Breach of system security definition

Breach of system security means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive personal information maintained by a person, including data that is encrypted if the person accessing the data has the key required to decrypt the data. Good faith acquisition of sensitive personal information by an employee or agent of the person for the purposes of the person is not a breach of system security unless the person uses or discloses the sensitive personal information in an unauthorized manner. Business and Commerce Code 521.053(a)
Breach of system security means an incident in which student in- formation that is sensitive, protected, or confidential, as provided by state or federal law, is stolen or copied, transmitted, viewed, or used by a person unauthorized to engage in that action.
Breach of system security means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of Sensitive Personal Information maintained by a person, including data that is encrypted if the person accessing the data has the key required to decrypt the data.

Examples of Breach of system security in a sentence

  • The term “Breach,” as used in this Agreement, refers to two (2) distinct types of breaches: a HIPAA Breach and a Breach of System Security.


More Definitions of Breach of system security

Breach of system security means an unauthorized acquisition of computerized data maintained by a person that compromises the security, confidentiality, or integrity of personal information.
Breach of system security means the same as that term is defined in Section 13-44-102.
Breach of system security is defined as follows”: Unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive personal information that Contractor maintains or collects under this Contract including data that is encrypted if the Contractor’s employee or representative who is accessing the data has the key required to decrypt the data. Good faith acquisition of sensitive personal information by an employee or representative of the Contractor for the purposes of performing under this Contract is not a breach of system security unless the sensitive personal information is used or disclosed by the person in an unauthorized manner. Contractor must implement and maintain reasonable procedures, including taking any appropriate corrective action, to protect and safeguard from unlawful use or disclosure any sensitive personal information collected or maintained by Contractor under this Contract. Contractor must notify TxDMV and the affected people of any breach of system security immediately after discovering the breach, if sensitive personal information was, or is reasonably believed to have been, acquired by an unauthorized person. However, Contractor must delay providing notice to the affected people at TxDMV’s request if law enforcement determines that the notification will impede a criminal investigation. Contractor, at Contractor’s expense, must give notice as follows:
Breach of system security means an incident in which student information
Breach of system security means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of sensitive personal information maintained by a person, including data that is encrypted if the person accessing the data has the key required to decrypt data. TEX BC. Code § 521.053.
Breach of system security means acquisition of computerized data by an unauthorized person that materially compromises the security, confidentiality, or integrity of personal information maintained by the information holder. The good faith acquisition of personal information by an employee or agent of the information holder for the purposes of the information holder is not a breach of system security, if the personal information is not used or subject to further unauthorized disclosure;
Breach of system security means unauthorized acquisition of computerized data that compromises the security, confidentiality, or integrity of Sensitive Personal Information