Security Incident Response Program Sample Clauses

Security Incident Response Program. Supplier maintains appropriate security incident management policies and procedures. Supplier will immediately, but at least within 24 hours upon discovery, notify SFDC of an actual or reasonably suspected Security Breach. In the notification, Supplier shall include details of when the Security Breach occurred and when it was detected, the nature and scope of the Protected Information involved in the Security Breach including where possible, the categories and approximate number of data subjects concerned and the categories and approximate number of personal data records concerned, the observed and probable consequences of the Security Breach, measures taken or proposed to mitigate the negative effects of the Security Breach, the name and contact details of the data protection officer or other contact point where more information can be obtained, and all other information requested by SFDC regarding the Security Breach. In addition, Supplier shall (i) investigate and remediate the effects of the Security Breach; (ii) provide SFDC, in writing, an impact assessment and assurance satisfactory to SFDC that such Security Breach will not recur; and (iii) upon SFDC's request, provide SFDC with cooperation and assistance needed to fulfill SFDC’s obligations to provide information to regulators or individuals without undue delay as required by Data Protection Laws and Regulations. To the extent Supplier does not have full information about the Security Breach at the time of the initial notification, Supplier shall still complete the initial notification on the timing set forth above and then supplement that with additional information as it becomes available. Without limiting any other rights or remedies of SFDC, if as the result of any act or omission of Supplier or any of its personnel, contractors, or agents, one or more third parties is required to be notified of unauthorized access or use of Protected Information, Supplier agrees it shall be responsible for any reasonable costs associated with such communication (including providing call center services) and for any costs of providing a credit monitoring services. In addition, Supplier will provide indemnification to SFDC related to such Security Breach as set forth in the Agreement.
AutoNDA by SimpleDocs
Security Incident Response Program. Genesys will maintain a Security Incident response program based on industry standards designed to identify and respond to suspected and actual Security Incidents involving Customer Data. The program will be reviewed, tested and, if necessary, updated on at least an annual basis. “Security Incident” means a confirmed event resulting in the unauthorized use, deletion, modification, disclosure, or access to Customer Data.
Security Incident Response Program. Cognizant will maintain an incident response program in compliance with Applicable Laws to respond to Security Incidents.
Security Incident Response Program. Cognizant will maintain an incident response process. The process will be designed with the intent of detecting and responding to Security Incidents. Cognizant will have a documented plan and associated procedures to be followed in the case of a confirmed Security Incident.
Security Incident Response Program. Copper will maintain a Reasonable incident response program to respond to Security Incidents.
Security Incident Response Program. You will maintain a reasonable incident response program to respond to Security Incidents.
Security Incident Response Program. Supplier must maintain a reasonable Security Incident response program.
AutoNDA by SimpleDocs
Security Incident Response Program. Supplier shall immediately notify SFDC of all Security Breaches at the email alias xxxxxxxx@xxxxxxxxxx.xxx, including all information reasonably requested by SFDC and available to Supplier regarding the Security Breach. In addition, Supplier shall (i) investigate and remediate the effects of the Security Breach; (ii) provide SFDC, in writing, an impact assessment and assurance satisfactory to SFDC that such Security Breach will not recur; and (iii) upon SFDC's request, provide SFDC with cooperation and assistance needed to fulfill SFDC’s obligations to provide information to regulators or Data Subjects without undue delay as required by Data Protection Laws and Regulations. Without limiting any other rights or remedies of SFDC, if as the result of any act or omission of Supplier or any of its personnel, contractors, or agents, one or more third parties is required to be notified of unauthorized access or use of Personal Data, Supplier agrees it shall be responsible for any reasonable costs associated with such communication (including providing call center services) and for any costs of providing a credit monitoring service.
Security Incident Response Program. Xxxxxx will maintain a Reasonable incident response program to respond to Security Incidents.

Related to Security Incident Response Program

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Incident Response Operator shall have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of any portion of Data, including PII, and agrees to provide LEA, upon request, an executive summary of the written incident response plan.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Client Responsibility For clarity, the parties agree that in reviewing the documents referred to in clause (b) above, Patheon’s role will be limited to verifying the accuracy of the description of the work undertaken or to be undertaken by Patheon. Subject to the foregoing, Patheon will not assume any responsibility for the accuracy of any application for receipt of an approval by a Regulatory Authority. The Client is solely responsible for the preparation and filing of the application for approval by the Regulatory Authority and any relevant costs will be borne by the Client.

  • ACCIDENT PREVENTION T h i s p r o v i s i o n i s applicable to all Federal-aid construction contracts and to all related subcontracts.

  • Review Protocol A narrative description of how the Claims Review was conducted and what was evaluated.

  • Claims Administration An employee will be required to comply with any and all rules and regulations and/or limitations established by the carrier or applicable third party administrator and contained in the policy, and employees and their dependents shall look solely to such carrier or third party administration for the adjudication of the payment of any and all benefits claims.

Time is Money Join Law Insider Premium to draft better contracts faster.