Cyber Security Incident Response and Management Sample Clauses

Cyber Security Incident Response and Management. Contractor shall provide services in accordance with the following requirements and capabilities: Description - Service category to provide Cyber Security Incident Response and Management services necessary to ensure personnel at all levels respond to security incidents in a way that is rapid, compliant and thoughtful. Following are characteristics of this service category: Requirements / Capabilities • Certified Security Professionals writing plans, evaluating existing plans, documenting and recommending changes to incident response plans and related work.
AutoNDA by SimpleDocs
Cyber Security Incident Response and Management. Contractor shall provide services in accordance with the following requirements and capabilities: Description - Service category to provide Cyber Security Incident Response and Management services necessary to ensure personnel at all levels respond to security incidents in a way that is rapid, compliant and thoughtful. Following are characteristics of this service category: Requirements / Capabilities • Certified Security Professionals writing plans, evaluating existing plans, documenting and recommending changes to incident response plans and related work. Examples of Potential Statements of work: • Classifying data stored or transmitted between computing platforms (e.g. PC, servers, mainframe) and networks; • Provide incident response and related training; • Exercise/simulate incident response scenarios; • 24/7 incident response assistanceVulnerability management • Policy/procedure development; • Provide operational and analytical support related to security for computing platforms (e.g. PC, servers, and mainframe) and networks. • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate meetings • Address security and incident response issues with functional areas and management • Analyze and evaluate new and emerging security technologies as well as vendor security products for their applicability and feasibility of use in securing hardware/software IT and telecommunications resources; • Perform security audits and/or penetration testing of IT systems and applications in the context of NIST, IRS 1075, CJIS, HIPAA and so on; • Provide operational and analytical support related to security for computing platforms (e.g. PC, servers, and mainframe) and networks.

Related to Cyber Security Incident Response and Management

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Incident Response Operator shall have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of any portion of Data, including PII, and agrees to provide LEA, upon request, an executive summary of the written incident response plan.

  • Workload Management 11.1 The parties to this Agreement acknowledge that employees and management have a responsibility to maintain a balanced workload and recognise the adverse affects that excessive workloads may have on employee/s and the quality of resident/client care.

  • Collocation Transfer of Responsibility Without Working Circuits The Collocation is not serving any End User Customers and does not have active service terminations (e.g., Interconnection trunks or UNE Loops) or 2) Collocation Transfer of Responsibility With Working Circuits – The Collocation has active service terminations, such as Interconnection trunks or is serving End User Customers.

  • Incident Management 3.1. We shall notify You without undue delay after We becomes aware of any accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Customer Data, including Personal Data, stored or otherwise processed by Us or Our sub-processors of which We become aware (“Security Incident”).

  • SCOPE OF SERVICES/CASE HANDLING A. Upon execution by Xxxxxx, Attorneys are retained to provide legal services for the purpose of seeking damages and other relief in the Litigation. Client agrees that Xxxxxx may choose to associate additional law firm(s) and/or lawyer(s) to represent Client in connection with the investigation and prosecution of the rights Client has as a purchaser of publically traded securities of Xxxxxx, and Client understands that such representation shall be on the same terms as those described in this agreement.

  • Cost Responsibility for Interconnection Facilities and Distribution Upgrades 4.1 Interconnection Facilities 4.2 Distribution Upgrades

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Management Responsibility No Limited Partner, as such, shall take part in the management of the business or transact any business for the Partnership.

  • CONSTRUCTION MANAGER’S SERVICES The services which the Construction Manager shall provide include, but are not limited to, those described or specified herein. The services described or specified shall not be deemed to constitute a comprehensive specification having the effect of excluding services not specifically mentioned.

Time is Money Join Law Insider Premium to draft better contracts faster.