Security Compromise Sample Clauses

Security Compromise. Where Protected Data has been acquired by any unauthorised person on systems managed by or otherwise controlled by IRONTREE INTERNET SERVICES, excluding unsuccessful attempts or activities that do not compromise the security of the Protected Data.
AutoNDA by SimpleDocs
Security Compromise as soon as reasonably practicable but by no later than 72 (seventy-two) hours after becoming aware of any suspected or confirmed Personal Information Breach of any Personal Information in its possession or control, inform the other Party in writing thereof. Furthermore, a Party shall also inform the other Party in writing of the third party(ies) which may have been affected, the nature and extent of the Personal Information Breach and the identity of the unauthorized person/s who may have accessed or acquired the Personal Information. The Party, whose actions and/or omissions resulted in the Personal Information Breach, shall also take necessary remedial steps in order to mitigate the extent of the loss or compromise of such Personal Information, and prevent it from recurring. Such written notification however shall not be interpreted or construed as an admission of fault or liability by the other Party. Where the Party whose actions and/or omissions resulted in the Personal Information Breach, is deemed to be a Responsible Party/Controller, then it will be accountable to the Information Regulator and all affected Data Subjects, and will accordingly be required to carry out any required regulatory notifications of the Personal Information Breach in accordance with Applicable Data Protection Legislation.
Security Compromise. If at any time the Client believes that the security of communications between the Client and BMO has been compromised or is in any way insecure, the Client will immediately notify BMO and provide all reasonable assistance BMO requires to investigate and correct the problem.
Security Compromise. 1. In case of actual or suspected Security Compromise, the National Security Authority of the Party where it has occurred shall, without delay, inform the National Security Authority of the Originating Party and, in accordance with national laws and regulations, initiate appropriate proceedings, in order to determine the circumstances of the compromise. The results of the proceedings shall be forwarded to the National Security Authority of the Originating Party.
Security Compromise. In the event of a suspected or actual compromise of security of any kind – destruction, misappropriation, theft, unauthorized reproduction, disclosure or actual or suspected loss of transmitted or exchanged classified information and material, or any violation of national regulations on the protection of classified information transmitted under this Agreement – the competent security authorities of the other Party shall be informed immediately in writing. The notification shall be sufficiently detailed to enable the originating Party to conduct a thorough evaluation of the consequences. The recipient Party shall conduct an investigation (with the assistance of the other Party, if necessary) and take all appropriate measures, in accordance with its national laws and regulations, to mitigate the consequences and prevent any further such occurrences. The recipient Party shall inform the originating Party of the results of the investigation and of the measures taken to prevent the recurrence of such incidents.
Security Compromise. During the term of this Agreement, and for a period of [**] years thereafter (or if earlier, until [**] years after End of Life with respect to any particular model of the Equipment), if, while the affected Equipment is within the Initial Warranty Period or the affected Software is under Support Services and Purchaser is using a supported version of Software, a Security Compromise occurs that permits the unauthorized access to a Purchaser’s System, then the Parties jointly shall develop a counter-measures program to remedy such Security Compromise, which program shall be implemented at Seller’s sole expense. Notwithstanding the foregoing, to the extent a Security Compromise arises out of the acts or omissions of a Purchaser or any of Purchaser’s employees, consultants, agents and/or subcontractors or any Purchaser’s failure to implement any security patch available from Seller, the above-referenced counter-measure program shall be implemented at Purchaser’s sole expense, and further, Seller shall be reasonably compensated on a time and materials basis for its services in developing the counter-measures program.

Related to Security Compromise

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Controls Annually, upon Fund’s reasonable request, Transfer Agent shall provide Fund’s Chief Information Security Officer or his or her designee with a copy of its corporate information security controls that form the basis for Transfer Agent’s Security Policy and an opportunity to discuss Transfer Agent’s information security measures, and a high level summary of any vulnerability testing conducted by Transfer Agent on its information security controls, with a qualified member of Transfer Agent’s information technology management team. Transfer Agent shall review its Security Policy annually.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Safeguards (1) Each party acknowledges that it is solely responsible for determining and communicating to the other the appropriate technological, physical, and organizational security measures required to protect Personal Data.

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.

  • Security Agreements Signed original security agreements, assignments, financing statements and fixture filings (together with collateral in which the Bank requires a possessory security interest), which the Bank requires.

  • Security Clearance 6.7.1 Where specified by the Authority or the Contract user, the Supplier shall be responsible for ensuring that all Staff are security cleared to the level required by the Security Requirements not less than 5 Working Days before such person begins to perform the Services. If the Authority is responsible for applying for security clearance for Staff pursuant to this Clause 6.7.1, the Supplier shall provide a completed security clearance application form for such members of Staff to the Authority not less than 30 days before such members of Staff begin to perform the Services.

  • Security Clearances A. The General Contractor is to supply the Department of Corrections with full names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted a minimum of two (2) weeks prior to access to the site. The Department of Corrections has final word on who will be permitted access to the site. A form for this purpose is attached for your use.

  • Security Interests Absolute All rights of the Secured Parties and all obligations of the Debtors hereunder, shall be absolute and unconditional, irrespective of: (a) any lack of validity or enforceability of this Agreement, the Debentures or any agreement entered into in connection with the foregoing, or any portion hereof or thereof; (b) any change in the time, manner or place of payment or performance of, or in any other term of, all or any of the Obligations, or any other amendment or waiver of or any consent to any departure from the Debentures or any other agreement entered into in connection with the foregoing; (c) any exchange, release or nonperfection of any of the Collateral, or any release or amendment or waiver of or consent to departure from any other collateral for, or any guarantee, or any other security, for all or any of the Obligations; (d) any action by the Secured Parties to obtain, adjust, settle and cancel in its sole discretion any insurance claims or matters made or arising in connection with the Collateral; or (e) any other circumstance which might otherwise constitute any legal or equitable defense available to a Debtor, or a discharge of all or any part of the Security Interests granted hereby. Until the Obligations shall have been paid and performed in full, the rights of the Secured Parties shall continue even if the Obligations are barred for any reason, including, without limitation, the running of the statute of limitations or bankruptcy. Each Debtor expressly waives presentment, protest, notice of protest, demand, notice of nonpayment and demand for performance. In the event that at any time any transfer of any Collateral or any payment received by the Secured Parties hereunder shall be deemed by final order of a court of competent jurisdiction to have been a voidable preference or fraudulent conveyance under the bankruptcy or insolvency laws of the United States, or shall be deemed to be otherwise due to any party other than the Secured Parties, then, in any such event, each Debtor’s obligations hereunder shall survive cancellation of this Agreement, and shall not be discharged or satisfied by any prior payment thereof and/or cancellation of this Agreement, but shall remain a valid and binding obligation enforceable in accordance with the terms and provisions hereof. Each Debtor waives all right to require the Secured Parties to proceed against any other person or entity or to apply any Collateral which the Secured Parties may hold at any time, or to marshal assets, or to pursue any other remedy. Each Debtor waives any defense arising by reason of the application of the statute of limitations to any obligation secured hereby.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

Time is Money Join Law Insider Premium to draft better contracts faster.