Cyber Security Incidents Sample Clauses

Cyber Security Incidents. The Contractor shall notify the Authority immediately as soon as it knows or believes that a Cyber Security Incident has or may have taken place and shall provide full details of the incident and any mitigation measures already taken and intended to be taken by it and (where applicable) any mitigation measures recommended by it to be taken by the Authority. Where such initial notification is not in writing, then the Contractor shall provide the Authority with a written notification setting out the details required under this paragraph 3.1 promptly and in any case within [twelve (12)] hours from the initial notification. Guidance notes: In paragraph 3.1, the Authority should consider (taking into account any obligation it may have to notify any cyber security incident) the time period within which it requires written notification of a cyber security incident. Following a Cyber Security Incident, the Contractor shall: use its best endeavours to mitigate the impact of the Cyber Security Incident; investigate the Cyber Security Incident completely and promptly, and shall keep the Authority fully informed of the progress and findings of its investigation; where required to do so, inform any applicable regulator of the Cyber Security Incident; and take any action deemed necessary by the Authority in the circumstances, including complying with any additional security measures deemed appropriate by the Authority. [The Contractor shall perform its obligations under this paragraph 3 at no additional charge to the Authority, unless it can show that the Cyber Security Incident was caused solely by an act or omission of the Authority.] Guidance notes: the Authority should consider whether paragraph 3.3 should be included in the Framework Agreement.
AutoNDA by SimpleDocs
Cyber Security Incidents. Notices and Responses a. In addition to any notice required under this Contract, Contractor agrees to notify TVA immediately at (000) 000-0000 and then immediately thereafter by providing a written communication to TVA at XXXXXXXXXXXXX@XXX.XXX, whenever Contractor knows or reasonably believes that an act or omission by any source has compromised or may adversely affect or breach: (i) the cybersecurity of any Materials containing IT Work, or (ii) the physical, technical, administrative, or organizational safeguards protecting Contractor's Information Systems (any of the foregoing, a “Compromise”).‌ b. Within seven days of notifying TVA of the Compromise, Contractor shall recommend actions that TVA should take on TVA Cyber Assets to reduce the risk of a recurrence of the same or a similar Compromise, including, as appropriate, the provision of action plans and mitigating controls. Unless TVA or its agents negligently caused the Compromise, Contractor is responsible for developing and implementing those action plans and mitigating controls, at its expense. Regardless of the cause(s) of the Compromise, Contractor shall coordinate with TVA in implementing the action plans and mitigating controls. In addition, Contractor will provide TVA guidance and recommendations for long-term remediation of any cyber security risks posed to TVA Cyber Assets, and any information necessary to assist TVA in any of its recovery efforts in response to a Compromise.
Cyber Security Incidents. 4.12.1 If we discover that The Customer Data has been lost or compromised or , we will comply with the Notifiable Data Breaches scheme under Part IIIC of the Privacy Xxx 0000 (to the extent applicable to the provision of Services to the Customer) and any other relevant laws and we will notify The Customer within 8 Business Hours after such discovery by email to the Customer’s nominated email address or by telephone to the Customer’s nominated representative, unless that notification would compromise a criminal investigation into the breach. 4.12.2 When we are in possession of evidence of criminal activity associated with the breach (such as evidence of hacker activity) we will notify appropriate law enforcement agencies. 4.12.3 We receive a request for information under clause 4.4.3 we will notify The Customer of this request unless otherwise requested by the law enforcement agency. 4.12.4 Upon the occurrence of a Cyber Security Incident pertaining to Zettagrid Data: a) Xxxxxxxxx shall propose and provide The Customer with all remedial actions Zettagrid intends to take in order to mitigate the consequences and/or impacts associated with the Security Incident; b) Zettagrid shall provide updates to The Customer on the status of the Security Incident and remediation efforts; The cadence of status updates will be determined by the severity of the Security Incident but will be not less than 30 minutes; and c) assist The Customer in complying with its notification and information disclosure obligations about the Security Incident under the applicable laws (including to the relevant Regulatory Authority and affected organisations and/or Individuals). 4.12.5 All Customer specific information concerning the Security Incident shall be deemed to be The Customer’s confidential information. Zettagrid shall not disclose any information regarding the Security Incident without The Customer’s prior written consent. 4.12.6 Zettagrid acknowledges and agrees that The Customer and Xxxxxxxxx may be subject to investigations by a Regulatory Authority arising out of or in connection with any Security Incident. In such event, Zettagrid shall provide The Customer and/or the Regulatory Authority with full access to and copies of all relevant evidence including logs and audit trails. 4.12.7 The Customer may report a Security Incident or request further Security Handling information by contacting Support. 4.12.8 Security Incidents may be tracked on xxxxx://xxxxxxx.xxxxxxxxx.xxx
Cyber Security Incidents. 3.1 The Service Provider shall notify the Purchaser immediately as soon as it knows or believes that a Cyber Security Incident has or may have taken place and shall p rovide full details of the incident and any mitigation measures already taken and intended to b e taken by it and (where applicable) any mitigation measures recommended b y it to be taken by the Purchaser. Where such initial notification is not in writing, then the Service Provider shall provide the Purchaser with a written notification setting o ut the d etails required under this paragraph 3.1 promptly and in any case within [ twelve (12)] hours f rom the initial notification. 3.2 Following a Cyber Security Incident, the Service Provider shall: (a) use its best endeavours to mitigate the impact of the Cyber Security Incident; (b) investigate the Cyber Security Incident completely and promptly, and shall keep the Purchaser fully informed of the progress and findings of its investigation; (c) where required to do so, inform any applicable regulator of the Cyber Security Incident; and (d) take any action deemed necessary by the Purchaser in the circumstances, including complying with any additional security measures deemed appropriate by the Purchaser.
Cyber Security Incidents. In the event that any of Escrow Agent, Seller, or Purchaser experiences a Cyber Security Incident (defined below) on or prior to the Closing Date, such affected party shall promptly, and in any event not less than two (2) Business Days after the incident, notify each other party to this Agreement of such Cyber Security Incident. In the event that (I) a bank or other financial institution holding funds that are to be used in the transaction Purchase and Sale Agreement Des Xxxxx Corners
Cyber Security Incidents. In the event that a cyber security incident cause by a Party’s Platform puts Customer Account information at risk including, but not limited to, Distributed Denial of Service (“DDoS”) attacks, account intrusions, and loss of Personally Identifiable Information (“PII”), the responsible Party will take the following actions: 27.2.1. Immediately notify the other Party upon its confirmation that its Platform was subject to a cyber security incident to allow the other Party to take reasonable efforts on its end to contain the cyber security threat and provide any notification as required under Applicable Law. 27.2.2. Conduct a post mortem review of the issue and provide the other Party with a summary of the post mortem review and the steps taken to contain and remediate the cyber security threat.

Related to Cyber Security Incidents

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Error Incident An Error Incident is a single or series of NAV Errors that results from the same act, omission, or use of incorrect data. NAV Errors will be corrected as follows: · If an NAV Error is less than ½ of 1% of NAV and results in a Net Benefit, the fund will retain the benefit. · If an NAV Error is less than ½ of 1% of NAV and results in a Net Loss, the Net Loss will be paid to the fund by the party responsible for causing the NAV Error. · In the case of a Material NAV Error, shareholder transactions/accounts will be corrected/ reprocessed at the corrected (restated) NAV, subject to a $10 per-account correction minimum threshold; any residual Net Benefit after correction of shareholder accounts will be retained by the fund and any residual Net Loss (resulting from uncorrected accounts below the $10 minimum threshold) will be paid to the fund by the party responsible for causing the error. If an NAV error is not caused by either the fund accounting agent or TRP, both TRP and the fund accounting agent will provide all reasonable assistance to the fund in its attempt to recover all costs from the responsible third party. · Notwithstanding any contractual provisions to the contrary, to the extent a NAV Error was caused by the actions or omissions of the fund’s accounting agent, any Net Loss or residual Net Loss equal to $5,000 or less that results from the same Error Incident will be paid by the accounting agent. TRP will be responsible for summarizing and reporting to the funds’ Audit Committee or Trust Company’s Board (or designated committee), as applicable, all NAV Errors related to the funds/trusts in conjunction with other relevant error statistics on a quarterly basis. The report will include corrected NAV Errors as well as the aggregate effect of any uncorrected NAV Errors. The report will also include information about shareholder accounts that were corrected in the discretion of TRP in the case of an NAV Error that is not a Material NAV Error. The funds’ Audit Committee and the Trust Company’s Board shall have the authority to adjust these procedures with respect to the funds and trusts, respectively, to the extent necessary or desirable to address NAV Errors by providing notice thereof to TRP and the fund’s accounting agent.

  • Reporting Incidents The Interconnection Parties shall report to each other in writing as soon as practical all accidents or occurrences resulting in injuries to any person, including death, and any property damage arising out of the Interconnection Service Agreement.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Significant Incidents In addition to notifying the appropriate authorities, Grantee will submit notice to the SUD email box, XxxxxxxxxXxxxx.Xxxxxxxxx@xxxx.xxxxx.xx.xx and Substance Use Xxxxxxxx@xxxx.xxxxx.xx.xx significant incidents involving substantial disruption of Grantee’s program operation or affecting or potentially affecting the health, safety or welfare of the System Agency funded clients or participants within three (3) calendar days of discovery.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!