Cyber Breach Sample Clauses

Cyber Breach. Buyer shall implement and maintain commercially reasonable physical and cybersecurity safeguards and security mechanisms to protect the confidentiality and integrity of Seller's non-public data and the systems that house or handle such data. Buyer shall immediately notify Seller of: (1) any unauthorized possession, unauthorized disclosure, or unauthorized use of, loss, or any other potential corruption, compromise, or destruction of any of Seller's non-public data, or the systems that house or handle that data; (2) the effect of such use or possession; and (3) the corrective action taken in response thereto. Buyer acknowledges that Seller may be required to notify its customers, regulators, and/or employees of such security incidents and agrees to assist and cooperate with Seller with any investigation, disclosures to affected parties, and other remedial measures, in each case, as reasonably requested by Seller or required by any applicable regulations or privacy laws
AutoNDA by SimpleDocs
Cyber Breach. The Contractor shall be liable, without limitation, for damages arising out of a cyber breach. “Cyber breach” means a breach resulting in actual or potential harm to the AOC’s network, hardware, software, or other information systems.
Cyber Breach. Vendor shall have a plan and adequate resources to address telecommunications and computer systems breach, and shall maintain intrusion detection services and procedures and/or data breaching systems to detect and address "hacking" and "phishing operations" into the Vendor's telecommunications system, that includes services and systems to detect any unauthorized access to or unauthorized activity on the Vendor’s telecommunications system, networks, computer systems, and network devices associated with the use of and access to the County's management systems, databases, and County information and data. Vendor will ensure that all intrusion detection measures and data breach systems are maintained and functional on a regular basis. Intrusion detection services and data breach systems shall include, at minimum, network-based intrusion detection and active monitoring of appropriate computer system access logs. Vendor shall notify the County, as soon as reasonably possible, of its detection of any potential or suspected intrusions that may affect the County with regard to disbursement of payments or access to County systems, networks, data, or information. Failure by Vendor to provide this notification shall be a breach under the Contract. Vendor shall be liable for all costs and damages to the County related to or arising from the breach of Vendor’s telecommunications systems, networks, or computer systems. Vendor shall provide the County a historical record of prior breaches of security or intrusions, including all prior incidents of "hacking," that have previously been detected in the Vendor 's system.
Cyber Breach. Consultant shall have a plan and adequate resources to address telecommunications and computer systems breach, and shall maintain intrusion detection services and procedures and/or data breaching systems to detect and address "hacking" and "phishing operations" into the Consultant's telecommunications system, that includes services and systems to detect any unauthorized access to or unauthorized activity on the Consultant’s telecommunications system, networks, computer systems, and network devices associated with the use of and access to the County's management systems, databases, and County information and data. Consultant will ensure that all intrusion detection measures and data breach systems are maintained and functional on a regular basis. Intrusion detection services and data breach systems shall include, at minimum, network-based intrusion detection and active monitoring of appropriate computer system access logs. Consultant shall notify the County, as soon as reasonably possible, of its detection of any potential or suspected intrusions that may affect the County with regard to disbursement of payments or access to County systems, networks, data, or information. Failure by Consultant to provide this notification shall be a breach under the contract. Consultant shall be liable for all costs and damages to the County related to or arising from the breach of Consultant’s telecommunications systems, networks, or computer systems. Consultant shall provide the County a historical record of prior breaches of security or intrusions, including all prior incidents of "hacking," that have previously been detected in the Consultant 's system. The parties hereto have set their hands and seal this day of , 2022. Franklin County Board of Commissioners: Forensic Pathology Services, LLC d/b/a/ Forensic Pathology Staffing (FPS) By: Xxxxx X. Xxxxxxx, President By: Xxxx X’Xxxxx, Commissioner By: Xxxxx X. Xxxxx, Commissioner By: X. Xxxxxxxx Xxxxxxxxx, Chief Executive Officer Date: 9/22/2022 | 2:39 PM EDT APPROVED AS TO FORM: APPROVED AS TO FORM: X. Xxxx Xxxxx Xxxxx X. Xxxxx-Xxxxxxxx Prosecuting Attorney Director, Purchasing Department Franklin County, Ohio Franklin County, Ohio By: Assistant Prosecuting Attorney Date: 9/22/2022 | 4:18 PM EDT By: Purchasing Director Date:9/22/2022 | 4:14 PM EDT STATE OF _ COUNTY/PARISH OF duly sworn, deposes and says that they are (President, Secretary, etc.) of , the party who made the foregoing bids; that such party as Consultant doe...

Related to Cyber Breach

  • Other Breaches The breach by such Borrower (other than a breach which constitutes a Default with respect to such Borrower under another Section of this Article VII) of any of the terms or provisions of this Agreement which is not remedied within 15 days (or, in the case of Section 6.9, five Business Days) after the chief executive officer, the chief financial officer, the President, the Treasurer or any Assistant Treasurer of such Borrower obtains actual knowledge of such breach.

  • Other Breach Under Agreement Borrower fails to meet the conditions of, or fails to perform any obligation under, any term of this Agreement not specifically referred to above.

  • Winter Break The Resident may apply to occupy a Room during the Winter Break period as detailed in Table 2. Winter Break applications will be made available to Residents by the Manager. Applications are due on or before December 1 at 5:00 p.m. If the Resident’s application is approved, they may be required to pay a small fee (detailed in Table 2) for Winter Break occupancy before the beginning of the Winter Break. During the Winter Break there is limited supervision of the Residence, all services are reduced or suspended, and annual maintenance and renovations may occur. To ensure the safety and security of the Resident and the Residence facilities it is the intention of the Manager to limit the number of Residents staying during the Winter Break to a small number of individuals that demonstrate a significant need for Residence accommodations. If the Resident is found occupying a Room during the Winter Break without having given written notice to the Manager, the Resident shall be subject to $30.00 for each day during the Winter Break period or $200.00 for the entire Winter Break, due immediately. Academic Year 2024-2025 December 14, 2024 January 5, 2025 $30.00/per day

  • For Breach A Party may terminate this Agreement for cause if it provides 30 days written notice of the breach to the other Party, and the breach remains uncured at the end of 30 days. If Agency terminates this Agreement due to Axon’s uncured breach, Axon will refund prepaid amounts on a prorated basis based on the effective date of termination.

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.

  • WAIVER OR BREACH It is agreed that a waiver by either party of a breach of any provision of this Agreement shall not operate, or be construed, as a waiver of any subsequent breach by that same party.

  • Default; Breach A “Default” is defined as a failure by the Lessee to comply with or perform any of the terms, covenants, conditions or Rules and Regulations under this Lease. A “Breach” is defined as the occurrence of one or more of the following Defaults, and the failure of Lessee to cure such Default within any applicable grace period:

  • Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article

  • Seller’s Breach Upon discovery by a Responsible Officer of the Master Servicer, the Securities Administrator or the Trustee or notice to the Master Servicer, the Securities Administrator or the Trustee of any defective or missing document (as described in the related Sale Agreement) in a Trustee Mortgage Loan File, or of any breach by any Seller of any representation, warranty or covenant under the related Sale Agreement, which defect or breach materially and adversely affects the value of any Mortgage Loan or the interest of the Trust therein (it being understood that any such defect or breach shall be deemed to have materially and adversely affected the value of the related Mortgage Loan or the interest of the Trust therein if the Trust incurs a loss as a result of such defect or breach),the parties discovering or receiving notice of such defect or breach shall notify the Securities Administrator. Upon discovering or receipt of notice of such breach, the Securities Administrator shall promptly request that such Seller cure such breach and, if such Seller does not cure such defect or breach in all material respects by the end of the cure period specified in such Sale Agreement and any extension of the cure period granted as permitted by such Sale Agreement, shall enforce such Seller’s obligation under such Sale Agreement to purchase such Mortgage Loan from the Trustee. In the event any Servicer has breached a representation or warranty under the related Servicing Agreement that is substantially identical to a representation or warranty breached by a Seller, the Securities Administrator shall first proceed against such Servicer. If such Servicer does not within 60 days (or such other period provided in the related Servicing Agreement) after notification of the breach, either take steps to cure such breach (which may be evidenced by a certificate asking for an extension of time in which to effectuate a cure) or complete the purchase of the Mortgage Loan, then (i) the Securities Administrator, shall enforce the obligations of the Seller under the related Sale Agreement to cure such breach or to purchase the Mortgage Loan from the Trust, and (ii) such Seller shall succeed to the rights of the Securities Administrator to enforce the obligations of the Servicer to cure such breach or repurchase such Mortgage Loan under the Servicing Agreement with respect to such Mortgage Loan. Notwithstanding the foregoing, however, if any breach of a representation or warranty by the Servicer or of a Seller is a Qualification Defect, a cure or purchase must take place within 75 days of the Defect Discovery Date.

  • CONSEQUENCES OF EARLY TERMINATION OR OTHER BREACH BY APPLICANT A. In the event that the Applicant terminates this Agreement without the consent of the District, except as provided in Section 7.1 of this Agreement, the Applicant shall pay to the District liquidated damages for such failure within thirty (30) days after receipt of the notice of breach. B. In the event that the District determines that the Applicant has failed to comply in any material respect with the terms of this Agreement or to meet any material obligation under this Agreement, the Applicant shall pay to the District liquidated damages, as calculated by Section 9.4.C, prior to, and the District may terminate the Agreement effective on the later of: (i) the expiration of the thirty (30) days provided for in Section 9.3.A, and (ii) thirty (30) days after any mediation and judicial proceedings initiated pursuant to Sections 9.3.A and 9.3.B are resolved in favor of the District. C. The sum of liquidated damages due and payable shall be the sum total of the District ad valorem taxes for all of the Tax Years for which a tax limitation was granted pursuant to this Agreement prior to the year in which the default occurs that otherwise would have been due and payable by the Applicant to the District without the benefit of this Agreement, including penalty and interest, as calculated in accordance with Section 9.4.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!