Breach and Security Incident Responsibilities Sample Clauses

Breach and Security Incident Responsibilities. 24 A. Notification to COUNTY of Breach or Security Incident: The CONTRACTOR shall notify 25 COUNTY immediately by telephone call plus email or fax upon the discovery of a breach (as defined in 26 this Exhibit), and within twenty-four (24) hours by email or fax of the discovery of any security incident 27 (as defined in this Exhibit), unless a law enforcement agency determines that the notification will 28 impede a criminal investigation, in which case the notification required by this section shall be made to 29 COUNTY immediately after the law enforcement agency determines that such notification will not 30 compromise the investigation. Notification shall be provided to the ADMINSITRATOR, 31 ADMINISTRATOR Privacy Officer, and ADMINISTRATOR Information Security Officer, using the 32 contact information listed in Section X.F., below. If the breach or security incident is discovered after 33 business hours or on a weekend or holiday and involves COUNTY PCI in electronic or computerized 34 form, notification to COUNTY shall be provided by calling ADMINISTRATOR Information Security 35 Office at the telephone numbers listed in Section X.F., below. For purposes of this Section, breaches 36 and security incidents shall be treated as discovered by CONTRACTOR as of the first day on which 37 such breach or security incident is known to the CONTRACTOR, or, by exercising reasonable diligence 1 would have been known to the CONTRACTOR. CONTRACTOR shall be deemed to have knowledge 2 of a breach if such breach is known, or by exercising reasonable diligence would have been known, to 3 any person, other than the person committing the breach, who is an employee or agent of the 4 CONTRACTOR. CONTRACTOR shall take: 5 1. prompt corrective action to mitigate any risks or damages involved with the breach or 6 security incident and to protect the operating environment; and 7 2. any action pertaining to a breach required by applicable federal and state laws, including, 8 specifically, California Civil Code section 1798.29. 9 B. Investigation of Breach and Security Incidents: CONTRACTOR shall immediately investigate 10 such breach or security incident. As soon as the information is known and subject to the legitimate needs 11 of law enforcement, CONTRACTOR shall inform ADMINISTRATOR, ADMINISTRATOR Privacy 12 Officer, and the ADMINISTRATOR Information Security Officer of: 13 1. what data elements were involved and the extent of the data disclosure or access involved 14 in the breach...
AutoNDA by SimpleDocs
Breach and Security Incident Responsibilities. CDPH shall notify Participant immediately by telephone call plus email or fax upon the discovery of a breach (as defined in this Agreement), or within twenty-four (24) hours by email or fax of the discovery of any security incident (as defined in this Agreement) that involves CalCONNECT Data that was created or collected by Participant in the CalCONNECT System. Notification shall be provided by CDPH to the Participant Representative, using the contact information listed in Attachment B, which is made a part of this Agreement by this reference. For purposes of this Section, breaches and security incidents shall be treated as discovered by CDPH as of the first day on which such breach or security incident is known to CDPH, or, by exercising reasonable diligence would have been known to CDPH. CDPH shall be deemed to have knowledge of a breach or security incident if such breach or security incident is known, orby exercising reasonable diligence would have been known, to any person, other than the person committing the breach or security incident, who is a workforce member or agent of CDPH.
Breach and Security Incident Responsibilities. CDPH shall notify Participant immediately by telephone call plus email upon the discovery of a breach (as defined in this Agreement), or within twenty-four (24) hours by email of the discovery of any security incident (as defined in this Agreement) that involves Cal-IVRS Data that was created or collected by Participant in the Cal-IVRS System. Notification shall be provided by CDPH to the Participant Representative, using the contact information listed in Attachment B to this Agreement. A. For purposes of this Section, breaches and security incidents shall be treated as discovered by CDPH as of the first day on which such breach or security incident is known to CDPH, or, by exercising reasonable diligence would have been known to CDPH. CDPH shall be deemed to have knowledge of a breach or security incident if such breach or security incident is known, or by exercising reasonable diligence would have been known, to any person, other than the person committing the breach or security incident, who is a workforce member or agent of CDPH.
Breach and Security Incident Responsibilities. Notification to COUNTY of Breach or Security Incident: The CONTRACTOR shall notify 25 COUNTY immediately by telephone call plus email or fax upon the discovery of a breach (as defined in 26 this Exhibit), and within twenty-four (24) hours by email or fax of the discovery of any security incident 27 (as defined in this Exhibit), unless a law enforcement agency determines that the notification will 28 impede a criminal investigation, in which case the notification required by this section shall be made to 29 COUNTY immediately after the law enforcement agency determines that such notification will not 30 compromise the investigation. Notification shall be provided to the ADMINSITRATOR, 31 ADMINISTRATOR Privacy Officer, and ADMINISTRATOR Information Security Officer, using the 32 contact information listed in Section X.F., below. If the breach or security incident is discovered after 33 business hours or on a weekend or holiday and involves COUNTY PCI in electronic or computerized 34 form, notification to COUNTY shall be provided by calling ADMINISTRATOR Information Security 35 Office at the telephone numbers listed in Section X.F., below. For purposes of this Section, breaches 36 and security incidents shall be treated as discovered by CONTRACTOR as of the first day on which 37 such breach or security incident is known to the CONTRACTOR, or, by exercising reasonable diligence 1 would have been known to the CONTRACTOR. CONTRACTOR shall be deemed to have knowledge 2 of a breach if such breach is known, or by exercising reasonable diligence would have been known, to 3 any person, other than the person committing the breach, who is an employee or agent of the 4 CONTRACTOR. CONTRACTOR shall take:
Breach and Security Incident Responsibilities 

Related to Breach and Security Incident Responsibilities

  • Client Responsibilities You are responsible for (a) assessing each participants’ suitability for the Training, (b) enrollment in the appropriate course(s) and (c) your participants’ attendance at scheduled courses.

  • Licensee Responsibilities a. Licensee understands and agrees that all decisions regarding the tax treatment of items reflected on Tax Returns prepared by Licensee using the Software are made solely by Licensee and that use of the Software does not relieve Licensee of responsibility for the preparation, accuracy, content, and review of such Tax Returns. b. Licensee acknowledges that Licensee does not rely upon Drake for advice regarding the appropriate tax treatment of items reflected on Tax Returns prepared and/or processed using the Software. Licensee will review any computations made by the Software and satisfy Licensee that those computations and reporting are correct. c. Licensee is responsible for the keying of all information accurately into the Software, including but not limited to direct deposit information as it pertains to taxpayers' data for receiving refunds. d. Licensee agrees to abide by and comply with all regulations and laws which pertain to the commercial preparation and electronic filing of Tax Returns, including but not limited to IRS Regulations, publications and other applicable laws. It is a violation of this Agreement AND applicable law for Licensee to falsely indicate to Drake that Licensee has obtained taxpayer’s Code 26 CFR §301.7216 compliant “Consent to Disclose” or “Consent to Use” taxpayer data. Such violation will be grounds for immediate termination of this Agreement. e. Licensee agrees not to utilize the Software or any of Drake's services for any illegal, fraudulent or otherwise improper purpose. These may include, but are not limited to misrepresenting taxpayer information, falsely representing identities, activities which may circumvent security measures, technical or regulatory requirements or other IRS or State non- compliant activities. If it is determined, at Drake’s sole discretion, Licensee is non-compliant with this Section 4(e), or Licensee has attempted to misrepresent, mislead or otherwise provide false representation(s) as to its compliance with this or any other provision of this Agreement, Licensee shall forfeit all rights to use the Software or services of Drake provided in this Agreement, including but not limited to any rights to refunds of any monies paid to Drake. f. Licensee is solely responsible for the backup and retention of all data, unless such responsibility is specifically accepted by Drake. g. Licensee agrees to provide Drake a copy of Licensee's completed E-File Application Summary, or other documentation required by Drake regarding ownership of an EFIN utilized with the Software by Licensee, prior to utilizing the electronic filing services of Drake. Licensee understands that in order to utilize the electronic filing services of Drake or the IRS a valid EFIN must be obtained and maintained as current from the IRS. h. Licensee shall be responsible for acquiring and maintaining an information technology infrastructure with sufficient capabilities to operate the Software and comply with all provisions of this Agreement. i. Licensee shall not decompile, reverse assemble, or reverse engineer any Software or other information disclosed to Licensee hereunder. j. Licensee shall be responsible for complying with all export controls relating to the Software. k. Licensee shall be responsible to safeguard and prevent unauthorized access to Taxpayer Data. Licensee shall be responsible to secure usernames and passwords that allow access to Taxpayer Data. l. Licensee acknowledges that by using a computer system and the Software to prepare and transmit Tax Returns electronically, Licensee consents to the disclosure of all information relating to its use of the computer system and the Software to generate Tax Returns and to the electronic transmission of Tax Returns to the state and/or federal agency as applicable under existing law. m. Licensee acknowledges and consents to Drake's collection through use of the Software of non-Tax Return related data and information, required and used by Drake for its internal business purposes, fraud prevention, data privacy, and maintaining the security and integrity of the tax system and/or the Software.

  • Your Responsibilities 7.1 You are responsible for installing and configuring, and using the Service, Software, and Hardware, including account set up and configuration settings (unless NCR Voyix provides remote support for any of the foregoing as part of your subscription to the Service), compliance with applicable laws and regulations, and establishing any payment processing or other services certified by NCR Voyix for use with the Service (including through NCR Voyix’s wholly owned affiliates). You are solely responsible for reviewing any default or automated settings and configuring applicable settings to meet all legal, regulatory and other requirements applicable to your business. NCR shall have no liability in connection with such settings or configurations. You acknowledge that NCR Voyix does not provide legal, tax or accounting advice. You will provide NCR Voyix access to your network, system, data, and relevant information as reasonably required to perform the Service. You acknowledge that NCR Voyix personnel may require, and you will provide, the ability to access and correct transaction or input data while the Service is being provided to you. NCR Voyix is not responsible for any damage caused by errors or omissions in any information, instructions, data, or scripts you or a third party provides on your behalf in connection with the Service, or any actions NCR Voyix takes at your direction. 7.2 To use the Service, you must maintain internet access at your own expense. NCR VOYIX IS NOT RESPONSIBLE FOR AND DOES NOT WARRANT THE PERFORMANCE OF ANY INTERNET SERVICE OR OTHER PROVIDER OR ITS SERVICES, AND YOU AGREE THAT NCR VOYIX HAS NO LIABILITY TO YOU FOR SUCH PERFORMANCE OR SERVICES. 7.3 Title to hardware, software, systems, documentation, and other intellectual property NCR Voyix uses to provide the Service will remain with NCR Voyix or its licensors, unless otherwise agreed in writing. You will take reasonable actions to protect NCR Voyix’s intellectual property rights. 7.4 You are responsible for complying with all rules, bylaws, programs, and regulations of the payment card networks in connection with your use of the Service, Software and Hardware, as applicable. You will defend and indemnify NCR Voyix against any claim or loss resulting from your failure to fulfill your responsibilities under this Section. 7.5 Certain Services may perform analysis of transaction records designed to identify transaction patterns and activity that may be indicative of fraud. You acknowledge that the indicia reported by such Services may not necessarily be the result of fraudulent activity. You are responsible for performing its own evaluation of any results. NCR Voyix does not guarantee the detection of fraudulent transactions. 7.6 You are responsible for all data, information, materials and instructions (“Customer Instructions”) provided to NCR Voyix by you or on your behalf. NCR Voyix is entitled to rely upon Customer Instructions. In no event will NCR Voyix be liable with respect to any loss, liability, cost, damage, or expense arising out of a claim by you or any third party to the extent that claim arises as a result of NCR Voyix’s compliance with Customer Instructions.

  • Client’s Responsibilities (a) Client agrees to advise Consultant regarding Client's Project requirements and to provide all relevant information, surveys, data and previous reports accessible to Client which Consultant may reasonably require. (b) Client shall designate a Project Representative to whom all communications from Consultant shall be directed and who shall have limited administrative authority on behalf of Client to receive and transmit information and make decisions with respect to the Project. Said representative shall not, however, have authority to bind Client as to matters of governmental policy or fiscal policy, nor to contract for additions or obligations exceeding a value which is the lesser of $5000 or 5% of the maximum contract price. (c) Client shall examine all documents presented by Consultant, and render decisions pertaining thereto within a reasonable time. The Client's approval of any drawings, specifications, reports, documents or other materials or product furnished hereunder shall not in any way relieve Consultant of responsibility for the professional adequacy of its work. (d) Client shall perform its obligations and render decisions within a reasonable time under the circumstances presented. Based upon the nature of Client and its requirements, a period of 14 days shall be presumed reasonable for any decision not involving policy decision or significant financial impact, when all information reasonably necessary for Client to responsibly render a decision has been furnished. A period of 46 days shall be presumed reasonable for Client to act with respect to any matter involving policy or significant financial impact. The above periods of presumed reasonableness shall be extended where information reasonably required is not within the custody or control of Client but must be procured from others.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!