Data Breach Reporting Sample Clauses

Data Breach Reporting. The Alabama Department of Revenue is committed to fighting stolen identity refund fraud. You must adhere to the IRS e-File Security, Privacy and Business Standards Mandated as of January 1, 2010. This mandate requires reporting security incidents as soon as possible, but no later than the next business day after the confirmation of the incident. The Alabama Department of Revenue must be notified within 48 hours if at any time it is discovered that your system (or any third party system holding or with access to your taxpayer data) has been breached or compromised exposing taxpayer personal information and/or user id information – including but not limited to SSNs, user names, and passwords. You are hereby obligated to notify the Alabama Department of Revenue within 48 hours of the discovery of the breach. Notice must be made directly to the e-File Coordinator in addition to submitting the affected accounts through the leads reporting process. Failure to notify the Department could result in your software being blocked from the electronic filing of Alabama returns.
AutoNDA by SimpleDocs
Data Breach Reporting. 10.1 The Licensee must, as soon as reasonably practicable, after becoming aware that there has been an Eligible Data Breach, or that there are reasonable grounds to suspect or believe that there may have been, or has been, an Eligible Data Breach: 10.1.1 notify Hostplus of the known, suspected or believed Eligible Data Breach; and 10.1.2 provide all details of the Eligible Data Breach to Hostplus to enable it to consider the nature and extent of the Eligible Data Breach. 10.2 Before notifying third parties of the Eligible Data Breach, the Licensee must provide Hostplus with a copy of the proposed notice.
Data Breach Reporting. 8.1. In the event of a Data Breach, Avature will promptly notify Customer, however no later than twenty-four (24) hours of detection by Avature. Avature will provide updates every four (4) hours on the security incident via the Customer Service Portal. Avature will provide a root cause analysis to Customer upon the completion of its post event analysis of the incident. 8.2. If a Data Breach affects the privacy of Personal Data contained in Customer Data regulated by any relevant regulatory body, Avature agrees to coordinate any communication to affected individuals according to a process mutually agreed upon between Avature and Customer. 8.3. Customer shall be responsible for complying with all legally required notifications to Regulators regarding a Data Breach and Avature shall provide all necessary cooperation and information. Avature shall not disclose that a Data Breach has or may have affected Customer's data nor make any public announcements stating Customer's data has been affected by a Data Breach or otherwise naming Customer or using Customer's name, trademark or logo without Customer's prior written approval.
Data Breach Reporting. All software providers executing this agreement are subject to the data breach security laws and/or regulations of the GADOR, including but not limited to provisions regarding who must comply with the law, definitions ofpersonally identifiable information”, what constitutes a breach, requirements for notice, and any exemptions. For detailed information on data breach see below links. Official Text — Georgia Senate Xxxx SB 230/AP(2005)
Data Breach Reporting. If Contractor determines that a breach of data has occurred that may involve CALNET Customer data, the nature and scope of the breach (as it affects Customer data) shall be reported to both the Customer and the CALNET CMO within 24 hours of that determination.
Data Breach Reporting. Should the Receiving Party suspect unauthorized disclosure of or access to Disclosing Party confidential information, the Receiving Party shall immediately report the incident to the Disclosing Party’s Service Desk: XXX.XxxxxxxXxxx@xxx.xxxxxxxxx.xxx; (000) 000-0000.

Related to Data Breach Reporting

  • Accident Reporting 25.1 If You or an Authorised Driver has an Accident or if the Vehicle is stolen You must report the Accident or theft to Us within 24 hours of it occurring and fully complete an Accident/Theft report form. 25.2 If the Vehicle is stolen or if You or an Authorised Driver of the Vehicle has an Accident where: (a) any person is injured; (b) the other party has failed to stop or leaves the scene of the Accident without exchanging names and addresses; or (c) the other party appears to be under the influence of drugs or alcohol, You or the Authorised Driver must also report the theft or Accident to the Police. 25.3 If You or an Authorised Driver has an Accident You and the Authorised Driver must: (a) exchange names and addresses and telephone numbers with the other driver and drivers licence details; (b) take the registration numbers of all vehicles involved; (c) take as many photos as is reasonable showing: (i) the position of the Vehicles before they are moved for towing or salvage; (ii) the Damage to the Vehicle; (iii) the damage to any third party vehicle or property; and (iv) the general area where the Accident occurred, including any road or traffic signs; (d) obtain the names, addresses and phone numbers of all witnesses; (e) not make any admission of fault or promise to pay the other party's claim or release the other party from any liability; (f) forward all third party correspondence or court documents to Us within 7 days of receipt together with a fully completed Accident Report Form (if not already submitted); and (g) co-operate with Us in the prosecution of any legal proceedings that We may institute or defence of any legal proceedings which may be instituted against You or Us as a result of an Accident, including: (i) attending Our lawyer's office; and (ii) any Court hearing.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!