Security Violation Clause Samples
Security Violation. An act from within an organization that bypasses or disobeys security policies, practices, or procedures. Sensitive data is a special category of personally identifiable information (PII) that has the potential to cause great harm to an individual, government agency, or program if abused, misused, or breached. It is sensitive information protected against unwarranted disclosure and carries specific criminal and civil penalties for an individual convicted of unauthorized access, disclosure, or misuse. Protection of sensitive information usually involves specific classification or legal precedents that provide special protection for legal and ethical reasons. SIM is software that automates the collection of event log data from security devices such as firewalls, proxy servers, intrusion detection systems and anti-virus software. The SIM translates the data into correlated and simplified formats. SMDS is a telecommunications service that provides connectionless, high- performance, packet- switched data transport. Although not a protocol, it supports standard protocols and communications interfaces using current technology. Synonymous with “SSA-supplied data/information‟, defines information under the control of SSA provided to an external entity under the terms of an information exchange agreement with SSA. The following are examples of SSA-provided data/information: • SSA’s response to a request from an EIEP for information from SSA (e.g., date of death) • SSA’s response to a query from an EIEP for verification of an SSN This term, sometimes used interchangeably with “SSA-provided data/information,‟ denotes information under the control of SSA provided to an external entity under the terms of an information exchange agreement with SSA. However, “SSA data/information” also includes information provided to the EIEP by a source other than SSA, but which the EIEP attests to that SSA verified it, or the EIEP couples the information with data from SSA as to to certify the accuracy of the information. The following are examples of SSA information: • SSA’s response to a request from an EIEP for information from SSA (e.g., date of death) • SSA’s response to a query from an EIEP for verification of an SSN • Display by the EIEP of SSA’s response to a query for verification of an SSN and the associated SSN provided by SSA • Display by the EIEP of SSA’s response to a query for verification of an SSN and the associated SSN provided to the EIEP by a source other than SSA •...
Security Violation. Recipient shall monitor access of Users and shall notify Agency within twenty-four (24) hours if a security violation of this Contract is detected, or if Recipient suspects that the security or integrity of TWC Information has or may have been compromised in any way.
Security Violation. If any activity violating the Platform's security or threatening the integrity of user data or Netzo is detected.
Security Violation. Board and Board subcontractor shall monitor access of Users and shall notify Agency within twenty-four (24) hours if a security violation of this Agreement is detected, or if Board or Board subcontractor suspects that the security or integrity of TWC Information has or may have been compromised in any way. The time period for notifying TWC under this section is reduced to one (1) hour for suspected security violations that involve protected health information of a covered under 45 C.F.R. Parts 160, 162, and 164, such as Medicaid Information provided from, by or accessed through the Health and Human Services Commission systems as required by the Health Information and Portability and Accountability Act (HIPAA) and the Health Information Technology Act (HITECH).
Security Violation. Independent Contractor agrees that any Employee who violates the security requirements of this Document and/or any other obligation to BCBSM Data will be immediately removed and prohibited from providing services to BCBSM under any agreement, including statements of work or engagement letters, entered into between BCBSM and Independent Contractor.
Security Violation. The Member is prohibited from violating or attempting to violate the security of the Site including, without limitation, accessing data not intended for them or logging into a server or account which they are not authorized to access, attempting to probe, scan or test the vulnerability of a system or network or attempting to breach security or authentication measures without proper authorization, attempting to interfere with service to any Member, host or network or sending unsolicited e-mail. Violation of the system or network security may result in civil or criminal liability.
