{"component": "definition", "props": {"groups": [{"size": 15, "snippet": "means an immediately reportable subset of security incidents which incident would include:\na. A suspected penetration of Contractor\u2019s information system of which the Contractor becomes aware of but for which it is not able to verify immediately upon becoming aware of the suspected incident that PHI was not accessed, stolen, used, disclosed, modified, or destroyed;\nb. Any indication, evidence, or other security documentation that the Contractor\u2019s network resources, including, but not limited to, software, network routers, firewalls, database and application servers, intrusion detection systems or other security appliances, may have been damaged, modified, taken over by proxy, or otherwise compromised, for which Contractor cannot refute the indication of the time the Contractor became aware of such indication;\nc. A breach of the security of the Contractor\u2019s information system(s) by unauthorized acquisition, including, but not limited to, access to or use, disclosure, modification or destruction, of unencrypted computerized data and which incident materially compromises the security, confidentiality, or integrity of the PHI; and or,\nd. The unauthorized acquisition, including but not limited to access to or use, disclosure, modification or destruction, of unencrypted PHI or other confidential information of the County by an employee or authorized user of Contractor\u2019s system(s) which materially compromises the security, confidentiality, or integrity of PHI or other confidential information of the County. If data acquired (including but not limited to access to or use, disclosure, modification or destruction of such data) is in encrypted format but the decryption key which would allow the decoding of the data is also taken, the parties shall treat the acquisition as a breach for purposes of determining appropriate response.", "samples": [{"hash": "jGox6Ao1Gy3", "uri": "/contracts/jGox6Ao1Gy3#security-event", "label": "Standard Contract", "score": 33.7806930542, "published": true}, {"hash": "1iBM9qW6F3v", "uri": "/contracts/1iBM9qW6F3v#security-event", "label": "Standard Contract", "score": 33.7806930542, "published": true}, {"hash": "jrZL1WWF2mS", "uri": "/contracts/jrZL1WWF2mS#security-event", "label": "Pre K Academy Contract", "score": 33.2223472595, "published": true}], "snippet_links": [{"key": "security-incidents", "type": "clause", "offset": [42, 60]}, {"key": "of-contractor", "type": "clause", "offset": [118, 131]}, {"key": "information-system", "type": "clause", "offset": [134, 152]}, {"key": "to-verify", "type": "definition", "offset": [223, 232]}, {"key": "immediately-upon", "type": "clause", "offset": [233, 249]}, {"key": "security-documentation", "type": "definition", "offset": [405, 427]}, {"key": "network-resources", "type": "definition", "offset": [450, 467]}, {"key": "not-limited", "type": "clause", "offset": [484, 495]}, {"key": "and-application", "type": "clause", "offset": [547, 562]}, {"key": "intrusion-detection-systems", "type": "clause", "offset": [572, 599]}, {"key": "of-the-contractor", "type": "clause", "offset": [848, 865]}, {"key": "unauthorized-acquisition", "type": "clause", "offset": [893, 917]}, {"key": "access-to", "type": "clause", "offset": [950, 959]}, {"key": "computerized-data", "type": "definition", "offset": [1024, 1041]}, {"key": "integrity-of", "type": "clause", "offset": [1118, 1130]}, {"key": "confidential-information-of", "type": "clause", "offset": [1297, 1324]}, {"key": "the-county", "type": "definition", "offset": [1325, 1335]}, {"key": "an-employee", "type": "definition", "offset": [1339, 1350]}, {"key": "authorized-user", "type": "clause", "offset": [1354, 1369]}, {"key": "decryption-key", "type": "definition", "offset": [1675, 1689]}, {"key": "the-data", "type": "clause", "offset": [1724, 1732]}, {"key": "the-parties-shall", "type": "clause", "offset": [1748, 1765]}, {"key": "the-acquisition", "type": "clause", "offset": [1772, 1787]}, {"key": "for-purposes-of", "type": "clause", "offset": [1800, 1815]}], "hash": "b5af6350a2ff600535a93eeb291040c0", "id": 1}, {"size": 11, "snippet": "means any compromise by (1) unauthorized access, (2) unauthorized use, or (3) inadvertent disclosure, that impacts the confidentiality, integrity, or availability of any Consumer Information held or stored by ACI or any Third-Party Vendor, including but not limited to a data breach as defined by the laws of any Participating State.", "samples": [{"hash": "ema7JAoAMQx", "uri": "/contracts/ema7JAoAMQx#security-event", "label": "Settlement Agreement and Consent Order", "score": 32.7881202698, "published": true}, {"hash": "9zFJ0meZlxI", "uri": "/contracts/9zFJ0meZlxI#security-event", "label": "Settlement Agreement", "score": 32.7881202698, "published": true}, {"hash": "anockNqhhX1", "uri": "/contracts/anockNqhhX1#security-event", "label": "Settlement Agreement", "score": 32.531867981, "published": true}], "snippet_links": [{"key": "unauthorized-access", "type": "definition", "offset": [28, 47]}, {"key": "unauthorized-use", "type": "clause", "offset": [53, 69]}, {"key": "inadvertent-disclosure", "type": "clause", "offset": [78, 100]}, {"key": "availability-of", "type": "clause", "offset": [150, 165]}, {"key": "consumer-information", "type": "definition", "offset": [170, 190]}, {"key": "party-vendor", "type": "clause", "offset": [226, 238]}, {"key": "not-limited", "type": "clause", "offset": [254, 265]}, {"key": "data-breach", "type": "clause", "offset": [271, 282]}, {"key": "the-laws", "type": "definition", "offset": [297, 305]}, {"key": "participating-state", "type": "definition", "offset": [313, 332]}], "hash": "7e263ee7b3af208d6a01e19eb0c521b4", "id": 2}, {"size": 9, "snippet": "means any compromise, or threat that gives rise to a reasonable likelihood of compromise, by unauthorized access or inadvertent disclosure impacting the confidentiality, integrity, or availability of PERSONAL INFORMATION of at least 500 United States consumers held or stored within the EQUIFAX NETWORK, including but not limited to a data breach. For purposes of this definition, \u201cavailability\u201d shall not include an intentional limitation on the availability of PERSONAL INFORMATION, such as for purposes of performing maintenance on the EQUIFAX NETWORK.", "samples": [{"hash": "h6Smz4sBzem", "uri": "https://www.sec.gov/Archives/edgar/data/33185/000119312519198584/d734596dex104.htm", "label": "Equifax Inc", "score": 14.5523614883, "published": false}, {"hash": "9kkSQ5SFs0t", "uri": "https://www.huntonprivacyblog.com/wp-content/uploads/sites/28/2020/04/d7c3425f-ffbb-4472-b67e-595ca5fc5fc4.pdf", "label": "www.huntonprivacyblog.com", "score": 10.1416835785, "published": false}, {"hash": "8xmVYU7wkib", "uri": "https://calendarmedia.blob.core.windows.net/assets/d7c3425f-ffbb-4472-b67e-595ca5fc5fc4.pdf", "label": "calendarmedia.blob.core.windows.net", "score": 10.1416835785, "published": false}], "snippet_links": [{"key": "unauthorized-access", "type": "definition", "offset": [93, 112]}, {"key": "inadvertent-disclosure", "type": "clause", "offset": [116, 138]}, {"key": "availability-of", "type": "clause", "offset": [184, 199]}, {"key": "information-of", "type": "clause", "offset": [209, 223]}, {"key": "united-states", "type": "clause", "offset": [237, 250]}, {"key": "equifax-network", "type": "definition", "offset": [287, 302]}, {"key": "not-limited", "type": "clause", "offset": [318, 329]}, {"key": "data-breach", "type": "clause", "offset": [335, 346]}, {"key": "for-purposes-of-this-definition", "type": "clause", "offset": [348, 379]}, {"key": "limitation-on", "type": "clause", "offset": [429, 442]}], "hash": "47d85e0f6728949168e9fa0f10ba2731", "id": 3}, {"size": 9, "snippet": "means an immediately reportable subset of Security Incidents which would include:", "samples": [{"hash": "3ko2gdCis4V", "uri": "https://www.capitol.tn.gov/Archives/Joint/committees/fiscal-review/contracts/2024/08-28-24/08.%20Health%20(Availity,%20LLC)%20Redacted.pdf", "label": "Contract", "score": 23.2309055328, "published": false}, {"hash": "jxQ4MLU6V12", "uri": "https://www.capitol.tn.gov/Archives/Joint/committees/fiscal-review/contracts/2025/03-27-25/05.%20Health%20(Prana%20Diabetes%20dba%20Habitnu)%20Amend%202%20Redacted.pdf", "label": "www.capitol.tn.gov", "score": 20.0486068726, "published": false}, {"hash": "7xPArAGBJuP", "uri": "https://www.capitol.tn.gov/Archives/Joint/committees/fiscal-review/contracts/2024/08-28-24/10.%20Health%20(Revvity%20Health%20Sciences,%20Inc.)%20Redacted.pdf", "label": "www.capitol.tn.gov", "score": 19.180316925, "published": false}], "snippet_links": [{"key": "security-incidents", "type": "clause", "offset": [42, 60]}], "hash": "8937bd897c2752fef75adbf8f462a6c0", "id": 4}, {"size": 8, "snippet": "means an event resulting in unauthorized access to, or disruption or", "samples": [{"hash": "je4xTPAzOy0", "uri": "https://webserver.rilegislature.gov/BillText25/SenateText25/S0603.pdf", "label": "webserver.rilegislature.gov", "score": 20.0527000427, "published": false}, {"hash": "eAid63CsHzI", "uri": "https://webserver.rilegislature.gov/BillText25/HouseText25/H5415.pdf", "label": "webserver.rilegislature.gov", "score": 19.9369316101, "published": false}, {"hash": "bzxqUlmSJ2r", "uri": "https://ndlegis.gov/assembly/69-2025/regular/documents/25-8110-03000.pdf", "label": "ndlegis.gov", "score": 17.183921814, "published": false}], "snippet_links": [{"key": "an-event", "type": "clause", "offset": [6, 14]}, {"key": "access-to", "type": "clause", "offset": [41, 50]}], "hash": "ba88416ceb4ff143e1fd84d6ca688f30", "id": 5}, {"size": 8, "snippet": "means any compromise, or threat that gives rise to a reasonable likelihood of compromise, by unauthorized access or inadvertent disclosure impacting the confidentiality, integrity, or availability of Personal Information of consumers where such Personal Information is held or stored within Defendant\u2019s networks, including but not limited to a data breach.", "samples": [{"hash": "5SlbGvVGFKT", "uri": "https://coag.gov/app/uploads/2022/01/2021.03.11-AMCA-Agreed-Final-Judgment-w_-attach.pdf", "label": "coag.gov", "score": 8.6591377258, "published": false}, {"hash": "hZxiVWwTELe", "uri": "https://ag.ks.gov/docs/default-source/consumer-judgments/2021/fs-journal-entry-of-consent-judgment-3-15-2021-(2).pdf?sfvrsn=a107aa1a_6", "label": "ag.ks.gov", "score": 8.600274086, "published": false}, {"hash": "i0xdTPwrfVE", "uri": "https://coag.gov/app/uploads/2021/03/2021.03.11-AMCA-Final-Judgment.pdf", "label": "coag.gov", "score": 8.5947980881, "published": false}], "snippet_links": [{"key": "unauthorized-access", "type": "definition", "offset": [93, 112]}, {"key": "inadvertent-disclosure", "type": "clause", "offset": [116, 138]}, {"key": "availability-of", "type": "clause", "offset": [184, 199]}, {"key": "information-of", "type": "clause", "offset": [209, 223]}, {"key": "not-limited", "type": "clause", "offset": [327, 338]}, {"key": "data-breach", "type": "clause", "offset": [344, 355]}], "hash": "9667a5784d0ddeebb1ee523200202a8c", "id": 6}, {"size": 7, "snippet": "has the meaning specified in Section 7.1(e).", "samples": [{"hash": "A7PjYhjFL4", "uri": "/contracts/A7PjYhjFL4#security-event", "label": "Master Subservicing Agreement", "score": 29.3408622742, "published": true}, {"hash": "5McOS4mqzfL", "uri": "/contracts/5McOS4mqzfL#security-event", "label": "Master Subservicing Agreement (Ocwen Financial Corp)", "score": 25.1670093536, "published": true}, {"hash": "3GQBDkSyDLR", "uri": "/contracts/3GQBDkSyDLR#security-event", "label": "Master Subservicing Agreement (Home Loan Servicing Solutions, Ltd.)", "score": 24.101984024, "published": true}], "snippet_links": [], "hash": "381566fd0a93f9fd73b06862d29d9785", "id": 7}, {"size": 7, "snippet": "means any potential compromise to the confidentiality, integrity, or availability of a Company information asset that includes Personal Information.", "samples": [{"hash": "l8IcOPLCTs1", "uri": "https://stopfraudcolorado.gov/wp-content/uploads/2024/02/THD-AVC-CLEAN-FINAL-DRAFT_THD-executed.pdf", "label": "stopfraudcolorado.gov", "score": 12.1266260147, "published": false}, {"hash": "7ga5xLtzDcE", "uri": "https://www.michigan.gov/documents/ag/Nessel_v_Home_Depot_AVC_11.24.20_708689_7.pdf", "label": "www.michigan.gov", "score": 10.4469537735, "published": false}, {"hash": "dtzYQhrLImt", "uri": "http://www.myfloridalegal.com/EC_Edoc.nsf/0/3ADDE2C04CB81D608525862A0079D0A4/$file/L14-3-1126+AVC+Home+Depot.pdf", "label": "www.myfloridalegal.com", "score": 10.4469537735, "published": false}], "snippet_links": [{"key": "availability-of", "type": "clause", "offset": [69, 84]}, {"key": "company-information", "type": "clause", "offset": [87, 106]}, {"key": "personal-information", "type": "definition", "offset": [127, 147]}], "hash": "7be1963dccbe99bb7480cbca6363cafb", "id": 8}, {"size": 7, "snippet": "means any act, successful or unsuccessful, to gain unauthorized access to, or disrupt, misuse, tamper with, or alter, any Nonpublic Information. For this purpose, \u201cunauthorized access\u201d includes, without limitation, both a security breach of Service Provider\u2019s systems and a security breach of any systems of any of Broker\u2019s subcontractors or other third parties to which Broker provides access to, or that stores or processes, any Nonpublic Information.", "samples": [{"hash": "mWyxz7cFpu", "uri": "/contracts/mWyxz7cFpu#security-event", "label": "Brokerage Agreement", "score": 30.285150528, "published": true}, {"hash": "g5pEfgozYvK", "uri": "/contracts/g5pEfgozYvK#security-event", "label": "Brokerage Agreement", "score": 30.285150528, "published": true}, {"hash": "dPxKNsQ1pNb", "uri": "/contracts/dPxKNsQ1pNb#security-event", "label": "Brokerage Agreement", "score": 30.197555542, "published": true}], "snippet_links": [{"key": "access-to", "type": "clause", "offset": [64, 73]}, {"key": "tamper-with", "type": "definition", "offset": [95, 106]}, {"key": "nonpublic-information", "type": "clause", "offset": [122, 143]}, {"key": "without-limitation", "type": "clause", "offset": [195, 213]}, {"key": "security-breach", "type": "definition", "offset": [222, 237]}, {"key": "service-provider", "type": "clause", "offset": [241, 257]}, {"key": "breach-of-any", "type": "clause", "offset": [283, 296]}, {"key": "other-third-parties", "type": "clause", "offset": [342, 361]}], "hash": "57f1aa29a3b0a7efde42447c4b283371", "id": 9}, {"size": 6, "snippet": "means any compromise that results in unauthorized access to or acquisition of Personal Information owned, licensed, or maintained by CafePress.", "samples": [{"hash": "hDnykt12P0B", "uri": "https://ag.ky.gov/Press%20Release%20Attachments/CafePress%20AVC.pdf", "label": "ag.ky.gov", "score": 10.48117733, "published": false}, {"hash": "7gqpK0Dm7YG", "uri": "https://ag.ny.gov/sites/default/files/avc-ny-executed.pdf", "label": "ag.ny.gov", "score": 10.4798088074, "published": false}, {"hash": "7g5dWFRH1nb", "uri": "https://www.nj.gov/oag/newsreleases20/121820-CafePress-AVC.pdf", "label": "www.nj.gov", "score": 10.4770708084, "published": false}], "snippet_links": [{"key": "access-to", "type": "clause", "offset": [50, 59]}, {"key": "acquisition-of-personal-information", "type": "clause", "offset": [63, 98]}], "hash": "b7d8f7a75036491348c0f85727716cca", "id": 10}], "next_curs": "ClsSVWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjcLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIXc2VjdXJpdHktZXZlbnQjMDAwMDAwMGEMogECZW4YACAA", "definition": {"title": "Security Event", "size": 271, "snippet": "means an immediately reportable subset of security incidents which incident would include:\na. A suspected penetration of Contractor\u2019s information system of which the Contractor becomes aware of but for which it is not able to verify immediately upon becoming aware of the suspected incident that PHI was not accessed, stolen, used, disclosed, modified, or destroyed;\nb. Any indication, evidence, or other security documentation that the Contractor\u2019s network resources, including, but not limited to, software, network routers, firewalls, database and application servers, intrusion detection systems or other security appliances, may have been damaged, modified, taken over by proxy, or otherwise compromised, for which Contractor cannot refute the indication of the time the Contractor became aware of such indication;\nc. A breach of the security of the Contractor\u2019s information system(s) by unauthorized acquisition, including, but not limited to, access to or use, disclosure, modification or destruction, of unencrypted computerized data and which incident materially compromises the security, confidentiality, or integrity of the PHI; and or,\nd. The unauthorized acquisition, including but not limited to access to or use, disclosure, modification or destruction, of unencrypted PHI or other confidential information of the County by an employee or authorized user of Contractor\u2019s system(s) which materially compromises the security, confidentiality, or integrity of PHI or other confidential information of the County. If data acquired (including but not limited to access to or use, disclosure, modification or destruction of such data) is in encrypted format but the decryption key which would allow the decoding of the data is also taken, the parties shall treat the acquisition as a breach for purposes of determining appropriate response.", "id": "security-event", "examples": ["The Borrower and its Subsidiaries, on a consolidated basis, maintain cyber risk and privacy insurance, which provides no less than $10,000,000 per policy period, to cover any liability, loss or damage arising from any <strong>Security Event</strong>."], "related": [["cybersecurity-event", "Cybersecurity Event", "Cybersecurity Event"], ["equity-event", "Equity Event", "Equity Event"], ["liquidity-event-of-default", "Liquidity Event of Default", "Liquidity Event of Default"], ["realization-event", "Realization Event", "Realization Event"], ["liquidity-event", "Liquidity Event", "Liquidity Event"]], "related_snippets": [], "updated": "2026-03-14T06:33:37+00:00"}, "json": true, "cursor": ""}}