Additional Procedures in the Event of Security Breach of Personally Identifiable Information Sample Clauses

Additional Procedures in the Event of Security Breach of Personally Identifiable Information. Upon County’s determination that a misuse or security breach of Personally Identifiable Information, as defined in Exhibit J (Information Security and Privacy Requirements), has occurred or is reasonably possible Contractor shall fully cooperate with County in rectifying any misuse, including notifying all affected County customers. County shall determine, in its sole discretion, the content and means of delivery of the customer notice. Contractor will bear all reasonable costs and expenses for mitigation actions, to the extent required by law, incurred as a result of security breach primarily caused directly or indirectly by Contractor, including but not limited to, the administrative cost of opening and closing accounts, printing new checks, notice, print and mailing, and obtaining credit monitoring services and identity theft insurance for County customers whose Personally Identifiable Information has or may have been compromised.
AutoNDA by SimpleDocs

Related to Additional Procedures in the Event of Security Breach of Personally Identifiable Information

  • Personally Identifiable Information (PII); Security a. If Grantee or any of its subcontractors may or will create, receive, store or transmit PII under the terms of this Agreement, Grantee must provide for the security of such PII, in a form acceptable to Florida Housing, without limitation, non-disclosure, use of appropriate technology, security practices, computer access security, data access security, data storage encryption, data transmission encryption, security inspections and audits. Grantee shall take full responsibility for the security of all data in its possession or in the possession of its subcontractors and shall hold Florida Housing harmless for any damages or liabilities resulting from the unauthorized disclosure of loss thereof.

  • Personally Identifiable Information By submitting any of your personally identifiable information, such as your name, address, email address, phone number or fax number, to us, you consent to our privacy policy located at xxx.xxxxxxxx.xxx/xxxxx.

  • Collection of Personal Information 10.1 The Subscriber acknowledges and consents to the fact that the Company is collecting the Subscriber's personal information for the purpose of fulfilling this Subscription Agreement and completing the Offering. The Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) may be disclosed by the Company to (a) stock exchanges or securities regulatory authorities, (b) the Company's registrar and transfer agent, (c) Canadian tax authorities, (d) authorities pursuant to the Proceeds of Crime (Money Laundering) and Terrorist Financing Act (Canada) and (e) any of the other parties involved in the Offering, including legal counsel, and may be included in record books in connection with the Offering. By executing this Subscription Agreement, the Subscriber is deemed to be consenting to the foregoing collection, use and disclosure of the Subscriber's personal information (and, if applicable, the personal information of those on whose behalf the Subscriber is contracting hereunder) and to the retention of such personal information for as long as permitted or required by law or business practice. Notwithstanding that the Subscriber may be purchasing Shares as agent on behalf of an undisclosed principal, the Subscriber agrees to provide, on request, particulars as to the identity of such undisclosed principal as may be required by the Company in order to comply with the foregoing.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Correction of Personal Information 8. Within 5 business days of receiving a written direction from the Public Body to correct or annotate any personal information, the Contractor must annotate or correct the information in accordance with the direction.

  • SECURITY OF PERSONAL INFORMATION 19.1 For this clause “personal information” has the meaning given to it in the Privacy Act 1988 (Cth).

  • Handling of Personal Information The Organiser may use the personal information of individuals from exhibition related parties for any communications necessary for the holding of the Exhibition. In addition, the Organiser may send electronic mails or other advertising materials to exhibition related parties for promoting the Exhibition or other exhibitions to be organised by the Organiser. Exhibition related parties give their consent to the Organiser to provide their personal information to its designated partner company or a trade publication that gathers or features information related to the Exhibition whenever the Organiser deems such a provision necessary. Governing Law and Jurisdiction The Exhibition Rules and Regulations shall be governed by and construed in accordance with the laws of Japan. The Tokyo District Court shall have the exclusive jurisdiction over any dispute arising in connection with the Exhibition Rules and Regulations as the court of the first instance. Xxxx Exhibitions Japan Ltd. 18F Shinjuku-Nomura Bldg., 1-26-2 Nishishinjuku, Shinjuku-ku, Tokyo 000-0000, Japan TEL: +00-0-0000-0000 FAX: +00-0-0000-0000 A division of Xxxx Business Registered in England, Number 678540 AUTHORISED SIGNATURE

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • Permitted Uses and Disclosures of Protected Health Information Business Associate:

  • Amendment of Protected Health Information 8.1 To the extent Covered Entity determines that any Protected Health Information is maintained by Business Associate or its agents or Subcontractors in a Designated Record Set, Business Associate shall, within ten (10) business days after receipt of a written request from Covered Entity, make any amendments to such Protected Health Information that are requested by Covered Entity, in order for Covered Entity to meet the requirements of 45 C.F.R. § 164.526.

Time is Money Join Law Insider Premium to draft better contracts faster.