Cyber Incident Reporting Sample Clauses

Cyber Incident Reporting. Upon discovery of a cyber incident involving CUI or CTI, the performer shall take immediate steps to mitigate any further loss or compromise. The performer shall rapidly report the incident to DARPA and provide sufficient details of the event—including identification of detected and isolated malicious software—to enable DARPA to assess the situation and provide feedback to the performer regarding further reporting and potential mitigation actions. The performer shall preserve and protect images of all known affected information systems and all relevant monitoring/packet capture data for at least 90 days from reporting the cyber incident to enable DARPA to assess the cyber incident. The performer agrees to rapidly implement security measures as recommended by DARPA and to provide to DARPA any additionally requested information to help the Parties resolve the cyber incident and to prevent future cyber incidents. All information and data covered by this Article must be reviewed and approved by DARPA prior to any public release. The DARPA public release process is governed by DARPA Instruction 65. An online form is available to support those requests at: xxxxx://xxx.xxxxx.xxx/attachments/PublicReleaseSubmissionForm10232020.pdf The performer shall include this Article in all subcontracts or lower tier agreements, regardless of tier, for work performed in support of this Agreement.
Cyber Incident Reporting. Upon discovery of a cyber incident involving CUI or CTI, the performer shall take immediate steps to mitigate any further loss or compromise. The performer shall rapidly report the incident to DARPA and provide sufficient details of the event—including identification of detected and isolated malicious software—to enable DARPA to assess the situation and provide feedback to the performer regarding further reporting and potential mitigation actions. The performer shall preserve and protect images of all known affected information systems and all relevant monitoring/packet capture data for at least 90 days from reporting the cyber incident to enable DARPA to assess the cyber incident. The performer agrees to rapidly implement security measures as recommended by DARPA and to provide to DARPA any additionally requested information to help the Parties resolve the cyber incident and to prevent future cyber incidents.
Cyber Incident Reporting. Upon discovery of a cyber incident involving CUI or CTI, the performer shall take immediate steps to mitigate any further loss or compromise. The performer shall rapidly report the incident to Northrop Grumman and provide sufficient details of the event—including identification of detected and isolated malicious software—to enable Northrop Grumman to assess the situation and provide feedback to the performer regarding further reporting and potential mitigation actions. The performer shall preserve and protect images of all known affected information systems and all relevant monitoring/packet capture data for at least 90 days from reporting the cyber incident to enable Northrop Grumman to assess the cyber incident. The performer agrees to rapidly implement security measures as recommended by SDA consistent with Performer’s Government approved security systems and to provide to Northrop Grumman any additionally requested information to help the Parties resolve the cyber incident and to prevent future cyber incidents.
Cyber Incident Reporting. Upon discovery of a cyber incident involving CUI or CTI, the performer shall take immediate steps to mitigate any further loss or compromise. The performer shall rapidly report the incident to SDA and provide sufficient details of the event—including identification of detected and isolated malicious software—to enable SDA to assess the situation and provide feedback to the performer regarding further reporting and potential mitigation actions. The performer shall preserve and protect images of all known affected information systems and all relevant monitoring/packet capture data for at least 90 days from reporting the cyber incident to enable SDA to assess the cyber incident. The performer agrees to rapidly implement security measures as recommended by SDA consistent with Performer’s Government approved security systems and to provide to SDA any additionally requested information to help the Parties resolve the cyber incident and to prevent future cyber incidents.
Cyber Incident Reporting. ‌ 10.1 The Company shall report to the Purchaser without delay and take remedial action upon discovery or awareness of cyber incidents. 10.2 Cyber incident means actions taken directly or indirectly through the use of computer networks that result in a compromise or a potential compromise, or an actual or potentially adverse effect, on an information system and/or the information residing therein. 10.3 Compromise means disclosure of information to unauthorized persons, or a violation of the security policy of a system, in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, or the copying of information to unauthorized media or external networks may have occurred. 10.4 Cyber incidents are considered cybersecurity issues. The Company shall establish and maintain a process for identifying, tracking, reviewing, reporting, and resolving cybersecurity issues. The Company shall provide all relevant information on cybersecurity issues from this process to the Purchaser without delay. Without delay for the purposes of this Section 10 means one business day or as soon as possible under the circumstances. 10.5 This Section 10 is in addition to any other requirements placed upon the Company, and does not replace or modify any other requirement.
Cyber Incident Reporting. Cyber-incident reporting shall be conducted in accordance with the aforementioned DFARS clauses.
Cyber Incident Reporting. KS Data Security shall comply with the Cyber Incident Reporting for Critical Infrastructure Act of 2022 and Kansas Statute 75-7244. KS Data Security shall report the cyber incident to Cowley County, KS not later than 24 hours after KS Data Security reasonable believes that the cyber event has occurred. The notification shall include all pertinent details regarding the breach, the potential impact on Cowley County, KS data, and any remedial actions being taken by KS Data Security. KS Data Security shall preserve data relevant to the covered cyber incident or xxxxxx payment in accordance with the procedures established in the final rule issued pursuant to the Cyber Incident Reporting for Critical Infrastructure Act of 2022.
Cyber Incident Reporting. When a cyber incident is discovered, contractors must conduct a review for evidence of compromise of covered defense information and report the to DoD at xxxx://xxxxxx.xxx.xxx and Insulation Supply Company within 72 hours. A “Cyber incident” is defined as actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein. When engaging with other suppliers that require access to covered defense information in performance of a contract, include the DFARS 252.204-7012 clause in any subcontracts, or similar contractual instruments with those suppliers.
Cyber Incident Reporting. ‌ 8.1 The NFP Organization shall report to the Purchaser without delay and take remedial action upon discovery or awareness of cyber incidents. 8.2 Cyber incident means actions taken directly or indirectly through the use of computer networks that result in a compromise or a potential compromise, or an actual or potentially adverse effect, on an information system and/or the information residing therein. 8.3 Compromise means disclosure of information to unauthorized persons, or a violation of the security policy of a system, in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object, or the copying of information to unauthorized media or external networks may have occurred. 8.4 Cyber incidents are considered cybersecurity issues. The NFP Organization shall establish and maintain a process for identifying, tracking, reviewing, reporting, and resolving cybersecurity issues. The NFP Organization shall provide all relevant information on cybersecurity issues from this process to the Purchaser without delay. Without delay for the purposes of this Section 8 means one business day or as soon as possible under the circumstances. 8.5 This Section 8 is in addition to any other requirements placed upon the NFP Organization, and does not replace or modify any other requirement.

Related to Cyber Incident Reporting

  • Accident Reporting 25.1 If You or an Authorised Driver has an Accident or if the Vehicle is stolen You must report the Accident or theft to Us within 24 hours of it occurring and fully complete an Accident/Theft report form. 25.2 If the Vehicle is stolen or if You or an Authorised Driver of the Vehicle has an Accident where: (a) any person is injured; (b) the other party has failed to stop or leaves the scene of the Accident without exchanging names and addresses; or (c) the other party appears to be under the influence of drugs or alcohol, You or the Authorised Driver must also report the theft or Accident to the Police. 25.3 If You or an Authorised Driver has an Accident You and the Authorised Driver must: (a) exchange names and addresses and telephone numbers with the other driver and drivers licence details; (b) take the registration numbers of all vehicles involved; (c) take as many photos as is reasonable showing: (i) the position of the Vehicles before they are moved for towing or salvage; (ii) the Damage to the Vehicle; (iii) the damage to any third party vehicle or property; and (iv) the general area where the Accident occurred, including any road or traffic signs; (d) obtain the names, addresses and phone numbers of all witnesses; (e) not make any admission of fault or promise to pay the other party's claim or release the other party from any liability; (f) forward all third party correspondence or court documents to Us within 7 days of receipt together with a fully completed Accident Report Form (if not already submitted); and (g) co-operate with Us in the prosecution of any legal proceedings that We may institute or defence of any legal proceedings which may be instituted against You or Us as a result of an Accident, including: (i) attending Our lawyer's office; and (ii) any Court hearing.

  • Diversity Reporting Upon request, the Contractor will report to the Department its spend with business enterprises certified by the OSD. These reports must include the time period covered, the name and Federal Employer Identification Number of each business enterprise utilized during the period, commodities and contractual services provided by the business enterprise, and the amount paid to the business enterprise on behalf of each agency purchasing under the Contract.