-records", "type": "clause", "offset": [1068, 1079]}, {"key": "in-connection-with", "type": "clause", "offset": [1080, 1098]}, {"key": "other-third-parties", "type": "clause", "offset": [1180, 1199]}, {"key": "engaged-in", "type": "definition", "offset": [1200, 1210]}, {"key": "such-security", "type": "definition", "offset": [1265, 1278]}, {"key": "termination-of-this", "type": "clause", "offset": [1314, 1333]}], "hash": "a75cbfe0e5787dcc57a815e036eb2c3e", "id": 3}, {"size": 11, "samples": [{"hash": "iYo70wCPr53", "uri": "/contracts/iYo70wCPr53#security-breaches", "label": "It Services Agreement (KLX Inc.)", "score": 25.9637241364, "published": true}, {"hash": "5x5PCWoEczA", "uri": "/contracts/5x5PCWoEczA#security-breaches", "label": "Separation and Distribution Agreement (KLX Inc.)", "score": 25.9637241364, "published": true}, {"hash": "8HkHBVQEw94", "uri": "/contracts/8HkHBVQEw94#security-breaches", "label": "It Services Agreement (KLX Inc.)", "score": 25.8651599884, "published": true}], "snippet": "In the event of a security breach that relates to the IT Services, the Parties shall, subject to any applicable Law, cooperate with each other in good faith regarding the timing and manner of (a) notification to their respective customers, potential customers, employees and/or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Entities.", "snippet_links": [{"key": "in-the-event-of-a", "type": "clause", "offset": [0, 17]}, {"key": "security-breach", "type": "clause", "offset": [18, 33]}, {"key": "relates-to", "type": "definition", "offset": [39, 49]}, {"key": "it-services", "type": "clause", "offset": [54, 65]}, {"key": "the-parties-shall", "type": "clause", "offset": [67, 84]}, {"key": "subject-to", "type": "definition", "offset": [86, 96]}, {"key": "applicable-law", "type": "definition", "offset": [101, 115]}, {"key": "cooperate-with", "type": "clause", "offset": [117, 131]}, {"key": "in-good-faith", "type": "definition", "offset": [143, 156]}, {"key": "manner-of", "type": "clause", "offset": [182, 191]}, {"key": "notification-to", "type": "clause", "offset": [196, 211]}, {"key": "potential-customers", "type": "clause", "offset": [240, 259]}, {"key": "security-and", "type": "clause", "offset": [328, 340]}, {"key": "to-appropriate", "type": "clause", "offset": [357, 371]}, {"key": "governmental-entities", "type": "definition", "offset": [372, 393]}], "hash": "bfa49807b86209a40b051108961e4caa", "id": 2}, {"size": 16, "samples": [{"hash": "k2Fz49inSCu", "uri": "/contracts/k2Fz49inSCu#security-breaches", "label": "Website Terms of Use", "score": 31.2531661987, "published": true}, {"hash": "cHTUPSSRnEw", "uri": "/contracts/cHTUPSSRnEw#security-breaches", "label": "Website Terms of Use", "score": 29.2897472382, "published": true}, {"hash": "jJvuo6WRUIs", "uri": "/contracts/jJvuo6WRUIs#security-breaches", "label": "Website Terms of Use", "score": 28.975982666, "published": true}], "snippet": "In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.", "snippet_links": [{"key": "in-order-to", "type": "clause", "offset": [0, 11]}, {"key": "your-security", "type": "clause", "offset": [20, 33]}, {"key": "sole-responsibility", "type": "clause", "offset": [46, 65]}, {"key": "to-ensure", "type": "clause", "offset": [66, 75]}, {"key": "usernames-and-passwords", "type": "clause", "offset": [85, 108]}, {"key": "the-website", "type": "clause", "offset": [124, 135]}, {"key": "notify-us-of", "type": "clause", "offset": [191, 203]}, {"key": "unauthorized-use-of-your-account", "type": "clause", "offset": [208, 240]}, {"key": "unauthorized-use-of-your-password", "type": "clause", "offset": [256, 289]}, {"key": "breach-of-security", "type": "definition", "offset": [304, 322]}, {"key": "sole-discretion", "type": "clause", "offset": [407, 422]}, {"key": "breaches-of-security", "type": "clause", "offset": [512, 532]}, {"key": "unauthorized-access-to-your-account", "type": "clause", "offset": [540, 575]}], "hash": "900c5cbc1d9795d1d089bdf35ae5bf11", "id": 1}, {"size": 7, "samples": [{"hash": "dfj6bgHfGEX", "uri": "/contracts/dfj6bgHfGEX#security-breaches", "label": "Purchase Agreement", "score": 32.9039497375, "published": true}, {"hash": "jZKNj1EG4E6", "uri": "/contracts/jZKNj1EG4E6#security-breaches", "label": "Purchase Agreement", "score": 32.4084854126, "published": true}, {"hash": "1k02GZaqytJ", "uri": "/contracts/1k02GZaqytJ#security-breaches", "label": "Purchase Agreement", "score": 32.3756370544, "published": true}], "snippet": "In the event SELLER becomes aware of any actual or suspected security breach including but not limited to, physical trespass on a secure facility, unauthorized intrusion or access into SELLER\u2019s information systems or computer-related networks, loss/theft of a PC (laptop or desktop), loss or theft of printed materials, or any unauthorized compromise or use of SELLER\u2019s data or information that may potentially affect or adversely impact BUYER, SELLER shall take appropriate immediate actions to investigate, eradicate and contain such security breach, at its own expense and carry out any recovery reasonably necessary to remedy any impact of such security breach. SELLER shall notify BUYER as soon as reasonably practical but in no event later than seventy- two (72) hours after learning of such an incident. SELLER shall, without limitation, pay for or reimburse BUYER for all costs, losses and expenses incurred by BUYER and shall indemnify BUYER for any payments made by BUYER as a result of any such incident regardless of whether SELLER was aware of such an incident. BUYER shall have the right to immediately suspend accepting transactions and data from SELLER\u2019s systems until incidents are resolved; provided however, that BUYER will use commercially reasonable best efforts to limit any such suspension to only that which is reasonably necessary to permit the SELLER to investigate the severity of the incident, devise a remedy or otherwise secure the data/affected systems. Upon the request of BUYER, SELLER shall cooperate with and assist in any effort by BUYER or a third party engaged by BUYER to evaluate the security of SELLER\u2019s information systems or computer-related networks.", "snippet_links": [{"key": "in-the-event", "type": "clause", "offset": [0, 12]}, {"key": "security-breach", "type": "clause", "offset": [61, 76]}, {"key": "not-limited", "type": "clause", "offset": [91, 102]}, {"key": "secure-facility", "type": "definition", "offset": [130, 145]}, {"key": "information-systems", "type": "clause", "offset": [194, 213]}, {"key": "loss-or-theft", "type": "clause", "offset": [284, 297]}, {"key": "printed-materials", "type": "definition", "offset": [301, 318]}, {"key": "of-seller", "type": "clause", "offset": [358, 367]}, {"key": "seller-shall", "type": "clause", "offset": [445, 457]}, {"key": "immediate-actions", "type": "clause", "offset": [475, 492]}, {"key": "such-security", "type": "definition", "offset": [531, 544]}, {"key": "reasonably-necessary", "type": "clause", "offset": [599, 619]}, {"key": "in-no-event", "type": "clause", "offset": [728, 739]}, {"key": "without-limitation", "type": "clause", "offset": [825, 843]}, {"key": "pay-for", "type": "definition", "offset": [845, 852]}, {"key": "all-costs", "type": "definition", "offset": [876, 885]}, {"key": "expenses-incurred", "type": "definition", "offset": [898, 915]}, {"key": "by-buyer", "type": "clause", "offset": [916, 924]}, {"key": "payments-made-by", "type": "clause", "offset": [959, 975]}, {"key": "buyer-shall", "type": "clause", "offset": [1075, 1086]}, {"key": "right-to-immediately-suspend", "type": "clause", "offset": [1096, 1124]}, {"key": "accepting-transactions", "type": "clause", "offset": [1125, 1147]}, {"key": "from-seller", "type": "clause", "offset": [1157, 1168]}, {"key": "provided-however", "type": "clause", "offset": [1209, 1225]}, {"key": "buyer-will", "type": "clause", "offset": [1232, 1242]}, {"key": "commercially-reasonable-best-efforts", "type": "clause", "offset": [1247, 1283]}, {"key": "the-seller", "type": "clause", "offset": [1366, 1376]}, {"key": "the-data", "type": "clause", "offset": [1458, 1466]}, {"key": "affected-systems", "type": "definition", "offset": [1467, 1483]}, {"key": "the-request", "type": "clause", "offset": [1490, 1501]}, {"key": "of-buyer", "type": "clause", "offset": [1502, 1510]}, {"key": "cooperate-with", "type": "clause", "offset": [1525, 1539]}, {"key": "a-third-party", "type": "clause", "offset": [1577, 1590]}, {"key": "security-of", "type": "clause", "offset": [1624, 1635]}], "hash": "672e48204194a4e5e53232ba105c404b", "id": 6}, {"size": 6, "samples": [{"hash": "cmKwzbftzmV", "uri": "/contracts/cmKwzbftzmV#security-breaches", "label": "Services Agreement", "score": 29.3408622742, "published": true}, {"hash": "cuhRamcUOBW", "uri": "/contracts/cuhRamcUOBW#security-breaches", "label": "Services Agreement (Liberty Latin America Ltd.)", "score": 29.0109519958, "published": true}, {"hash": "363cvoqS4FD", "uri": "/contracts/363cvoqS4FD#security-breaches", "label": "Services Agreement (Liberty Latin America Ltd.)", "score": 28.9342918396, "published": true}], "snippet": "In the event of a security breach that relates to the Transition Services, the Parties shall, subject to any applicable Law, cooperate with each other in good faith regarding the timing and manner of (a) notification to their respective customers, potential customers, employees and/or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Entities.", "snippet_links": [{"key": "in-the-event-of-a", "type": "clause", "offset": [0, 17]}, {"key": "security-breach", "type": "clause", "offset": [18, 33]}, {"key": "relates-to", "type": "definition", "offset": [39, 49]}, {"key": "transition-services", "type": "clause", "offset": [54, 73]}, {"key": "the-parties-shall", "type": "clause", "offset": [75, 92]}, {"key": "subject-to", "type": "definition", "offset": [94, 104]}, {"key": "applicable-law", "type": "definition", "offset": [109, 123]}, {"key": "cooperate-with", "type": "clause", "offset": [125, 139]}, {"key": "in-good-faith", "type": "definition", "offset": [151, 164]}, {"key": "manner-of", "type": "clause", "offset": [190, 199]}, {"key": "notification-to", "type": "clause", "offset": [204, 219]}, {"key": "potential-customers", "type": "clause", "offset": [248, 267]}, {"key": "security-and", "type": "clause", "offset": [336, 348]}, {"key": "to-appropriate", "type": "clause", "offset": [365, 379]}, {"key": "governmental-entities", "type": "definition", "offset": [380, 401]}], "hash": "b6f67fad21b3eae31859b984a392a033", "id": 7}, {"size": 8, "samples": [{"hash": "bahFSWM7JWZ", "uri": "/contracts/bahFSWM7JWZ#security-breaches", "label": "Transition Services Agreement (Pactiv Evergreen Inc.)", "score": 31.7214241028, "published": true}, {"hash": "eQISnab5eOb", "uri": "/contracts/eQISnab5eOb#security-breaches", "label": "Transition Services Agreement (Pactiv Evergreen Inc.)", "score": 31.6447639465, "published": true}, {"hash": "2cEwFTBqaw2", "uri": "/contracts/2cEwFTBqaw2#security-breaches", "label": "Transition Services Agreement (Reynolds Consumer Products Inc.)", "score": 31.0917186737, "published": true}], "snippet": "If any Party discovers (a) any material breach of the Security Regulations or of the systems used to provide the Services or (b) any breach or threatened breach of the Security Regulations that involves or may reasonably be expected to involve unauthorized access, disclosure or use of the other Party\u2019s or its Affiliates\u2019 Confidential Information (each of (a) and (b), a \u201cSecurity Incident\u201d), such Party shall, at the cost of the Party responsible for the Security Incident, (i) promptly (both orally, if practicable, and in any event in writing) notify the other Party of the Security Incident and (ii) reasonably cooperate with the other Party (1) to take commercially reasonable measures necessary to control and contain the security of such Confidential Information, (2) to remedy any such Security Incident, including using commercially reasonable efforts to identify and address any root causes for such Security Incident, (3) to furnish full details of the Security Incident to the other Party and keep such other Party advised of all material measures taken and other developments with respect to such Security Incident, (4) in any litigation or formal action with third parties or in connection with any regulatory, investigatory or other action of any Governmental Authority and (5) in notifying the other Party\u2019s or its Affiliates\u2019 customers and Personnel and other persons of the Security Incident to the extent reasonably requested by the other Party.", "snippet_links": [{"key": "security-regulations", "type": "definition", "offset": [54, 74]}, {"key": "the-systems", "type": "clause", "offset": [81, 92]}, {"key": "the-services", "type": "clause", "offset": [109, 121]}, {"key": "breach-or-threatened-breach", "type": "clause", "offset": [133, 160]}, {"key": "unauthorized-access", "type": "definition", "offset": [244, 263]}, {"key": "disclosure-or-use", "type": "clause", "offset": [265, 282]}, {"key": "other-party", "type": "clause", "offset": [290, 301]}, {"key": "confidential-information", "type": "definition", "offset": [323, 347]}, {"key": "security-incident", "type": "definition", "offset": [373, 390]}, {"key": "such-party", "type": "clause", "offset": [394, 404]}, {"key": "cost-of", "type": "clause", "offset": [419, 426]}, {"key": "responsible-for", "type": "clause", "offset": [437, 452]}, {"key": "in-writing", "type": "definition", "offset": [536, 546]}, {"key": "notify-the", "type": "clause", "offset": [548, 558]}, {"key": "party-of-the", "type": "clause", "offset": [565, 577]}, {"key": "cooperate-with", "type": "clause", "offset": [616, 630]}, {"key": "reasonable-measures", "type": "clause", "offset": [672, 691]}, {"key": "to-control", "type": "definition", "offset": [702, 712]}, {"key": "security-of", "type": "clause", "offset": [729, 740]}, {"key": "such-security", "type": "definition", "offset": [790, 803]}, {"key": "commercially-reasonable-efforts", "type": "clause", "offset": [830, 861]}, {"key": "and-address", "type": "definition", "offset": [874, 885]}, {"key": "details-of-the", "type": "clause", "offset": [950, 964]}, {"key": "incident-to", "type": "definition", "offset": [974, 985]}, {"key": "other-developments", "type": "definition", "offset": [1071, 1089]}, {"key": "with-respect-to", "type": "clause", "offset": [1090, 1105]}, {"key": "formal-action", "type": "clause", "offset": [1155, 1168]}, {"key": "with-third-parties", "type": "clause", "offset": [1169, 1187]}, {"key": "in-connection-with", "type": "clause", "offset": [1191, 1209]}, {"key": "other-action", "type": "clause", "offset": [1243, 1255]}, {"key": "authority-and", "type": "clause", "offset": [1276, 1289]}, {"key": "other-persons", "type": "definition", "offset": [1372, 1385]}, {"key": "to-the-extent", "type": "clause", "offset": [1411, 1424]}, {"key": "requested-by", "type": "definition", "offset": [1436, 1448]}], "hash": "3427c42ca418c0ef38a899d29520884b", "id": 5}, {"size": 6, "samples": [{"hash": "Y7aAtReG8D", "uri": "/contracts/Y7aAtReG8D#security-breaches", "label": "457(b) Custodial Account Agreement", "score": 26.445640564, "published": true}, {"hash": "bG8eoqhOqZW", "uri": "/contracts/bG8eoqhOqZW#security-breaches", "label": "403(b)(7) Account Application & Agreement", "score": 22.761806488, "published": true}, {"hash": "69ekRcmrM2S", "uri": "/contracts/69ekRcmrM2S#security-breaches", "label": "Custodial Account Agreement", "score": 22.0595474243, "published": true}], "snippet": "Each party shall promptly provide the other party with notice of (i) any disclosure, access to or use of any Personal Information in breach of this Agreement and (ii) any unauthorized intrusion into systems containing Customer\u2019s Personal Information.", "snippet_links": [{"key": "each-party", "type": "definition", "offset": [0, 10]}, {"key": "provide-the", "type": "clause", "offset": [26, 37]}, {"key": "other-party", "type": "clause", "offset": [38, 49]}, {"key": "notice-of", "type": "clause", "offset": [55, 64]}, {"key": "access-to", "type": "definition", "offset": [85, 94]}, {"key": "personal-information", "type": "definition", "offset": [109, 129]}, {"key": "breach-of-this-agreement", "type": "definition", "offset": [133, 157]}], "hash": "461d380f256d4fd16d46f3af5b738fa7", "id": 10}, {"size": 6, "samples": [{"hash": "jFYiUdaQCnB", "uri": "/contracts/jFYiUdaQCnB#security-breaches", "label": "Investment Management Agreement", "score": 32.0151672363, "published": true}, {"hash": "f55kKGdF2FB", "uri": "/contracts/f55kKGdF2FB#security-breaches", "label": "Investment Management Agreement", "score": 31.8043899536, "published": true}, {"hash": "1QEIYmE3ZBv", "uri": "/contracts/1QEIYmE3ZBv#security-breaches", "label": "Investment Management Agreement", "score": 26.5811080933, "published": true}], "snippet": "16.12.1 If a party becomes aware that the other party\u2019s Confidential Information is used or disclosed in any manner not permitted under the Agreement, if a party is unable to account for any Confidential Information of the other party, or if a party knows any security breach or other incident has occurred that could compromise the security or integrity of any system in which it stores or processes Confidential Information of the other party (each, a \u201cSecurity Breach\u201d), such party shall notify the other party by email and/or telephone promptly. Such notice is to describe the Security Breach in sufficient detail (accounting for the information then available to such party) for the other party to assess its risk. The Manager shall send its email notice addressed to and/or telephone primary point of contact. The Manager shall also maintain a log of all such incidents and either retain such records for as long as it is performing services under this Agreement or provide the records (or copies of such records) to the FRBNY prior to destruction of the records under the Manager\u2019s normal record retention policy.\n16.12.2 The affected party shall take all measures reasonably required to recover information, to mitigate the effects of the unauthorized use or disclosure or loss, to prevent further unauthorized use or disclosure or loss and reoccurrence of a breach of security of that same nature, and to cooperate with the other party and its agents in any investigation that the other party may undertake relating to the unauthorized use or disclosure or loss. The affected party shall keep the other party informed as soon as practicable of developments regarding the Security Breach, including, without limitation, effects being observed in the affected system(s), investigation of the Security Breach and its effects and the root cause, and periodic progress made toward completion of action plans for remediation. The affected party shall send the other party information about developments in its investigation and remediation activities as directed by the other party (which, for the FRBNY is to be by email to the address above and/or by telephone to the FRBNY\u2019s primary point of contact unless directed otherwise). The FRBNY may share information about any Security Breach with any the Board of Governors, the UST, and any other Reserve Bank that the FRBNY reasonably believes may be adversely impacted by the Security Breach. The affected party shall bear the costs of all such measures taken or to be taken by such party.", "snippet_links": [{"key": "a-party", "type": "clause", "offset": [11, 18]}, {"key": "other-party", "type": "clause", "offset": [42, 53]}, {"key": "not-permitted", "type": "clause", "offset": [116, 129]}, {"key": "the-agreement", "type": "clause", "offset": [136, 149]}, {"key": "to-account", "type": "definition", "offset": [172, 182]}, {"key": "confidential-information-of", "type": "clause", "offset": [191, 218]}, {"key": "security-breach", "type": "clause", "offset": [260, 275]}, {"key": "the-security", "type": "clause", "offset": [329, 341]}, {"key": "integrity-of", "type": "clause", "offset": [345, 357]}, {"key": "such-party", "type": "clause", "offset": [474, 484]}, {"key": "notify-the", "type": "clause", "offset": [491, 501]}, {"key": "by-email", "type": "clause", "offset": [514, 522]}, {"key": "sufficient-detail", "type": "clause", "offset": [600, 617]}, {"key": "accounting-for", "type": "clause", "offset": [619, 633]}, {"key": "the-information", "type": "clause", "offset": [634, 649]}, {"key": "available-to", "type": "definition", "offset": [655, 667]}, {"key": "the-manager", "type": "definition", "offset": [720, 731]}, {"key": "email-notice", "type": "clause", "offset": [747, 759]}, {"key": "addressed-to", "type": "definition", "offset": [760, 772]}, {"key": "primary-point-of-contact", "type": "definition", "offset": [790, 814]}, {"key": "agreement-or", "type": "definition", "offset": [959, 971]}, {"key": "the-records", "type": "clause", "offset": [980, 991]}, {"key": "copies-of", "type": "clause", "offset": [996, 1005]}, {"key": "prior-to", "type": "clause", "offset": [1033, 1041]}, {"key": "record-retention-policy", "type": "definition", "offset": [1096, 1119]}, {"key": "the-affected-party-shall", "type": "clause", "offset": [1129, 1153]}, {"key": "to-mitigate", "type": "definition", "offset": [1216, 1227]}, {"key": "unauthorized-use-or-disclosure", "type": "clause", "offset": [1247, 1277]}, {"key": "security-of", "type": "clause", "offset": [1377, 1388]}, {"key": "cooperate-with", "type": "clause", "offset": [1414, 1428]}, {"key": "relating-to", "type": "definition", "offset": [1516, 1527]}, {"key": "as-soon-as-practicable", "type": "definition", "offset": [1627, 1649]}, {"key": "without-limitation", "type": "clause", "offset": [1708, 1726]}, {"key": "root-cause", "type": "definition", "offset": [1839, 1849]}, {"key": "completion-of", "type": "definition", "offset": [1885, 1898]}, {"key": "plans-for", "type": "clause", "offset": [1906, 1915]}, {"key": "party-information", "type": "definition", "offset": [1969, 1986]}, {"key": "remediation-activities", "type": "definition", "offset": [2031, 2053]}, {"key": "as-directed", "type": "definition", "offset": [2054, 2065]}, {"key": "by-telephone", "type": "clause", "offset": [2153, 2165]}, {"key": "share-information", "type": "clause", "offset": [2248, 2265]}, {"key": "the-board-of-governors", "type": "clause", "offset": [2301, 2323]}, {"key": "reserve-bank", "type": "definition", "offset": [2348, 2360]}, {"key": "reasonably-believes", "type": "definition", "offset": [2376, 2395]}, {"key": "costs-of-all", "type": "clause", "offset": [2480, 2492]}], "hash": "a85394a971f05655243a4a2d25700bea", "id": 9}, {"size": 6, "samples": [{"hash": "aphBrKefnKr", "uri": "/contracts/aphBrKefnKr#security-breaches", "label": "Tariff Agreement", "score": 35.6387367249, "published": true}, {"hash": "gtc75rE5bLt", "uri": "/contracts/gtc75rE5bLt#security-breaches", "label": "Tariff Agreement", "score": 34.4567489624, "published": true}, {"hash": "2xSTP0hb8Z9", "uri": "/contracts/2xSTP0hb8Z9#security-breaches", "label": "Tariff Agreement", "score": 33.8355178833, "published": true}], "snippet": "Notwithstanding the Operator\u2019s other rights under this Tariff, Operator, at its sole discretion, may deny access to any User, its employees, agents, contractors, guests or invitees upon breaches any of the security rules and regulations which apply to the Berth Corridor.", "snippet_links": [{"key": "the-operator", "type": "clause", "offset": [16, 28]}, {"key": "other-rights", "type": "clause", "offset": [31, 43]}, {"key": "sole-discretion", "type": "clause", "offset": [80, 95]}, {"key": "access-to", "type": "definition", "offset": [106, 115]}, {"key": "security-rules-and-regulations", "type": "clause", "offset": [206, 236]}], "hash": "8edf850aa6e63afca3368b6d069d38d3", "id": 8}], "next_curs": "CloSVGoVc35sYXdpbnNpZGVyY29udHJhY3RzcjYLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhpzZWN1cml0eS1icmVhY2hlcyMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"children": [["", ""], ["reporting", "Reporting"], ["additional-remedies-in-the-event-of-actual-breach", "Additional Remedies in the Event of Actual Breach"], ["investigations-in-response-to-actual-or-suspected-breach", "Investigations in Response to Actual or Suspected Breach"], ["assistance-in-event-of-security-breach", "Assistance in Event of Security Breach"]], "size": 358, "title": "Security Breaches", "parents": [["access-and-security", "Access and Security"], ["miscellaneous", "Miscellaneous"], ["security", "Security"], ["security-systems", "Security Systems"], ["general-provisions", "General Provisions"]], "id": "security-breaches", "related": [["security-breach", "Security Breach", "Security Breach"], ["data-breaches", "Data Breaches", "Data Breaches"], ["security-breach-notification", "Security Breach Notification", "Security Breach Notification"], ["data-breach", "Data Breach", "Data Breach"], ["personal-information-security-breach", "Personal Information security breach", "Personal Information security breach"]], "related_snippets": [], "updated": "2026-05-06T04:38:42+00:00", "also_ask": ["What minimum security standards should be mandated to ensure enforceability?", "How can liability caps for security breaches be strategically negotiated?", "What are the most common loopholes in security breach clauses that expose parties to risk?", "How do security breach obligations in this clause compare to industry best practices and statutory requirements?", "What evidence is typically required in court to prove a breach and trigger remedies under this clause?"], "drafting_tip": "Define 'security breach' precisely to avoid ambiguity; specify notification timelines to ensure prompt response; allocate responsibilities clearly to facilitate effective remediation.", "explanation": "The Security Breaches clause defines the obligations and procedures that apply when a party experiences an unauthorized access to, or disclosure of, sensitive data. Typically, this clause requires the affected party to promptly notify the other party of the breach, take steps to mitigate any harm, and cooperate in any investigation or remedial actions. Its core function is to ensure that both parties are prepared to respond effectively to data security incidents, thereby minimizing potential damage and ensuring compliance with legal or contractual data protection requirements."}, "json": true, "cursor": ""}}