Compromised Security i. It is the Account Holder’s obligation to inform Finductive IMMEDIATELY if it believes that the Payment Account has been used in an unauthorised or fraudulent manner, or in the case of loss, theft, misappropriation or unauthorised use of credentials. The Account Holder must, in such an event, contact Finductive immediately and without undue delay by (i) calling us on 20318601 ;(ii) sending an E-mail to xxxxxxxxxx@xxxxxxxxxx.xxx or (iii) via the "Contact us" section on the Website.
Compromised Security. In the event that data collected or obtained by the Contractor in connection with this Contract is believed to have been compromised, the Contractor shall notify the City Manager, or authorized designee, immediately. The Contractor agrees to reimburse the City for any costs incurred by the City to investigate potential breaches of this data and, where applicable, the cost of notifying individuals who may be impacted by the breach.
Compromised Security. In the event that data collected or obtained by the Professional in connection with this Agreement is believed to have been compromised or in the event of a cybersecurity event or breach, the Professional shall notify NBU immediately. To the Extent Permitted by Section 271.904 of the Texas Local Government Code, as amended, the Professional shall indemnify and hold NBU harmless from any Claims resulting from an act of negligence, intentional tort, intellectual property infringement, or failure to pay a subcontractor or supplier committed in connection with the performance of this Agreement by the Professional, its officers, employees, consultants, agents, any tier of subcontractor, or any entity over which the Professional exercises Control.
Compromised Security. In the event that data collected or obtained by the Professional in connection with this Agreement is believed to have been compromised or in the event of a cybersecurity event or breach, the Professional shall notify NBU immediately. The Professional shall indemnify, defend, and hold NBU harmless from any Claims resulting from the Professional’s failure to comply with its obligations under this Section.
Compromised Security. In the event that data collected or obtained by the Professional in connection with this Agreement is believed to have been compromised or in the event of a Security Incident, as defined by Section 2054.603 of the Texas Government Code, the Professional shall notify NBU within twenty-four (24) hours of discovery of such compromise or Security Incident. The Professional shall indemnify, defend, and hold NBU harmless from any Claims resulting from the Professional’s failure to comply with its obligations under this Section.
Compromised Security. In the event that data collected or obtained by the Professional in connection with this Agreement is believed to have been compromised or in the event of a Security Incident, as defined by Section 2054.603 of the Texas Government Code, the Professional shall notify NBU within twenty-four (24) hours of discovery of such compromise or Security Incident. To the Extent Permitted by Section 271.904 of the Texas Local Government Code, as amended, the Professional shall indemnify and hold NBU harmless from any Claims resulting from an act of negligence, intentional tort, intellectual property infringement, or failure to pay a subcontractor or supplier committed in connection with the performance of this Agreement by the Professional, its officers, employees, consultants, agents, any tier of subcontractor, or any entity over which the Professional exercises Control.
Compromised Security. In the event that data collected or obtained by the Professional in connection with this Agreement is believed to have been compromised, the Professional shall notify NBU immediately. TO THE EXTENT PERMITTED BY SECTION 271.904 OF THE TEXAS LOCAL GOVERNMENT CODE, AS AMENDED, THE PROFESSIONAL SHALL INDEMNIFY AND HOLD NBU HARMLESS FROM ANY CLAIMS RESULTING FROM AN ACT OF NEGLIGENCE, INTENTIONAL TORT, INTELLECTUAL PROPERTY INFRINGEMENT, OR FAILURE TO PAY A SUBCONTRACTOR OR SUPPLIER COMMITTED IN CONNECTION WITH THE PERFORMANCE OF THIS AGREEMENT BY THE PROFESSIONAL, ITS OFFICERS, EMPLOYEES, CONSULTANTS, AGENTS, ANY TIER OF SUBCONTRACTOR, OR ANY ENTITY OVER WHICH THE PROFESSIONAL EXERCISES CONTROL.
Compromised Security. It is the Account Xxxxxx’s obligation to inform Finductive IMMEDIATELY if it believes that the Payment Account has been used in an unauthorised or fraudulent manner, or in the case of loss, theft, misappropriation or unauthorised use of credentials. The Account Holder must, in such an event, contact Finductive immediately and without undue delay by (i) calling us on 00000000; (ii) sending an E-mail to xxxxxxxxxx@xxxxxxxxxx.xxx or (iii) via the "Contact us" section on the Website. Finductive may suspend the use of the Payment Account in part or wholly, including block account/s, where it suspects that their security may have been compromised or that unauthorised or fraudulent use has taken place. Finductive will inform the Account Holder in advance or, if that is not possible, immediately after, the suspension of the use of the Service, specifying the reasons for the suspension, unless such provision of information would compromise reasonable security measures or be otherwise unlawful. Finductive will then provide access to the Service or replacement credentials or personalised security characteristics to the Account Holder, as soon as practicable after the reasons for the suspension cease to exist and on condition that the Account Holder has performed all obligations towards Finductive. Finductive may at its own discretion block the possibility for specific types of payment transactions in principle or in certain countries or in some cases, in order to comply with risk and compliance requirements. Finductive may, at its reasonable discretion (for example, for fraud, risk and compliance reasons) impose limits on the amount of money which the Account Holder can withdraw, transfer, receive or fund for a certain period of time or for the whole period of use of Service.
Compromised Security. You agree to notify, and to cause your Authorized Signatories to notify, us by telephone or in writing as soon as possible, but in any event, within 24 hours of learning that the confidentiality of a Secret Code has been compromised by any means. This 24-hour time period will not apply if there are exceptional circumstances beyond your reasonable control which preventing you from notifying us within such 24-hour time period, provided that you notify us as soon as possible in the circumstances.
Compromised Security. Any event that results in unauthorized access to the ELS databases that contain the private information of Issuing Agents and Licensees. Measurable Event Service Level Goal Calculation System Availability The system should be available 99.9% of Available Production Minutes Actual minutes system is available / Available Production Minutes Transaction Response Time 99% of transactions occur within 10 seconds Number meeting SLA/ Total number of transactions Implementation of Changes 100% of all system changes are completed successfully Number of successful changes / Number of changes implemented. Disaster Recovery 100% of DR tests and any needed recoveries result in System Availability within two days* Number of successful recoveries / Number of disaster recovery tests and actual disasters Compromised Security The system will not allow the system security to be compromised Met if the system security is not compromised * Although the goal for DR testing and DR recovery is within two days, the vendor will still be assessed damages for system unavailability.