Breach of Security. 5.1. Provider shall provide the GLO with the name and contact information for an employee of Provider which shall serve as the GLO’s primary security contact. 5.2. Upon Provider’s discovery of a Breach of Security or suspected Breach of Security, Provider shall notify the GLO as soon as possible, but no later than 24 hours after discovery of the Breach of Security or suspected Breach of Security. Within 72 hours, Provider shall provide to the GLO, at minimum, a written preliminary report regarding the Breach or suspected Breach to the GLO with root cause analysis including a log detailing the data affected. 5.3. Provider shall submit the initial notification and preliminary report to the GLO Information Security Officer at xxxxxxxxxxxxxxxxxxx@xxx.xxxxx.xxx. 5.4. Provider shall take all reasonable steps to immediately remedy a Breach of Security and prevent any further Breach of Security. 5.5. Provider shall not inform any third party of any Breach of Security or suspected Breach of Security without first obtaining GLO’s prior written consent unless such action is required by law or is limited to third party personnel that have a need to know for the sole purpose of containing or remediating the Breach of Security or suspected Breach of Security. However, while a third party may be informed of the Breach or suspected Breach for the sole purpose of containing or remediating it, no GLO Data shall be shared with such third party unless express written permission is obtained from the GLO in accordance with Section 2.5. Provider will legally bind such third party to the same requirements stated herein and obligations stipulated in the Contract and documents related thereto as soon as practicable upon securing such third party to contain or remediate the Breach of Security or suspected Breach of Security. 5.6. Notwithstanding the remedies provided in the Contract, if a Breach of Security includes SPI, Provider shall, at the discretion of the GLO, notify affected individuals of such Breach and provide affected individuals complimentary access to one (1) year of credit monitoring services.
Appears in 10 contracts
Samples: Professional Services, Relocation Assistance Services Contract, Professional Services
Breach of Security. 5.1. Provider Developer shall provide the GLO with the name and contact information for an employee of Provider Developer which shall serve as the GLO’s primary security contact.
5.2. Upon ProviderDeveloper’s discovery of a Breach of Security or suspected Breach of Security, Provider Developer shall notify the GLO as soon as possible, but no later than 24 hours after discovery of the Breach of Security or suspected Breach of Security. Within 72 hours, Provider Developer shall provide to the GLO, at minimum, a written preliminary report regarding the Breach or suspected Breach to the GLO with root cause analysis including a log detailing the data affected.
5.3. Provider Developer shall submit the initial notification and preliminary report to the GLO Information Security Officer at xxxxxxxxxxxxxxxxxxx@xxx.xxxxx.xxx.
5.4. Provider Developer shall take all reasonable steps to immediately remedy a Breach of Security and prevent any further Breach of Security.
5.5. Provider Developer shall not inform any third party of any Breach of Security or suspected Breach of Security without first obtaining GLO’s prior written consent unless such action is required by law or is limited to third party personnel that have a need to know for the sole purpose of containing or remediating the Breach of Security or suspected Breach of Security. However, while a third party may be informed of the Breach or suspected Breach for the sole purpose of containing or remediating it, no GLO Data shall be shared with such third party unless express written permission is obtained from the GLO in accordance with Section 2.5. Provider Developer will legally bind such third party to the same requirements stated herein and obligations stipulated in the Contract and documents related thereto as soon as practicable upon securing such third party to contain or remediate the Breach of Security or suspected Breach of Security.
5.6. Notwithstanding the remedies provided in the Contract, if a Breach of Security includes SPI, Provider Developer shall, at the discretion of the GLO, notify affected individuals of such Breach and provide affected individuals complimentary access to one (1) year of credit monitoring services.
Appears in 4 contracts
Samples: Grant Agreement, Grant Agreement, Grant Agreement
Breach of Security. 5.1. Provider Subrecipient shall provide the GLO with the name and contact information for an employee of Provider Subrecipient which shall serve as the GLO’s primary security contact.
5.2. Upon ProviderSubrecipient’s discovery of a Breach of Security or suspected Breach of Security, Provider Subrecipient shall notify the GLO as soon as possible, but no later than 24 hours after discovery of the Breach of Security or suspected Breach of Security. Within 72 hours, Provider Subrecipient shall provide to the GLO, at minimum, a written preliminary report regarding the Breach or suspected Breach to the GLO with root cause analysis including a log detailing the data affected.
5.3. Provider Subrecipient shall submit the initial notification and preliminary report to the GLO Information Security Officer at xxxxxxxxxxxxxxxxxxx@xxx.xxxxx.xxx.
5.4. Provider Subrecipient shall take all reasonable steps to immediately remedy a Breach of Security and prevent any further Breach of Security.
5.5. Provider Subrecipient shall not inform any third party of any Breach of Security or suspected Breach of Security without first obtaining GLO’s prior written consent unless such action is required by law or is limited to third party personnel that have a need to know for the sole purpose of containing or remediating the Breach of Security or suspected Breach of Security. However, while a third party may be informed of the Breach or suspected Breach for the sole purpose of containing or remediating it, no GLO Data shall be shared with such third party unless express written permission is obtained from the GLO in accordance with Section 2.5. Provider Subrecipient will legally bind such third party to the same requirements stated herein and obligations stipulated in the Contract and documents related thereto as soon as practicable upon securing such third party to contain or remediate the Breach of Security or suspected Breach of Security.
5.6. Notwithstanding the remedies provided in the Contract, if a Breach of Security includes SPI, Provider Subrecipient shall, at the discretion of the GLO, notify affected individuals of such Breach and provide affected individuals complimentary access to one (1) year of credit monitoring services.
Appears in 4 contracts
Samples: Subrecipient Agreement, Subrecipient Agreement, Subrecipient Agreement
Breach of Security. 5.1. Provider shall agrees to provide the GLO with the name and contact information for an employee of Provider which shall serve as the GLO’s primary security contact.
5.2. Upon Provider’s discovery of a Breach of Security or suspected Breach of SecuritySecurity by Provider, Provider shall agrees to notify the GLO as soon as possible, but in no event shall notification occur later than 24 hours after upon discovery of the Breach of Security or suspected Breach of Security. Within 72 hours, Provider shall provide agrees to the GLOprovide, at minimum, a written preliminary report regarding the Breach or suspected Breach to the GLO with root cause analysis including a log detailing the data affected.
5.3. Provider shall submit the The initial notification and preliminary report shall be submitted to the GLO Information Security Officer at xxxxxxxxxxxxxxxxxxx@xxx.xxxxx.xxx.
5.4. Provider shall agrees to take all reasonable steps to immediately remedy a Breach of Security and prevent any further Breach of Security.
5.5. Provider agrees that it shall not inform any third party of any Breach of Security or suspected Breach of Security without first obtaining GLO’s prior written consent unless such action is required by law or is limited to third party personnel that have a need to know for the sole purpose of containing or remediating the Breach of Security or suspected Breach of Security. However, while a third party may be informed of the Breach or suspected Breach for the sole purpose of containing or remediating it, no GLO Data data shall be shared with such third party unless express written permission is obtained from the GLO in accordance with Section 2.5. Provider will legally bind such third party to the same requirements stated herein and obligations stipulated in the Contract and documents related thereto as soon as practicable upon securing such third party to contain or remediate the Breach of Security or suspected Breach of Security.
5.6. Notwithstanding the remedies provided in the Contract, if a Breach of Security includes SPI, including but not limited to, Social Security Numbers, payment card information, or health information, Provider shallagrees, at the discretion of the GLO, to notify affected individuals of such Breach and to provide affected individuals complimentary access to for one (1) year of credit monitoring services.
Appears in 3 contracts
Samples: Professional Services Contract, Professional Services, Professional Services Contract
Breach of Security. 5.1. Provider shall agrees to provide the GLO with the name and contact information for an employee of the Provider which shall serve as the GLO’s primary security contact.
5.2. Upon Provider’s discovery of a Breach of Security or suspected Breach of SecuritySecurity by Provider, Provider shall agrees to use commercially reasonable efforts to notify the GLO as soon as possible, but no later than 24 hours after possible upon discovery of the Breach of Security or suspected Breach of Security, but in no event shall notification occur later than 24 hours after discovery. Within 72 hoursfive business days from the date Provider notifies GLO of the Breach of Security or suspected Breach of Security, Provider shall provide agrees to the GLOprovide, at minimum, a written preliminary report regarding the Breach or suspected Breach to the GLO with root cause analysis including a log detailing the data affected, to the extent such information is known and available to Provider at that time.
5.3. Provider shall submit the The initial notification and preliminary report shall be submitted to the GLO Information Security Officer at xxxxxxxxxxxxxxxxxxx@xxx.xxxxx.xxx.
5.4. Provider shall agrees to take all reasonable steps to immediately remedy promptly mitigate a Breach of Security and prevent take steps designed to reduce the risk of any further Breach of Security.
5.5. Provider agrees that it shall not inform any third party of any Breach of Security or suspected Breach of Security without first obtaining GLO’s prior written consent unless such action is required by law or court order, is limited in connection with a law enforcement or investigative activities, or notification to the third party personnel that have a need to know is done for the sole purpose of containing or remediating the Breach of Security or suspected Breach of Security. However, while a third party may be informed of the Breach or suspected Breach for the sole purpose of containing or remediating it, no GLO Data shall be shared with such third party unless express written permission is obtained from the GLO in accordance with Section 2.5. Provider will legally bind such third party to the same requirements stated herein and obligations stipulated in the Contract and documents related thereto as soon as practicable upon securing such third party to contain or remediate the Breach of Security or suspected Breach of Security.
5.6. Notwithstanding If the remedies provided in the Contract, if a Breach of Security includes SPI, including Social Security Numbers, payment card information, or health information, Provider shall, at the discretion of the GLO, notify affected individuals of such Breach and agrees to provide affected individuals complimentary access to for one (1) year of credit monitoring services.
Appears in 2 contracts
Samples: Subrecipient Agreement, Subrecipient Agreement
Breach of Security. 5.1. Provider shall agrees to provide the GLO with the name and contact information for an employee of the Provider which shall serve as the GLO’s primary security contact.
5.2. Upon Provider’s discovery of a Breach of Security or suspected Breach of SecuritySecurity by the Provider, the Provider shall agrees to notify the GLO as soon as possible, but in no event shall notification occur later than 24 hours after upon discovery of the Breach of Security or suspected Breach of Security. Within 72 hours, the Provider shall provide agrees to the GLOprovide, at minimum, a written preliminary report regarding the Breach or suspected Breach to the GLO with root cause analysis including a log detailing the data affected.
5.3. Provider shall submit the The initial notification and preliminary report shall be submitted to the GLO Information Security Officer at xxxxxxxxxxxxxxxxxxx@xxx.xxxxx.xxx.
5.4. Provider shall agrees to take all reasonable steps to immediately remedy a Breach of Security and prevent any further Breach of Security.
5.5. Provider agrees that it shall not inform any third party of any Breach of Security or suspected Breach of Security without first obtaining GLO’s prior written consent unless such action is required by law or is limited to third party personnel that have a need to know for the sole purpose of containing or remediating the Breach of Security or suspected Breach of Security. However, while a third party may be informed of the Breach or suspected Breach for the sole purpose of containing or remediating it, no GLO Data data shall be shared with such third party unless express written permission is obtained from the GLO in accordance with Section 2.5. Provider will legally bind such third party to the same requirements stated herein and obligations stipulated in the Contract and documents related thereto as soon as practicable upon securing such third party to contain or remediate the Breach of Security or suspected Breach of Security.
5.6. Notwithstanding the remedies provided in the Contract, if a Breach of Security includes SPI, including but not limited to, Social Security Numbers, payment card information, or health information, the Provider shallagrees, at the discretion of the GLO, to notify affected individuals of such Breach and to provide affected individuals complimentary access to for one (1) year of credit monitoring services.
Appears in 2 contracts
Samples: Environmental Services Contract, Environmental Services Contract
Breach of Security. 5.1. Provider Contractor shall provide the GLO with the name and contact information for an employee of Provider Contractor which shall serve as the GLO’s primary security contact.
5.2. Upon ProviderContractor’s discovery of a Breach of Security or suspected Breach of Security, Provider Contractor shall notify the GLO as soon as possible, but no later than 24 hours after discovery of the Breach of Security or suspected Breach of Security. Within 72 hours, Provider Contractor shall provide to the GLO, at minimum, a written preliminary report regarding the Breach or suspected Breach to the GLO with root cause analysis including a log detailing the data affected.
5.3. Provider Contractor shall submit the initial notification and preliminary report to the GLO Information Security Officer at xxxxxxxxxxxxxxxxxxx@xxx.xxxxx.xxx.
5.4. Provider Contractor shall take all reasonable steps to immediately remedy a Breach of Security and prevent any further Breach of Security.
5.5. Provider Contractor shall not inform any third party of any Breach of Security or suspected Breach of Security without first obtaining GLO’s prior written consent unless such action is required by law or is limited to third party personnel that have a need to know for the sole purpose of containing or remediating the Breach of Security or suspected Breach of Security. However, while a third party may be informed of the Breach or suspected Breach for the sole purpose of containing or remediating it, no GLO Data shall be shared with such third party unless express written permission is obtained from the GLO in accordance with Section 2.5. Provider Contractor will legally bind such third party to the same requirements stated herein and obligations stipulated in the Contract and documents related thereto as soon as practicable upon securing such third party to contain or remediate the Breach of Security or suspected Breach of Security.
5.6. Notwithstanding the remedies provided in the Contract, if a Breach of Security includes SPI, Provider Contractor shall, at the discretion of the GLO, notify affected individuals of such Breach and provide affected individuals complimentary access to one (1) year of credit monitoring services.
Appears in 1 contract
Samples: Work Order
Breach of Security. 5.1. 5.1 Provider shall provide the GLO with the name and contact information for an employee of Provider which shall serve as the GLO’s primary security contact.
5.2. 5.2 Upon Provider’s discovery of a Breach of Security or suspected Breach of Security, Provider shall notify the GLO as soon as possible, but no later than 24 hours after discovery of the Breach of Security or suspected Breach of Security. Within 72 hours, Provider shall provide to the GLO, at minimum, a written preliminary report regarding the Breach or suspected Breach to the GLO with root cause analysis including a log detailing the data affected.
5.3. 5.3 Provider shall submit the initial notification and preliminary report to the GLO Information Security Officer at xxxxxxxxxxxxxxxxxxx@xxx.xxxxx.xxx.
5.4. 5.4 Provider shall take all reasonable steps to immediately remedy a Breach of Security and prevent any further Breach of Security.
5.5. 5.5 Provider shall not inform any third party of any Breach of Security or suspected Breach of Security without first obtaining GLO’s prior written consent unless such action is required by law or is limited to third party personnel that have a need to know for the sole purpose of containing or remediating the Breach of Security or suspected Breach of Security. However, while a third party may be informed of the Breach or suspected Breach for the sole purpose of containing or remediating it, no GLO Data shall be shared with such third party unless express written permission is obtained from the GLO in accordance with Section 2.5. Provider will legally bind such third party to the same requirements stated herein and obligations stipulated in the Contract and documents related thereto as soon as practicable upon securing such third party to contain or remediate the Breach of Security or suspected Breach of Security.
5.6. 5.6 Notwithstanding the remedies provided in the Contract, if a Breach of Security includes SPI, Provider shall, at the discretion of the GLO, notify affected individuals of such Breach and provide affected individuals complimentary access to one (1) year of credit monitoring services.
Appears in 1 contract
Samples: Work Order