Incident Response Management Sample Clauses

Incident Response Management. An organisational and technical process to manage security incidents has been defined and implemented. This ensures both a standardised response and a process for handling identified and suspected security incidents/disruptions. This also includes standardised follow-up and monitoring as part of a continuous process of improvement.
AutoNDA by SimpleDocs
Incident Response Management. Documented process for detection and reporting of security incidents/data breaches ● Documented procedure for dealing with security incidents ● Involvement of the external data protection officer in security incidents and data breaches
Incident Response Management. Security incidents can be reported at any time by telephone or e-mail to the data protection officer (see 4.5 TOMs). He or she will immediately forward the report to the system administrators documented in accordance with 4.1 (TOMs) in order to initiate measures directly.
Incident Response Management. HWD maintains within the framework of the established ISMS a documented process for incident res- ponse management. Together with escalation and reporting channels, this process also includes review and analysis, and consecutive optimization based on gained insights. HWD deploys, both, equipment-based, as well as network-based solutions (intrusion detection, virus, and malware detection, anti-spam filters, as well as anomaly detectors) for the detection of incidents. HWD also monitors the infrastructure and customer systems with a monitoring solution with regards to outages and anomalies. All incidents are documented in a ticketing system within the framework of the incident response ma- nagement system. Both, the data protection officer (if personal data is involved), and the IT security must be included in the escalation process.
Incident Response Management. Measures to respond to detected or suspected security incidents within the area of data processing systems used. If we become aware of a data incident, we will immediately notify our CTO (if he is not involved yet) or contact our Engineering lead over the phone. We have backup lines available but our technical executives ensure access to internet and availability over the phone whenever possible. We will ensure that reasonable measures are taken to mitigate the harmful effects of the incident and to prevent further unauthorized access or disclosure. Following that, we will promptly notify affected Controllers and describe, to the extent possible, the details of the incident, the steps we have taken to mitigate the potential risks, and any suggestions we have for the Controller to minimize the impact of the incident.
Incident Response Management. Other measures for managing data protection incidents. Policy for data protection and IT security incidents Business Continuity Management Processes Incident reporting process
Incident Response Management. All employees are instructed and trained to ensure that data privacy incidents are recognized by all employees and reported to the Data Protection and Information Security Team without delay. The Data Protection and Information Security Team will investigate the incident immediately. As far as data are concerned that are processed on behalf of clients, it is ensured that they are informed immediately about the nature and extent of the incident.
AutoNDA by SimpleDocs
Incident Response Management. Ensure that employees understand what is meant by a security incident. A security incident is any event that can damage or compromise the confidentiality, integrity or availability of sensitive information or any business-critical information or systems and where the loss or mistaken destruction of information could potentially prejudice individuals or the organisation. · Ensure that employees are trained to recognise the signs of security incidents. · Ensure that employees receive training on the need to notify anything which may be a sign of a security incident. · Ensure that if a security incident occurs, employees know who to contact and how. · Ensure that any breaches of security, confidentiality and other violations of this Agreement are reported immediately (within 24 hours of becoming known) to the Purchaser even if you are still gathering all of the facts, initial notification must occur as soon as possible.
Incident Response Management. A.4.3 Data Protection by Design and Default (Article 25 Paragraph 2 GDPR);
Incident Response Management. The following measures are intended to ensure that notification processes are triggered in the event of data protection breaches: ● Notification process for data protection breaches pursuant to Art. 4 No. 12 ● DSGVO vis-à-vis supervisory authorities (Art. 33 DSGVO). ● Notification process for data protection breaches pursuant to Art. 4 No. 12 DSGVO vis-à-vis the data subjects (Art. 34 DSGVO) ● Involvement of the data protection officer in security incidents and data mishaps ● Use of firewalls
Time is Money Join Law Insider Premium to draft better contracts faster.