Consequences of security incident Sample Clauses

Consequences of security incident. Depending on the sensitivity of the information and the nature of the loss or unauthorised access, the further sharing of information may be suspended pending resolution in accordance with section 7 of this agreement, or terminated, in accordance with section 8 of this agreement.‌ The designated points of contact will discuss and agree the next steps relating to the incident, taking specialist advice where appropriate. Such arrangements will include (but will not be limited to) containment of the incident and mitigation of any ongoing risk, recovery of the information, and assessing whether the DfE DPO / Information Commissioner and/or the data subjects will be notified. The arrangements may vary in each case, depending on the sensitivity of the information and the nature of the loss or unauthorised disclosure. Where appropriate and if relevant to the incident, disciplinary misconduct action and/or criminal proceedings will be considered.
AutoNDA by SimpleDocs

Related to Consequences of security incident

  • Consequences of Default Upon the occurrence of any Event of Default, as defined in the Revenue Sharing Agreement:

  • Default and Consequences of Default 18.1 Interest on overdue invoices shall accrue daily from the date when payment becomes due, until the date of payment, at a rate of two and a half percent (2.5%) per calendar month (and at the Supplier’s sole discretion such interest shall compound monthly at such a rate) after as well as before any judgment.

  • Consequences of an Event of Default (a) If an Event of Default specified in subsections (a) through (l), (o), (p) or (q) of Section 7.01 shall occur and, be continuing or shall exist, then, in addition to all other rights and remedies which the Administrative Agent or any Lender may have hereunder or under any other Loan Document, at law, in equity or otherwise, the Lenders shall be under no further obligation to make Loans hereunder, and the Administrative Agent may, and, upon the written request of the Required Lenders shall, by notice to the Borrower, from time to time do any or all of the following:

  • Consequences of non-compliance If a beneficiary breaches any of its obligations under this Article, the grant may be reduced (see Article 43). Such breaches may also lead to any of the other measures described in Chapter 6.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

  • Consequences of Events of Default and Corrective Action If an Event of Default occurs, the Province may, at any time, take one or more of the following actions:

  • CONSEQUENCES OF EARLY TERMINATION OR OTHER BREACH BY APPLICANT A. In the event that the Applicant terminates this Agreement without the consent of the District, except as provided in Section 7.2 of this Agreement, the Applicant shall pay to the District liquidated damages for such failure within thirty (30) days after receipt of the notice of breach.

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

Time is Money Join Law Insider Premium to draft better contracts faster.