Security Breach Procedures Sample Clauses

Security Breach Procedures. For purposes of this section, the term
AutoNDA by SimpleDocs
Security Breach Procedures. 4.1 Supplier shall notify Buyer as soon as practicable, and in any event within 24 hours, after Supplier becomes aware of any Security Incident or Security Breach.
Security Breach Procedures. For purposes of this Contract, “
Security Breach Procedures. (a) In the event of a Security Breach, as defined above, Member shall:
Security Breach Procedures. (A) Immediately upon the Consultant’s awareness or reasonable belief of a Security Breach, the Consultant shall (i) notify the Manager of the Security Breach, such notice to be given first by telephone at the following telephone number, followed promptly by email at the following email address: (000) 000-0000 / SJVIA- Xxxxx@xxxxxxxxxxxxxx.xxx (which telephone number and email address the SJVIA may update by providing notice to the Consultant), and (ii) preserve all relevant evidence (and cause any affected Authorized Person to preserve all relevant evidence) relating to the Security Breach. The notification shall include, to the extent reasonably possible, the identification of each type and the extent of Personal Information that has been, or is reasonably believed to have been, breached, including but not limited to, compromised, or subjected to unauthorized Use, Disclosure, or modification, or any loss or destruction, corruption, or damage.
Security Breach Procedures. If Handshake discovers or is notified of a breach or potential breach of security relating to Institution Confidential Information or Institution Content, Handshake shall promptly: (1) notify Institution of such breach or potential breach without unreasonable delay and in no case later than five (5) calendar days after discovery of the potential breach, (2) in consultation with Institution, investigate and remediate such breach or potential breach at least to the extent required by law, (3) if the breach or potential breach resulted from a failure or weakness in systems or procedures that were Handshake’s responsibility, provide Institution with satisfactory assurances that the breach or potential breach will not recur, and (4) to the extent that the breach or potential breach resulted from acts or omissions of Handshake, Handshake shall be responsible for all costs reasonably determined to be incurred by Institution or Handshake in connection with the foregoing activities. Handshake shall cooperate fully to assist Institution in: (1) identifying individuals potentially affected by the breach; (2) conducting any risk assessment required by applicable law; and (3) providing any notifications required by applicable law. If the Parties, acting reasonably, determine that establishment of a toll-free telephone contact number is necessary to handle inquiries relating to the breach, and requests Handshake to provide staffing to respond to calls to the toll-free number, Handshake shall provide the requested staffing at its cost.
Security Breach Procedures a) Each Party shall: i) provide the other Party with the name and contact information for one or more of the Party’s employees/security operations or other service desk who/which shall serve as the other Party’s primary security contact and shall be available to assist the other Party twenty- four (24) hours per day, seven (7) days per week as a contact in resolving obligations associated with a Security Breach; ii) notify the other Party of a Security Breach as soon as practicable, but no later than twenty- four (24) hours after the Party becomes aware of it; and iii) notify the other Party of any Security Breaches by emailing the other Party at an address provided by the other Party, with a copy by email to the Party’s primary business contact within the other Party. b) Immediately following notification of a Security Breach, the Parties shall coordinate with each other to investigate the Security Breach. The Parties agree to fully cooperate with each other in the handling of the matter, including, without limitation: (i) assisting with any investigation; (ii) providing physical access to the facilities and operations affected; (iii) facilitating interviews with employees and others involved in the matter; and (iv) making available all relevant records, logs, files, data reporting, and other materials required to comply with applicable law, regulation, industry standards, or as otherwise reasonably required by the other Party. c) The Party responsible for the Security Breach shall (i) at its own expense use best efforts to immediately contain and remedy any Security Breach and prevent any further Security Breach, including, but not limited to taking any and all action necessary to comply with applicable privacy rights, laws, regulations, and standards, and (ii) reimburse the other Party for all actual reasonable costs incurred by the other Party in responding to, and mitigating damages caused by, any Security Breach, including all costs of notice and/or remediation pursuant to Section 4(d). d) Each Party agrees that it shall not inform any third party of a Security Breach without first obtaining the other Party’s prior written consent, other than to inform a complainant that the matter has been forwarded to the Party’s legal counsel. Further, the Receiving Party agrees that the Disclosing Party shall have the sole right to determine: (i) whether notice of the Security Breach is to be provided to any individuals, regulators, law enforcement agencies, cons...
AutoNDA by SimpleDocs
Security Breach Procedures. Galvanize maintains an Incident Response Plan managed by its Security Incident Response Team (SIRT). Galvanize will notify Customer without undue delay if Galvanize determines that the security of the Cloud Products’ systems has been breached and this results in Customer Data being accessed by or disclosed to an individual or entity who is not authorized to access or receive such information. Notice will include a brief description of the incident, including the nature of the breach, the date it occurred and, if known, the general type(s) of data involved. Galvanize will report to Customer on the corrective action being taken and will cooperate with Customer to mitigate the effects of any lost or compromised Customer Data. Galvanize will conduct a root cause analysis to determine the cause of the incident and to ensure corrective actions are focused on the true root cause of the incident. Customer will implement any corrective measures required by Galvanize.
Security Breach Procedures a. Provider shall:
Security Breach Procedures. In the event either party determines that there has been an unauthorized or improper disclosure of the information exchanged under this MSA, such party must promptly notify the other party, unless legally prohibited from doing so or specifically directed by law enforcement not to do so, within seventy two hours (or any shorter period as may be required by Law) after such party becomes aware of it. Such notification will include the nature of the incident, the other party's information that was compromised, and the action taken or to be taken. Additionally, each party will reasonably assist the other party in remediating and mitigating any potential damage. Each party shall bear the costs of such remediation or mitigation to the extent the breach or security incident was caused by its acts or omissions. If the Institution learns or has reason to believe that unauthorized access to a password protected area of the Clearinghouse website has occurred or is about to occur, the Institution shall notify the Clearinghouse promptly, and without unreasonable delay, and the Clearinghouse may suspend Institution’s access until the threat has been contained.
Time is Money Join Law Insider Premium to draft better contracts faster.