Breach Response Sample Clauses
Breach Response. In the event of any unauthorized access to, unauthorized disclosure of, loss of, damage to or inability to account for any Personal Information (a "Breach"), Grantee agrees that it will promptly, at its own expense: (i) report such Breach to the Grantor by telephone with immediate written confirmation sent by e-mail, describing in detail any accessed materials and identifying any individual(s) who may have been involved in such Breach; (ii) take all actions necessary or reasonably requested by the Grantor to stop, limit or minimize the Breach; (iii) restore and/or retrieve, as applicable, and return all Personal Information that was lost, damaged, accessed, copied or removed; (iv) cooperate in all reasonable respects to minimize the damage resulting from such Breach; (v) provide any notice to Illinois residents as required by 815 ILCS 530/10, 815 ILCS 530/12 or applicable federal law, in consultation with the Grantor; and (vi) cooperate in the preparation of any report related to the Breach that the Grantor may need to present to any governmental body.
Breach Response. Xxxxxx will promptly take all actions relating to its Security Measures that it deems necessary and advisable to identify and remediate the cause of a Personal Data Breach.
Breach Response. To provide Breach Response Services to the Insured Organisation because of an actual or reasonably suspected Data Breach or Security Breach that the Insured first discovers during the Policy Period. To indemnify the Insured Organisation for: Business Interruption Loss that the Insured Organisation sustains as a result of a Security Breach or System Failure that the Insured first discovers during the Policy Period. Dependent Business Loss that the Insured Organisation sustains as a result of a Dependent Security Breach or a Dependent System Failure that the Insured first discovers during the Policy Period.
Breach Response. Notification Sublimit - a minimum limit of fifty percent (50%) of the policy aggregate
Breach Response. Soundtrap has an incident response plan as well as appropriate procedures to detect, contain, and respond to security incidents.
Breach Response. (a) In general.
(1) In the event of a breach of PII/PHI held by the Business Associate, the Business Associate shall report the breach to the Covered Entity in accordance with Section VII, assess the breach incident, take mitigation actions as applicable, and notify affected individuals, as directed by the Covered Entity.
(2) The Business Associate shall coordinate all investigation actions with the Covered Entity, and at a minimum, follow the breach response requirements set forth in this Part V, which is designed to satisfy both the Privacy Act and HIPAA as applicable. If a breach involves PII without PHI, then the Business Associate shall comply with DoD Privacy Act Issuance breach response requirements only; if a breach involves PHI (a subset of PII), then the Business Associate shall comply with both Privacy Act and HIPAA breach response requirements. A breach involving PHI may or may not constitute an HHS Breach. If a breach is not an HHS Breach, then the Business Associate has no HIPAA breach response obligations. In such cases, the Business Associate must still comply with breach response requirements under the DoD Privacy Act Issuances.
(3) The Business Associate shall, at no cost to the government, bear any costs associated with a breach of PII/PHI that the Business Associate has caused or is otherwise responsible for addressing.
Breach Response. The Fund will provide Breach Response Services to the Fund Member because of an actual or reasonably suspected Data Breach or Security Breach that the Fund Member first discovers during the Participation Period.
Breach Response. (a) In general. In the event of a breach of PII/PHI held by the Business Associate, the Business Associate shall follow the breach response requirements set forth in this Part V, which is designed to satisfy both the Privacy Act and HIPAA as applicable. If a breach involves PII without PHI, then the Business Associate shall comply with DoD Privacy Act Issuance breach response requirements only; if a breach involves PHI (a subset of PII), then the Business Associate shall comply with both Privacy Act and HIPAA breach response requirements. A breach involving PHI may or may not constitute an HHS Breach. If a breach is not an HHS Breach, then the Business Associate has no HIPAA breach response obligations. In such cases, the Business Associate must still comply with breach response requirements under the DoD Privacy Act Issuances. If the DHA Privacy Office determines that a breach is an HHS Breach, then the Business Associate shall comply with both the HIPAA Breach Rule and DoD Privacy Act Issuances, as directed by the DHA Privacy Office, regardless of whether the breach occurs at DHA or at one of the Service components. If the DHA Privacy Office determines that the breach does not constitute an HHS Breach, then the Business Associate shall comply with DoD Privacy Act Issuances, as directed by the applicable Service-Level Privacy Office. [The Service-Level Privacy Office may wish to add more specific provisions here and below addressing what is required when the incident is not an HHS Breach. The only DHA Privacy Office role in that situation is to track the Service-level breach response.] The following provisions of Part V set forth the Business Associate’s Privacy Act and HIPAA breach response requirements for all breaches, including but not limited to HHS breaches. This Part V is designed to satisfy the DoD Privacy Act Issuances and the HIPAA Breach Rule as implemented by the DoD HIPAA Issuances. In general, for breach response, the Business Associate shall report the breach to the Covered Entity, assess the breach incident, notify affected individuals, and take mitigation actions as applicable. Because DoD defines “breach” to include possible (suspected) as well as actual (confirmed) breaches, the Business Associate shall implement these breach response requirements immediately upon the Business Associate’s discovery of a possible breach.
Breach Response. To indemnify the Insured Organisation for Breach Response Costs incurred by the Insured Organisation because of an actual or reasonably suspected Data Breach or Security Breach that the Insured first discovers during the Policy Period. To indemnify the Insured Organisation for: Business Interruption Loss that the Insured Organisation sustains as a result of a Security Breach or System Failure that the Insured first discovers during the Policy Period. Dependent Business Loss that the Insured Organisation sustains as a result of a Dependent Security Breach or a Dependent System Failure that the Insured first discovers during the Policy Period.
Breach Response. [This paragraph 9 is inoperative, and all references herein to “paragraph 9” shall be deemed to refer to the XXX breach responses provisions, if the contract incorporates the XXX by reference. See paragraph 8.1.4 above]
9.1. Definitions Related to Breach response