IT security incident definition

IT security incident means an occurrence that:
IT security incident means an event that involves a security breach, such as hacking of, intrusion into, or denial of service attack on, a critical system, or a system which compromises the security, integrity or confidentiality of customer information;
IT security incident means an event that could adversely affect the confidentiality, integrity or availability of a CIS.

Examples of IT security incident in a sentence

  • I shall notify the County Department’s Help Desk and/or Departmental Information Security Officer (DISO) as soon as a County IT security incident is suspected.

  • They may provide periodic training to organization personnel on the plan and their roles in the plan.5.2.2 Incident Handling An IT security incident is an adverse event in a computer system or network caused by the failure of a security mechanism or an attempted or threatened breach of these mechanisms.

  • IT security incident in 2020 comprised unavoidable incremental costs incurred as a consequence of the IT security incident, including writedown of impaired assets, non-chargeable costs due to lack of documentation and certain customer claims and penalties.

  • Physical Incidents A physical IT security incident involves the loss or theft of a laptop, mobile device, PDA/Smartphone, portable storage device, or other digital apparatus that may contain organization information.

  • If an IT security incident occurs, concerning any GSA information system or data (owned or operated by GSA or by a contractor or other organization on behalf of GSA), regardless of the estimated value of the contract or order, including purchases under the micro-purchase threshold and purchases using a Government Purchase Card, the contracting officer or another acquisition team member must immediately contact the GSA IT Service Desk.

  • Responses to an IT security incident can range from simply recovering compromised systems to the collection of evidence for the purpose of criminal prosecution.

  • For any potential cyber-supply chain event, including occurrence of an IT security incident, discovery of a prohibited article or source, or identification of supply chain risk information, the contracting officer or another acquisition team member must contact the GSA IT Service Desk by phone at 866-450-5250 or by email at ITServiceDesk@gsa.gov.

  • The OISP shall evaluate what risks may be associated with a given IT security incident and develop procedures to ensure critical tools, data and equipment are available to facilitate containment and recovery.

  • Do you have an emergency response plan to handle IT security incidents?The emergency plan including backup concept must describe how to react to a serious IT security incident.

  • IT security incident management is a specialised form of incident management.

Related to IT security incident

  • Security Incident means any known successful or unsuccessful attempt by an authorized or unauthorized individual to inappropriately use, disclose, modify, access, or destroy any information or interference with system operations in an information system.

  • Cyber Security Incident means any malicious or suspicious event that disrupts, or was an attempt to disrupt, the operation of those programmable electronic devices and communications networks including hardware, software and data that are essential to the Reliable Operation of the Bulk Power System.++

  • Successful Security Incident means a Security Incident that results in the unauthorized Access, Use, Disclosure, modification, or destruction of information or interference with system operations in an Information System.

  • Data Security Incident means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Agreement Personal Data transmitted, stored or otherwise Processed;

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Unsuccessful Security Incident means a Security Incident such as routine occurrences that do not result in unauthorized Access, Use, Disclosure, modification, or destruction of information or interference with system operations in an Information System, such as: (i) unsuccessful attempts to penetrate computer networks or services maintained by Business Associate; and (ii) immaterial incidents such as pings and other broadcast attacks on Business Associate's firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above with respect to Business Associate’s Information System.

  • Targeted Unsuccessful Security Incident means an Unsuccessful Security Incident that appears to be an attempt to obtain unauthorized Access, Use, Disclosure, modification or destruction of the Covered Entity’s Electronic PHI.

  • Privacy Incident means violation of the Minnesota Government Data Practices Act (Minnesota Statutes chapter 13); violation of federal data disclosure or privacy requirements in federal laws, rules and regulations; and/or breach of a contractual obligation to protect State data. This includes, but is not limited to, improper or unauthorized access to, viewing of, obtaining of, acquisition of, use of, disclosure of, damage to, loss of, modification of, alteration to or destruction of State data protected by such State or federal laws or by contract.

  • serious incident means any incident that directly or indirectly led, might have led or might lead to any of the following:

  • Cyber incident means actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein.

  • Data Incident means a breach of Google’s security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Customer Data on systems managed by or otherwise controlled by Google.

  • Minor incident means an occurrence involving a consumer during service provision that is not a major incident and that:

  • Critical incident means an occurrence or set of events inconsistent with the routine operation of the facility, or the routine care of a consumer. Critical incidents specifically include but are not necessarily limited to the following: adverse drug events; self-destructive behavior; deaths and injuries to consumers, staff and visitors; medication errors; consumers that are absent without leave (AWOL); neglect or abuse of a consumer; fire; unauthorized disclosure of information; damage to or theft of property belonging to a consumers or the facility; other unexpected occurrences; or events potentially subject to litigation. A critical incident may involve multiple individuals or results.

  • Security Breach means the unauthorized acquisition of or access to Customer Data by an unauthorized person that compromises the security, confidentiality, or integrity of Customer Data, including instances in which internal personnel access systems in excess of their user rights or use systems inappropriately. “Security Breach” shall also be deemed to include any breach of security, confidentiality, or privacy as defined by any applicable law, rule, regulation, or order.

  • Environmental Incident means, in relation to a Ship:

  • Major incident means an occurrence involving a consumer during service provision that:

  • Unusual Incident means incidents involving serious illness or accidents, death of an individual, injury or illness of an individual requiring inpatient or emergency hospitalization, suicide attempts, a fire requiring the services of a fire department, an act of physical aggression, or any incident requiring abuse investigation.

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Servicer Default means an event specified in Section 8.01.

  • Terrorist Incident means an act of violence by any person acting on behalf of or in connection with any organization which is generally recognized as having the intent to overthrow or influence the control of any government, that is deemed terrorism by the United States Government other than civil disorder or riot, that is not an act of war, declared or undeclared, that results in Loss of life or major damage to property.

  • Security Interest means any mortgage, pledge, lien, encumbrance, charge, or other security interest, other than (a) mechanic's, materialmen's, and similar liens, (b) liens for taxes not yet due and payable or for taxes that the taxpayer is contesting in good faith through appropriate proceedings, (c) purchase money liens and liens securing rental payments under capital lease arrangements, and (d) other liens arising in the Ordinary Course of Business and not incurred in connection with the borrowing of money.

  • Security Event means an immediately reportable subset of security incidents which incident would include:

  • Pollution Incident means an occurrence or series of occurrences having the same origin, which results or may result in a discharge of oil and/or hazardous and noxious substances and which poses or may pose a threat to the marine environment, or to the coastline or related interests of one or more States, and which requires emergency action or other immediate response;

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Extenuating Circumstances means the inability to perform at an optimum level arising from one or more of the reasons set out in clause 6.1.

  • First Priority Obligations means (a) with respect to the Existing First Priority Agreement, all “Obligations” of each Loan Party as defined in the Existing First Priority Agreement and (b) with respect to each other First Priority Agreement, all “Obligations” of each Loan Party as defined in such First Priority Agreement, and shall in any event include (i) all principal of and interest (including without limitation any Post-Petition Interest) and premium (if any) on all loans made or other indebtedness issued or incurred pursuant to such First Priority Agreement, (ii) all reimbursement obligations (if any) and interest thereon (including without limitation any Post-Petition Interest) with respect to any letter of credit or similar instruments issued pursuant to such First Priority Agreement, (iii) all Specified Swap Agreements, (iv) all Specified Cash Management Agreements and (v) all guarantee obligations, fees, expenses and other amounts payable from time to time pursuant to the applicable First Priority Documents, in each case whether or not allowed or allowable in an Insolvency Proceeding. To the extent any payment with respect to any First Priority Obligation (whether by or on behalf of any Loan Party, as proceeds of security, enforcement of any right of setoff or otherwise) is declared to be a fraudulent conveyance or a preference in any respect, set aside or required to be paid to a debtor in possession, any Second Priority Secured Party, receiver or similar Person, then the obligation or part thereof originally intended to be satisfied shall, for the purposes of this Agreement and the rights and obligations of the First Priority Secured Parties and the Second Priority Secured Parties, be deemed to be reinstated and outstanding as if such payment had not occurred.