Notice of Unauthorized Use or Disclosure, Security Incident or Breach Sample Clauses

Notice of Unauthorized Use or Disclosure, Security Incident or Breach. Contractor agrees to notify the University of any use or disclosure of University data that is not permitted by the contract, or any security incident or breach involving the University data, within five (5) business days of discovery of the unauthorized use, security incident or breach. Contractor agrees to mitigate, to the extent practicable, any harmful effect that is known to Contractor of a misuse or unauthorized disclosure of University data by the Contractor in violation of the requirements of this Section. Red Flags. Contractor shall be responsible for implementation of an Identity Theft Monitoring Policy and Procedure to protect individuals’ information that may be breached by the Contractor under applicable Federal Trade Commission Regulations Red Flag Rules.
AutoNDA by SimpleDocs
Notice of Unauthorized Use or Disclosure, Security Incident or Breach. Contractor agrees to notify the University of any use or disclosure of University data that is not permitted by the contract, or any security incident or breach involving the University data, within five (5) business days of discovery of the unauthorized use, security incident or breach. Contractor agrees to mitigate, to the extent practicable, any harmful effect that is known to Contractor of a misuse or unauthorized disclosure of University data by the Contractor in violation of the requirements of this Section.

Related to Notice of Unauthorized Use or Disclosure, Security Incident or Breach

  • CONFIDENTIALITY AND NON-DISCLOSURE; SECURITY BREACH REPORTING 2.1 For purposes of this Contract, confidential information will not include information or material which (a) enters the public domain (other than as a result of a breach of this Contract); (b) was in the receiving party’s possession prior to its receipt from the disclosing party; (c) is independently developed by the receiving party without the use of confidential information; (d) is obtained by the receiving party from a third party under no obligation of confidentiality to the disclosing party; or (e) is not exempt from disclosure under applicable State law.

  • Contact in Event of Unauthorized Transfer If you believe your Card and/or access code has been lost or stolen or that someone has transferred or may transfer money from your account without your permission, either call us immediately at:

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Protection from Unauthorized Use Licensee shall secure that Participating Institutions will use reasonable efforts to restrict access to the Licensed Materials to Authorized Users.

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Prohibition on Unauthorized Use or Disclosure The Business Associate will neither use nor disclose the Covered Entity’s Protected Health Information, except as permitted or required by this Addendum or in writing by the Covered Entity or as Required by Law. This Agreement does not authorize the Business Associate to use or disclose the Covered Entity’s Protected Health Information in a manner that will violate Subpart E of 45 CFR Part 164 if done by the Covered Entity.

Time is Money Join Law Insider Premium to draft better contracts faster.