Breaches of Security Sample Clauses

Breaches of Security. 88. It is a criminal offence to knowingly or recklessly and without the consent of the data controller: • obtain • disclose or • procure the disclosure of personal data, or to sell or offer to sell personal data obtained in the above manner.
AutoNDA by SimpleDocs
Breaches of Security. 12.1 Any breaches in security should be reported and monitored within each organisation following their own incident reporting policies, and relevant partner organisations should be informed.
Breaches of Security. 1. In case of a breach of security, the Competent Security Authority in whose state the breach of security occurred shall inform the Competent Security Authority of the other Party in due time and shall ensure the appropriate investigation. The other Party shall, if required, cooperate in the investigation.
Breaches of Security. All known or suspected breaches of security in relation to the system, terminals and /or any information - such as misuse or abuse of the system, misuse or abuse of protocol information, unauthorised processing of data, unauthorised disclosure of information, malicious software attack, denial of service attack - are to be reported to the respective organisations’ Information Security Officer, Data Protection Officer or equivalent. Once notified of a breach of security an investigation will take place to identify, where possible, who carried out the breach, what information has been compromised, whether the integrity of the system has been compromised etc. Where any breach of security may amount to criminal activity, this must be reported to Lothian and Borders Police which will investigate the matter and, where appropriate, report the circumstances to the Procurator Fiscal. Where relevant or necessary, all partners are to be informed of any breach and provided with sufficient details which will enable them to retain assurance in the confidentiality, integrity and availability of the information and the processes supporting information exchange, and to undertake their own risk assessments.
Breaches of Security. 1. The Contractor must notify Manitoba immediately, in writing, of any security breach or attempted security breach with the potential to impact Manitoba’s security or the security of confidential or sensitive Manitoba information maintained by the Contractor.
Breaches of Security. Nocti Business Solutions must be notified immediately if any breach of security occurs for a Nocti Business Solutions standardized assessment. A breach of security is ultimately the responsibility of the institution/company. Once Nocti Business Solutions has been notified of a breach, steps will be taken to determine the extent of damages as well as the steps needed to remedy the breach. This may include, but is not limited to, consultation with legal counsel, legal action, test revision with costs incurred by the test site, and probation or suspension of the institution/company as an authorized user of Nocti Business Solutions assessments.
Breaches of Security. Breach of Security” shall mean any accidental or unlawful destruction, loss, misuse, compromise, or unauthorized disclosure or unauthorized access to Personal Information that a party (“Receiving Party”) collects, generates or obtains from or on behalf of the other party (“Disclosing Party”), or any act or omission that compromises or undermines the physical, technical, or organizational safeguards put in place by the Receiving Party in processing such information or otherwise providing services under this Restated Agreement. If there is a Breach of Security, the Receiving Party will notify the Disclosing Party [***] and will provide such notice to the Disclosing Party by phone or email as listed here:
AutoNDA by SimpleDocs
Breaches of Security. Breach of Security” shall mean any loss, misuse, compromise, or unauthorized access to Confidential or Personal Information that a party (“Receiving Party”) collects, generates, or obtains from or on behalf of the other party (“Disclosing Party”), or any act or omission that compromises or undermines the physical, technical, or organizational safeguards put in place by the Receiving Party in processing such information or otherwise providing services under this Agreement. If there is an actual or suspected Breach of Security involving Confidential or Personal Information that is CERTAIN CONFIDENTIAL INFORMATION CONTAINED IN THIS DOCUMENT, MARKED BY [***], HAS BEEN OMITTED BECAUSE OLO INC. HAS DETERMINED THE INFORMATION (I) IS NOT MATERIAL AND (II) WOULD LIKELY CAUSE COMPETITIVE HARM TO OLO INC. IF PUBLICLY DISCLOSED. stored, managed or received by, or transmitted to a party, the Receiving Party will notify the Disclosing Party as soon as possible (but In any event within [***] of becoming aware of such occurrence) and will provide such notice to the Disclosing Party by phone and email as listed here:
Breaches of Security. 9.1 In case the Data Processor becomes aware of a breach of personal data security (defined as a breach of secu- rity potentially leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, personal data transmitted, stored or otherwise processed in connection with the provision of a public electronic communications service), the Data Processor is obliged to assist insofar as it is necessary and to notify the Data Controller of the security breach, including the relevant information, without undue delay. Furthermore, the Data Processor is obliged to try to localize such breach and to mitigate any loss suffered and, if reasonable and possible, to re-establish lost data.
Breaches of Security. If you are not happy with the route in which Lapasar handles your enquiry or objection, kindly don't delay to get in touch with Lapasar at xxxxxx@xxxxxxx.xxx.
Time is Money Join Law Insider Premium to draft better contracts faster.