Breaches of Security. 12.1 Any breaches in security should be reported and monitored within each organisation following their own incident reporting policies, and relevant partner organisations should be informed.
Breaches of Security. It is a criminal offence to knowingly or recklessly and without the consent of the data controller: • obtain • disclose or • procure the disclosure of personal data, or to sell or offer to sell personal data obtained in the above manner.
Breaches of Security. All known or suspected breaches of security in relation to the system, terminals and /or any information - such as misuse or abuse of the system, misuse or abuse of protocol information, unauthorised processing of data, unauthorised disclosure of information, malicious software attack, denial of service attack - are to be reported to the respective organisations’ Information Security Officer, Data Protection Officer or equivalent. Once notified of a breach of security an investigation will take place to identify, where possible, who carried out the breach, what information has been compromised, whether the integrity of the system has been compromised etc. Where any breach of security may amount to criminal activity, this must be reported to Lothian and Borders Police which will investigate the matter and, where appropriate, report the circumstances to the Procurator Fiscal. Where relevant or necessary, all partners are to be informed of any breach and provided with sufficient details which will enable them to retain assurance in the confidentiality, integrity and availability of the information and the processes supporting information exchange, and to undertake their own risk assessments.
Breaches of Security. 1. In case of actual or suspected breach of security, the Competent Security Authority of the Party where it has occurred shall, without delay, inform the Originating Party and, in accordance with the national laws and regulations, initiate appropriate proceedings, in order to determine the circumstances of the breach. The results of the proceedings shall be forwarded to the Originating Party.
2. When the breach of security has occurred in a Third Party, the Competent Security Authority of the sending Party shall take the actions referred to in paragraph 1 of this Article without delay.
Breaches of Security. The Head of Security shall conduct a mandatory post-incident review of events and actions taken, if any, to make changes in business practices if necessary relating to protection of personal and proprietary information following an incident involving a breach of security. The Head of Security shall document the foregoing and provide a report to executive management. “
Breaches of Security. If you are not happy with the route in which Lapasar handles your enquiry or objection, kindly don't delay to get in touch with Lapasar at xxxxxx@xxxxxxx.xxx.
Breaches of Security. (1) In cases where unauthorized disclosure, misuse or loss of Classified Information covered under this Agreement is suspected or confirmed, the Competent Security Authority of the receiving Party shall be notified thereof at once.
(2) Any breach of the provisions regarding the protection of Classified Information covered under this Agreement must be investigated and prosecuted in accordance with each Party’s domestic legislation. The other Party shall provide assistance upon request.
(3) The Parties shall inform one another of the outcome of the investigations and of the measures adopted.
Breaches of Security. Nocti Business Solutions must be notified immediately if any breach of security occurs for a Nocti Business Solutions standardized assessment. A breach of security is ultimately the responsibility of the institution/company. Once Nocti Business Solutions has been notified of a breach, steps will be taken to determine the extent of damages as well as the steps needed to remedy the breach. This may include, but is not limited to, consultation with legal counsel, legal action, test revision with costs incurred by the test site, and probation or suspension of the institution/company as an authorized user of Nocti Business Solutions assessments.
Breaches of Security. PRINCIPLES OF SECURITY
2. The Contractor acknowledges that the Director places great emphasis on confidentiality, integrity and availability of information and consequently on the security of the Sites and the security for the Contractor System. The Contractor also acknowledges the confidentiality of the Director’s Data.
3. The Contractor shall be responsible for the security of the Contractor System and shall at all times provide a level of security which:
3.1. is in accordance with Good Industry Practice and Law;
3.2. complies with the Security Policy;
3.3. meets any specific security threats to the Contractor System; and
3.4. complies with ISO/IEC27002 and ISO/IEC27001 in accordance with this Schedule.
4. Without limitation, the Contractor shall at all times ensure that the level of security employed in the provision of the Services is appropriate to maintain the following at acceptable risk levels (to be defined by the Director):
4.1. loss of integrity of Director Data;
4.2. loss of confidentiality of Director Data;
4.3. unauthorised access to, use of, or interference with Director Data by any person or organisation;
4.4. unauthorised access to network elements, buildings, [the Director Premises,] [the Sites,] and tools used by the Contractor in the provision of the Services;
4.5. use of the Contractor System or Services by any third party in order to gain unauthorised access to any computer resource or Director Data; and
4.6. loss of availability of Director Data due to any failure or compromise of the Services. SECURITY plan Introduction
5. The Contractor shall develop, implement and maintain a Security Plan to apply during the Term (and after the end of the Term (as applicable) in accordance with the Exit Management Clause which will be approved by the Director, tested, periodically updated and audited in accordance with this schedule.
6. A draft Security Plan provided by the Contractor as part of its bid is set out in Appendix 1. Development
7. Within 20 Days after the Effective Date and in accordance with this Schedule (Amendment and Revision), the Contractor will prepare and deliver to the Director for approval the full and final Security Plan which will be based on the draft Security Plan set out in Appendix 1.
8. If the Security Plan is approved by the Director it will be adopted immediately. If the Security Plan is not approved by the Director the Contractor shall amend it within ten (10) Working Days of a notice of non-approval from the Direc...
Breaches of Security. 6.1 In the event of a security infringement involving loss of classified material or suspicion that classified information has been disclosed to unauthorized persons, the Designated authority of the Recipient Party shall immediately inform the Designated authority o f the Originating Party.
6.2 An immediate investigation shall be carried out by the Recipient Party (with assistance from the Originating Party if required) in accordance with the national legislation in force in its State for the protection of classified information. The Recipient Party shall inform the Originating Party about the circumstances, measures adopted and outcome o f the investigation as soon as possible.
6.3 The Parties shall bind the organizations of their own States which shall carry out cooperation connected with the exchange of classified information to determine in the contracts obligations and means for the mutual protection o f classified information, procedure o f determining and order of indemnification for losses due to disclosure of classified information or loss of its material carries.