Security Violations Sample Clauses

The 'Security Violations' clause defines the obligations and consequences related to breaches of security protocols or unauthorized access to protected systems or data. Typically, this clause outlines what constitutes a security violation, such as unauthorized data access, tampering with security measures, or failure to report incidents, and may specify required actions like notification, remediation, or penalties. Its core function is to establish clear standards for handling security breaches, thereby protecting sensitive information and minimizing potential harm to the parties involved.
Security Violations. 4.01 The CGA must report security violations to the CJIS Systems Officer (CSO) and the Director, FBI, along with indications of actions taken by the CGA and Contractor. 4.02 Security violations can justify termination of the appended agreement. 4.03 Upon notification, the FBI reserves the right to: a. Investigate or decline to investigate any report of unauthorized use; b. Suspend or terminate access and services, including telecommunications links. The FBI will provide the CSO with timely written notice of the suspension. Access and services will be reinstated only after satisfactory assurances have been provided to the FBI by the CGA and Contractor. Upon termination, the Contractor's records containing CHRI must be deleted or returned to the CGA.
Security Violations. Use of the Product to violate the security or integrity of any network, computer or communications system, software application or network or computing device.
Security Violations. BellSouth reserves the right to interview ACCESS Integrated’s employees, agents, suppliers, or Guests in the event of wrongdoing in or around a BellSouth Premises or Remote Site Location or involving BellSouth’s or another collocated telecommunications carrier’s property or personnel, provided that BellSouth shall provide reasonable notice to ACCESS Integrated’s Security representative of such interview. ACCESS Integrated and its employees, agents, suppliers, or Guests shall reasonably cooperate with BellSouth’s investigation into allegations of wrongdoing or criminal conduct committed by, witnessed by, or involving ACCESS Integrated’s employees, agents, suppliers, or Guests. Additionally, BellSouth reserves the right to ▇▇▇▇ ACCESS Integrated for all reasonable costs associated with investigations involving its employees, agents, or suppliers, or Guests if it is established and mutually agreed in good faith that ACCESS Integrated’s employees, agents, suppliers, or Guests are responsible for the alleged act(s). BellSouth shall ▇▇▇▇ ACCESS Integrated for BellSouth property, which is stolen or damaged, where an investigation determines the culpability of ACCESS Integrated’s employees, agents, suppliers, or Guests and where ACCESS Integrated agrees, in good faith, with the results of such investigation. ACCESS Integrated shall notify BellSouth in writing immediately in the event that ACCESS Integrated discovers one of its employees, agents, suppliers, or Guests already working on the BellSouth Remote Site Location is a possible security risk. Upon request of the other Party, the Party who is the employer shall discipline consistent with its employment practices, up to and including removal from a BellSouth Premises or Remote Site Location, any employee found to have violated the security and safety requirements of this Section. ACCESS Integrated shall hold BellSouth harmless for any damages resulting from such removal of ACCESS Integrated’s personnel from a BellSouth Premises.
Security Violations. You are responsible for ensuring and maintaining security of your systems and the machines that connect to and use Service(s), including implementation of necessary patches and operating system updates. The Services may not be used to interfere with, gain unauthorized access to, or otherwise violate the security of any server, network, network access, personal computer or control devices, software or data, or other system, or to attempt to do any of the foregoing.
Security Violations. Except in the case of Contracts involving products installed at the Customer’s premises or at the Customer’s suppliers for which this Section 6.3 does not apply, if the Supplier becomes aware of a Security Violation of Personal Data, it shall: 6.3.1 inform the Customer without undue delay by notice forwarded to the Notifications Email; 6.3.2 take reasonable measures to limit the possible damage and security of Personal Data; 6.3.3 provide the Customer, to the extent possible, with a description of the Personal Data Security Breach, including the measures taken to avoid or mitigate the potential risks and the tasks recommended by the Supplier to the Customer to manage the Security Breach; 6.3.4 consider as confidential information, in accordance with the provisions of the Contract, any information pertaining to any Security Breaches, related documents, releases and notices, and without the prior written consent of the Data Controller, it shall not disclose any information to third parties, outside the cases strictly necessary for the fulfillment of the Customer’s obligations arising from the Personal Data Protection Legislation.
Security Violations. BellSouth reserves the right to interview PTLLC’s employees, agents, or suppliers in the event of wrongdoing in or around BellSouth’s property or involving BellSouth’s or another collocated telecommunications carrier’s property or personnel, provided that BellSouth shall provide reasonable notice to PTLLC’s Security representative of such interview. PTLLC and its suppliers shall reasonably cooperate with BellSouth’s investigation into allegations of wrongdoing or criminal conduct committed by, witnessed by, or involving PTLLC’s employees, agents, or suppliers. Additionally, BellSouth reserves the right to ▇▇▇▇ PTLLC for all reasonable costs associated with investigations involving its employees, agents, or suppliers if it is established and mutually agreed in good faith that PTLLC’s employees, agents, or suppliers are responsible for the alleged act. BellSouth shall ▇▇▇▇ PTLLC for BellSouth property, which is stolen or damaged where an investigation determines the culpability of PTLLC’s employees, agents, or suppliers and where PTLLC agrees, in good faith, with the results of such investigation. PTLLC shall notify BellSouth in writing immediately in the event that PTLLC discovers one of its employees already working on the BellSouth Premises is a possible security risk. Upon request of the other Party, the Party who is the employer shall discipline consistent with its employment practices, up to and including removal from BellSouth’s Premises, any employee found to have violated the security and safety requirements of this Section. PTLLC shall hold BellSouth harmless for any damages resulting from such removal of its personnel from a BellSouth Premises.
Security Violations. You may not use the Platform to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:
Security Violations. You may not use Services Offerings to violate the security or integrity of any network, computer, communications system, software application, network or computing device (each, a “System”).
Security Violations. You are prohibited from engaging in any violations of system or network security. Our internet service may not be used in connection with attempts - whether or not successful - to violate the security of a network, service, or other system. Examples of prohibited activities include, without limitation, hacking, cracking into, monitoring, or using systems without authorization; scanning ports; conducting denial of service attacks; and distributing viruses or other harmful software. We reserve the right to suspend the Internet access upon notification from a recognized Internet authority or ISP regarding such abuse. We may disconnect Your equipment and withhold services if We consider Your hardware or software is, or has become, inappropriate for connection to Our network. You are responsible for Your own virus or malware protection on Your systems and hardware.
Security Violations. 2.1 The Buyer and its End Users shall not access and/or use, or encourage, promote, facilitate or instruct others to access and/or use the Service Elements, the Buyer Content or the Buyer Account in a manner that would compromise or harm the security or integrity of any information technology service or system (including any network, computer, device, communication system or software application), including by means of: 2.1.1 unless otherwise agreed, any API other than that made available by the Supplier; 2.1.2 unauthorised access and/or use, including attempting to probe, scan, or test the vulnerability of any information technology service or system or to breach any security or authentication measures used by any information technology service or system; 2.1.3 the monitoring of data or traffic without permission; or 2.1.4 fraud or other forms of misrepresentation.