Cyber Security Incidents Sample Clauses

Cyber Security Incidents. The Contractor shall notify the Authority immediately as soon as it knows or believes that a Cyber Security Incident has or may have taken place and shall provide full details of the incident and any mitigation measures already taken and intended to be taken by it and (where applicable) any mitigation measures recommended by it to be taken by the Authority. Where such initial notification is not in writing, then the Contractor shall provide the Authority with a written notification setting out the details required under this paragraph 3.1 promptly and in any case within [twelve (12)] hours from the initial notification. Guidance notes: In paragraph 3.1, the Authority should consider (taking into account any obligation it may have to notify any cyber security incident) the time period within which it requires written notification of a cyber security incident. Following a Cyber Security Incident, the Contractor shall: use its best endeavours to mitigate the impact of the Cyber Security Incident; investigate the Cyber Security Incident completely and promptly, and shall keep the Authority fully informed of the progress and findings of its investigation; where required to do so, inform any applicable regulator of the Cyber Security Incident; and take any action deemed necessary by the Authority in the circumstances, including complying with any additional security measures deemed appropriate by the Authority. [The Contractor shall perform its obligations under this paragraph 3 at no additional charge to the Authority, unless it can show that the Cyber Security Incident was caused solely by an act or omission of the Authority.] Guidance notes: the Authority should consider whether paragraph 3.3 should be included in the Framework Agreement.
AutoNDA by SimpleDocs
Cyber Security Incidents. Notices and Responses
Cyber Security Incidents. 4.12.1 If we discover that The Customer Data has been lost or compromised or , we will comply with the Notifiable Data Breaches scheme under Part IIIC of the Privacy Xxx 0000 (to the extent applicable to the provision of Services to the Customer) and any other relevant laws and we will notify The Customer within 8 Business Hours after such discovery by email to the Customer’s nominated email address or by telephone to the Customer’s nominated representative, unless that notification would compromise a criminal investigation into the breach.
Cyber Security Incidents. In the event that a cyber security incident cause by a Party’s Platform puts Customer Account information at risk including, but not limited to, Distributed Denial of Service (“DDoS”) attacks, account intrusions, and loss of Personally Identifiable Information (“PII”), the responsible Party will take the following actions:
Cyber Security Incidents. 3.1 The Service Provider shall notify the Purchaser immediately as soon as it knows or believes that a Cyber Security Incident has or may have taken place and shall p rovide full details of the incident and any mitigation measures already taken and intended to b e taken by it and (where applicable) any mitigation measures recommended b y it to be taken by the Purchaser. Where such initial notification is not in writing, then the Service Provider shall provide the Purchaser with a written notification setting o ut the d etails required under this paragraph 3.1 promptly and in any case within [ twelve (12)] hours f rom the initial notification.
Cyber Security Incidents. 4.14.1 If we discover that The Customer Data has been lost or compromised or , we will comply with the Infocomm TR 62 : 2018 Guidelines for cloud outage incident response (COIR) (to the extent applicable to the provision of Services to the Customer) and any other relevant laws and we will notify The Customer within 30 minutes after such discovery by email to the Customer’s nominated email address or by telephone to the Customer’s nominated representative, unless that notification would compromise a criminal investigation into the breach.

Related to Cyber Security Incidents

  • Cyber Security Except as disclosed in the Registration Statement and the Prospectus, (x)(i) to the knowledge of the Company, there has been no security breach or other compromise of or relating to any information technology and computer systems, networks, hardware, software, data, or equipment owned by the Company or its subsidiaries or of any data of the Company’s, the Operating Partnership’s or the Subsidiaries’ respective customers, employees, suppliers, vendors that they maintain or that, to their knowledge, any third party maintains on their behalf (collectively, “IT Systems and Data”) that had, or would reasonably be expected to have had, individually or in the aggregate, a Material Adverse Effect, and (ii) the Company, the Operating Partnership and the Subsidiaries have not received any written notice of, and have no knowledge of any event or condition that would reasonably be expected to result in, any security breach or other compromise to their IT Systems and Data that had, or would reasonably be expected to have had, a Material Adverse Effect; (y) the Company, the Operating Partnership and the Subsidiaries are presently in compliance with all applicable laws or statutes and all applicable judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the protection of IT Systems and Data from a security breach or unauthorized use, access, misappropriation, modification or other compromise, except as would not, in the case of this clause (y), individually or in the aggregate, have a Material Adverse Effect; and (z) the Company, the Operating Partnership and the Subsidiaries have implemented commercially reasonable backup and disaster recovery technology.

  • Cyber Security; Data Protection The Company’s and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted and are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no material breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any material incidents under internal review or investigations relating to the same. The Company and its subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification (“Data Protection Requirements”), in each case, except for such failures as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect. To ensure compliance with the Data Protection Requirements, the Company and its subsidiaries have in place, comply with, and take appropriate steps reasonably designed to ensure compliance in all material respects with their policies and procedures relating to data privacy and security and the collection, storage, use, disclosure, handling, and analysis of Personal Data (the “Policies”). The Company and its subsidiaries have at all times made all disclosures to users or customers required by applicable laws and regulatory rules or requirements, and none of such disclosures made or contained in any Policy have, to the knowledge of the Company, been inaccurate or in violation of any applicable laws and regulatory rules or requirements in any material respect. The Company further certifies that neither it nor any subsidiary: (i) has received notice of any actual or potential liability under or relating to, or actual or potential violation of, any of the Data Protection Requirements, and has no knowledge of any event or condition that would reasonably be expected to result in any such notice; (ii) is currently conducting or paying for, in whole or in part, any investigation, remediation, or other corrective action pursuant to any Data Protection Requirement; or (iii) is a party to any order, decree, or agreement that imposes any obligation or liability by any governmental authority under any Data Protection Requirement, in each case except as would not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Perfected Security Interest On the Closing Date, after giving effect to the filing of the FAA Filed Documents and the Financing Statements, Mortgagee shall have received a duly perfected first priority security interest in all of Owner's right, title and interest in the Aircraft, subject only to Permitted Liens.

  • Perfected Security Interests (a) As of the Closing Date (or such later date as permitted under Section 5.14) and as of the date of each Borrowing, the Security Documents, taken as a whole, are effective to create in favor of the Collateral Agent for the benefit of the Secured Parties a legal, valid and enforceable first priority security interest in all of the Collateral to the extent purported to be created thereby.

  • Security for Secured Obligations This Patent Security Agreement and the Security Interest created hereby secures the payment and performance of the Secured Obligations, whether now existing or arising hereafter. Without limiting the generality of the foregoing, this Patent Security Agreement secures the payment of all amounts which constitute part of the Secured Obligations and would be owed by Grantors, or any of them, to Agent, the other members of the Lender Group, the Bank Product Providers or any of them, whether or not they are unenforceable or not allowable due to the existence of an Insolvency Proceeding involving any Grantor.

  • Grant of General Security Interest in Collateral 3.1 As security for the Obligations of Debtor, Debtor hereby grants the Collateral Agent, for the benefit of the Lenders, a security interest in the Collateral.

  • No third party Security Interests Without limiting the generality of Clause 10.6, at the time of the execution and delivery of each Finance Document:

  • Other Security To the extent that the Obligations are now or hereafter secured by property other than the Collateral or by the guarantee, endorsement or property of any other person, firm, corporation or other entity, then the Secured Party shall have the right, in its sole discretion, to pursue, relinquish, subordinate, modify or take any other action with respect thereto, without in any way modifying or affecting any of the Secured Party’s rights and remedies hereunder.

  • Collateral Account and Security Interest At any time when Fund’s assets are below $15 million, the Advisor, for value received, hereby pledges, assigns, sets over and grants to the Trust a continuing security interest in and to an account to be established and maintained by the Advisor with the Securities Intermediary and designated as a collateral account (the “Collateral Account”), including any replacement account established with any successor, together with all dividends, interest, stock-splits, distributions, profits and all cash and non-cash proceeds thereof and any and all other rights as may now or hereafter derive or accrue therefrom (collectively, the “Collateral”) to secure the payment of any required Fund Reimbursement Payment or Liquidation Expenses (as defined in Paragraph 5 of this Agreement). For so long as this Agreement is in effect, any transfers or conveyances of Collateral to any party shall require the approval of the Board of Trustees of the Trust (the “Board”), except as specified in Section 7(a)(ii) of this Agreement, below. In addition, the Trust will not issue entitlement orders, redeem or otherwise take any action with respect to the Collateral or Collateral Account unless a Collateral Event (defined below under Section 5 of this Agreement) has occurred or is continuing.

Time is Money Join Law Insider Premium to draft better contracts faster.