Unsuccessful Security Incident Sample Clauses

Unsuccessful Security Incident an attempt to gain access to your Content, Smart Data or the infrastructure and networks that provide the Services (including denial of service attacks, pings, attacks on firewalls or edge servers, port scans, unsuccessful log-on attempts, packet sniffing or other unauthorised access to traffic data) that does not result in a personal data breach in relation to your Content and/or Smart Data.
AutoNDA by SimpleDocs
Unsuccessful Security Incident. “Unsuccessful Security Incident” shall mean a Security Incident that does not result in unauthorized access, use, disclosure, modification or destruction of PHI (including, for example, and not for limitation, pings on Business Associate’s firewall, port scans, attempts to log onto a system or enter a database with an invalid password or user name, denial-of-service attacks that do not result in the system being taken off-line, or malware such as worms or viruses).
Unsuccessful Security Incident. AAI has no obligation to report or respond to an Unsuccessful Security Incident, and any response by AAI shall not be construed as an acknowledgement by AAI of any fault or liability. An “Unsuccessful Security Incident” means an incident that results in no unauthorized access to Customer Data or to any of AAI’s equipment or facilities storing Customer Data, and may include, without limitation, dropped or denied network traffic, denied access attempts to systems and applications, alerts from security devices or services, pings and other broadcast attacks on firewalls or edge servers, denial of service attacks, packet sniffing (or other unauthorized access to traffic data that does not result in access to Customer Data) or similar incidents.
Unsuccessful Security Incident. As used herein, the term “Unsuccessful Security Incident” means a security incident (as defined under HIPAA) that does not result in: (1) the unauthorized access, use, disclosure, modification or destruction of information; or (2) material interference with system operations in a party’s information system, including, without limitation, activity such as ping and other broadcast attacks on that party’s firewall, port scans, unsuccessful log-on attempts, denial of service and/or any combination of the foregoing, so long as no such incident results in unauthorized access, use or disclosure of electronic protected health information.
Unsuccessful Security Incident any attempts of bypassing the Business Associate’s security system including, but not limited to, pings, password-based attacks, unsuccessful log-on attempts and other attacks on Business Associate’s firewall, so long as no such incident results in actual or reasonably suspected unauthorized access, Use or Disclosure of PHI.

Related to Unsuccessful Security Incident

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Defense of the Underlying Proceeding (a) Indemnitee shall notify the Company promptly in writing upon being served with any summons, citation, subpoena, complaint, indictment, request or other document relating to any Proceeding which may result in the right to indemnification or the advance of Expenses hereunder and shall include with such notice a description of the nature of the Proceeding and a summary of the facts underlying the Proceeding. The failure to give any such notice shall not disqualify Indemnitee from the right, or otherwise affect in any manner any right of Indemnitee, to indemnification or the advance of Expenses under this Agreement unless the Company’s ability to defend in such Proceeding or to obtain proceeds under any insurance policy is materially and adversely prejudiced thereby, and then only to the extent the Company is thereby actually so prejudiced.

Time is Money Join Law Insider Premium to draft better contracts faster.