Security Incident Reporting Sample Clauses

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
AutoNDA by SimpleDocs
Security Incident Reporting. 9.17.13.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at xxxx://xxxxx.xx.xxx/Programsproviders/Information_ Security_and_Privacy.
Security Incident Reporting. 9.18.13.1 A security incident occurs when County Information Assets are accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc.
Security Incident Reporting. If We become aware of any accidental, unauthorised or unlawful destruction, loss, alteration, or disclosure of, or access to personal data You have provided (a Security Incident), We will notify You promptly and provide You promptly with a detailed description of the Security Incident and the identity of each affected data subject, with periodic updates, and any other information You may reasonably request in relation to such Security Incident.
Security Incident Reporting. If 2Ring becomes aware of a Security Incident, 2Ring will notify Subscriber without undue delay, and in any case, where feasible, within forty-eight (48) hours after becoming aware. 2Ring will promptly take reasonable steps to contain, investigate, and mitigate any Security Incident.
Security Incident Reporting. PacketFabric will report to Customer any actual or suspected Security Incident or a suspected event that is believed to be sufficiently plausible to warrant further investigation. “Security Incident” means any actual or suspected unauthorized access to or use of any Customer’s property or Confidential Information. Upon request from Customer, PacketFabric will reasonably cooperate in the investigation of any Security Incident and will produce logs and other documentation from the device(s) which are, or may be, related to a Security Incident. Except as required by Applicable Law, PacketFabric will not disclose to third parties any actual or suspected Security Incident without Customer’s prior written approval.
Security Incident Reporting. 9.23.3.4.1 A security incident occurs when Information Assets are accessed, modified, destroyed, or disclosed without proper authorization, or are lost or stolen. Contractor must report all security incidents to County's Project Manager within two (2) business days of detection.
AutoNDA by SimpleDocs
Security Incident Reporting. Requirements: The contractor shall report a Security Incident to the State-identified contact(s) as soon as possible by telephone and email, but in no case later than two (2) days after the Security Incident occurs. Notice requirements may be clarified in the Service Level Agreement and shall be construed in accordance with IC 4-1-11 and IC 24-4.9 as they may apply.
Security Incident Reporting. The Sheriff shall report all breaches of security, criminal acts, or threats to the Court or court personnel to the Local Security Coordinator. Such incidents include, but are not limited to: threats, suspicious incidents, vandalism, theft/burglary/robbery, medical assists and assaults. The Sheriff further agrees to provide a written report of the incident to the Local Security Coordinator on the Sheriff’s standard departmental report form or on a Court Security Incident form provided by the local Security Coordinator. This will be completed as soon as is reasonably possible after the incident.
Security Incident Reporting. 9.1.1 Avanade will require that its Personnel report to a centralized management response center (Avanade Asset Protection XXX@xxxxxxx.xxx) any Security Incident that may involve the loss or unauthorized acquisition of any Client Personal Data (e.g., a lost or stolen laptop). X
Time is Money Join Law Insider Premium to draft better contracts faster.