Cyber Breach Sample Clauses

Cyber Breach. Buyer shall implement and maintain commercially reasonable physical and cybersecurity safeguards and security mechanisms to protect the confidentiality and integrity of Seller's non-public data and the systems that house or handle such data. Buyer shall immediately notify Seller of: (1) any unauthorized possession, unauthorized disclosure, or unauthorized use of, loss, or any other potential corruption, compromise, or destruction of any of Seller's non-public data, or the systems thathouse or handle that data; (2) the effect of such use or possession; and (3) the corrective action taken in response thereto. Buyer acknowledges that Seller may be required to notify its customers, regulators, and/or employees of such security incidents and agrees to assist and cooperate with Seller with any investigation, disclosures to affected parties, and other remedial measures, in each case, as reasonably requested by Seller or required by any applicable regulations or privacy laws
Cyber Breach. Consultant shall have a plan and adequate resources to address telecommunications and computer systems breach, and shall maintain intrusion detection services and procedures and/or data breaching systems to detect and address "hacking" and "phishing operations" into the Consultant's telecommunications system, that includes services and systems to detect any unauthorized access to or unauthorized activity on the Consultant’s telecommunications system, networks, computer systems, and network devices associated with the use of and access to the County's management systems, databases, and County information and data. Consultant will ensure that all intrusion detection measures and data breach systems are maintained and functional on a regular basis. Intrusion detection services and data breach systems shall include, at minimum, network-based intrusion detection and active monitoring of appropriate computer system access logs. Consultant shall notify the County, as soon as reasonably possible, of its detection of any potential or suspected intrusions that may affect the County with regard to disbursement of payments or access to County systems, networks, data, or information. Failure by Consultant to provide this notification shall be a breach under the contract. Consultant shall be liable for all costs and damages to the County related to or arising from the breach of Consultant’s telecommunications systems, networks, or computer systems. Consultant shall provide the County a historical record of prior breaches of security or intrusions, including all prior incidents of "hacking," that have previously been detected in the Consultant 's system. The parties hereto have set their hands and seal this day of , 2022. Franklin County Board of Commissioners: Forensic Pathology Services, LLC d/b/a/ Forensic Pathology Staffing (FPS) By: ▇▇▇▇▇ ▇. ▇▇▇▇▇▇▇, President By: ▇▇▇▇ ▇’▇▇▇▇▇, Commissioner By: ▇▇▇▇▇ ▇. ▇▇▇▇▇, Commissioner By: ▇. ▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇, Chief Executive Officer Date: 9/22/2022 | 2:39 PM EDT APPROVED AS TO FORM: APPROVED AS TO FORM: ▇. ▇▇▇▇ ▇▇▇▇▇ ▇▇▇▇▇ ▇. ▇▇▇▇▇-▇▇▇▇▇▇▇▇ Prosecuting Attorney Director, Purchasing Department Franklin County, Ohio Franklin County, Ohio By: Assistant Prosecuting Attorney Date: 9/22/2022 | 4:18 PM EDT By: Purchasing Director Date:9/22/2022 | 4:14 PM EDT STATE OF _ COUNTY/PARISH OF duly sworn, deposes and says that they are (President, Secretary, etc.) of , the party who made the foregoing bids; that such party as Consultant doe...
Cyber Breach. Vendor shall have a plan and adequate resources to address telecommunications and computer systems breach, and shall maintain intrusion detection services and procedures and/or data breaching systems to detect and address "hacking" and "phishing operations" into the Vendor's telecommunications system, that includes services and systems to detect any unauthorized access to or unauthorized activity on the Vendor’s telecommunications system, networks, computer systems, and network devices associated with the use of and access to the County's management systems, databases, and County information and data. Vendor will ensure that all intrusion detection measures and data breach systems are maintained and functional on a regular basis. Intrusion detection services and data breach systems shall include, at minimum, network-based intrusion detection and active monitoring of appropriate computer system access logs. Vendor shall notify the County, as soon as reasonably possible, of its detection of any potential or suspected intrusions that may affect the County with regard to disbursement of payments or access to County systems, networks, data, or information. Failure by Vendor to provide this notification shall be a breach under the Contract. Vendor shall be liable for all costs and damages to the County related to or arising from the breach of Vendor’s telecommunications systems, networks, or computer systems. Vendor shall provide the County a historical record of prior breaches of security or intrusions, including all prior incidents of "hacking," that have previously been detected in the Vendor 's system.
Cyber Breach. The Contractor shall be liable, without limitation, for damages arising out of a cyber breach. “Cyber breach” means a breach resulting in actual or potential harm to the AOC’s network, hardware, software, or other information systems.

Related to Cyber Breach

  • Other Breaches The breach by such Borrower (other than a breach which constitutes a Default with respect to such Borrower under another Section of this Article VII) of any of the terms or provisions of this Agreement which is not remedied within 15 days (or, in the case of Section 6.9, five Business Days) after the chief executive officer, the chief financial officer, the President, the Treasurer or any Assistant Treasurer of such Borrower obtains actual knowledge of such breach.

  • Other Breach Under Agreement A default occurs under any other term or condition of this Agreement not specifically referred to in this Article. This includes any failure or anticipated failure by the Borrower (or any other party named in the Covenants section) to comply with the financial covenants set forth in this Agreement, whether such failure is evidenced by financial statements delivered to the Bank or is otherwise known to the Borrower or the Bank.

  • Winter Break The Resident may apply to occupy a Room during the Winter Break period as detailed in Table 2. Winter Break applications will be made available to Residents by the Manager. Applications are due on or before December 1 at 5:00 p.m. If the Resident’s application is approved, they may be required to pay a small fee (detailed in Table 2) for Winter Break occupancy before the beginning of the Winter Break. During the Winter Break there is limited supervision of the Residence, all services are reduced or suspended, and annual maintenance and renovations may occur. To ensure the safety and security of the Resident and the Residence facilities it is the intention of the Manager to limit the number of Residents staying during the Winter Break to a small number of individuals that demonstrate a significant need for Residence accommodations. If the Resident is found occupying a Room during the Winter Break without having given written notice to the Manager, the Resident shall be subject to $30.00 for each day during the Winter Break period or $200.00 for the entire Winter Break, due immediately. Academic Year 2024-2025 December 14, 2024 January 5, 2025 $30.00/per day

  • For Breach A Party may terminate this Agreement for cause if it provides 30 days written notice of the breach to the other Party, and the breach remains uncured at the end of 30 days. If Agency terminates this Agreement due to Axon’s uncured breach, Axon will refund prepaid amounts on a prorated basis based on the effective date of termination.

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide ▇▇▇, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from ▇▇▇’s use of the Service, Provider shall cooperate with ▇▇▇ to the extent necessary to expeditiously secure Student Data.