Data Breach Response Plan Sample Clauses

Data Breach Response Plan. Within one year after the effective date of this Contract, the Academy Board shall design and implement a comprehensive data breach response plan. The data breach response plan should be made available to Academy personnel and any Educational Service Provider contracting with the Academy. The data breach response plan should be updated periodically by the Academy Board to address changes in data threat assessments and changes in applicable state and federal privacy laws.
AutoNDA by SimpleDocs
Data Breach Response Plan. After it becomes aware of or suspects that any PII received from IDE has been subject to a Confidential Information Breach, IVRS shall (i) notify IDE of such Confidential Information Breach as soon as practicable, but no more than 24 hours after discovery of the Confidential Information Breach and (ii) promptly investigate the Confidential Information Breach and provide IDE with detailed information about the Confidential Information Breach. Unless the parties agree otherwise, IVRS shall be responsible, at its expense, for notifying affected individuals of the Confidential Information Breach as required by law (including but not limited to Iowa Code Chapter 715C) or as mutually agreed upon by the parties. IVRS shall, at its expense, take reasonable steps to mitigate the effects and to minimize any damage resulting from the Confidential Information Breach. Such steps shall include when appropriate a credit monitoring or protection plan. The credit monitoring or protection plan shall include, but is not limited to, reimbursement for the full cost of commencing a security freeze, temporary suspension, or removal of a security freeze per credit file pursuant to Iowa Code Section 714G.5 and shall cover a length of time commensurate with the circumstances of the Confidential Information Breach. The foregoing obligations may be delayed or waived if a law enforcement agency determines that the performance of the obligations would impede a criminal investigation.
Data Breach Response Plan. 6.2.1. If the Licensee becomes aware of an actual, or potential, eligible data breach, the Licensee shall immediately notify Compsys and provide Compsys with the following details: (a) The nature of the data breach; (b) The type and sensitivity of the information involved in the data breach; (c) Remedial action that has been taken in response to the data breach; (d) Any security measures in place to protect the data; (e) The nature of the harm that may arise as a result of the data breach; and (f) Any other relevant matters. Where possible, Compsys will endeavour to work with the Licensee to take remedial action to prevent serious harm from eventuating to the individual/s the subject of the data. 6.2.2. Alternatively, if Compsys becomes aware of an eligible data breach in respect of the Licensee’s data, Compsys may notify the Licensee and, where possible, work with the Licensee to take remedial action to prevent serious harm from eventuating to the individual/s the subject of the data. 6.2.3. Where an eligible data breach has occurred, Compsys shall determine which party is responsible for the data breach and allocate responsibility for notification of the data breach to the individual/s the subject of the data and/or OAIC. 6.2.4. As a general rule, a party will be deemed responsible for the data breach where that party’s employee/s or premises have: 6.2.4.1. lost, or have been the subject of a theft of, laptops, removable storage devices, or paper records containing personal information; 6.2.4.2. disposed of hard disk drives and other digital storage media without the contents first being erased; 6.2.4.3. accessed or disclosed personal information outside the requirements of authorisation of their employment; 6.2.4.4. had paper records stolen from insecure recycling or garbage bins; 6.2.4.5. mistakenly provided personal information to the wrong person, for example, an email was sent to the wrong address; 6.2.4.6. has been deceived into improperly releasing the personal information of another person; and 6.2.4.7. any other scenario that Compsys deems the responsibility of the Licensee. 6.2.5. Compsys will also be deemed responsible for a data breach where its database/s containing personal information are hacked into or otherwise illegally accessed by individuals outside of the Compsys organisation. 6.2.6. The party Compsys deems responsible for the data breach has the responsibility of reporting the breach to: 6.2.6.1. the individual the subject of the in...

Related to Data Breach Response Plan

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article

  • BREACH DISCOVERY AND NOTIFICATION 17 1. Following the discovery of a Breach of Unsecured PHI, CONTRACTOR shall notify 18 COUNTY of such Breach, however both parties agree to a delay in the notification if so advised by a 19 law enforcement official pursuant to 45 CFR § 164.412. 20 a. A Breach shall be treated as discovered by CONTRACTOR as of the first day on which 21 such Breach is known to CONTRACTOR or, by exercising reasonable diligence, would have been 22 known to CONTRACTOR. 23 b. CONTRACTOR shall be deemed to have knowledge of a Breach, if the Breach is 24 known, or by exercising reasonable diligence would have known, to any person who is an employee, 25 officer, or other agent of CONTRACTOR, as determined by federal common law of agency. 26 2. CONTRACTOR shall provide the notification of the Breach immediately to the COUNTY 27 Privacy Officer. CONTRACTOR’s notification may be oral, but shall be followed by written 28 notification within twenty four (24) hours of the oral notification. 29 3. CONTRACTOR’s notification shall include, to the extent possible: 30 a. The identification of each Individual whose Unsecured PHI has been, or is reasonably 31 believed by CONTRACTOR to have been, accessed, acquired, used, or disclosed during the Breach; 32 b. Any other information that COUNTY is required to include in the notification to 33 Individual under 45 CFR §164.404 (c) at the time CONTRACTOR is required to notify COUNTY or 34 promptly thereafter as this information becomes available, even after the regulatory sixty (60) day 35 period set forth in 45 CFR § 164.410 (b) has elapsed, including: 36 1) A brief description of what happened, including the date of the Breach and the date 37 of the discovery of the Breach, if known; 1 2) A description of the types of Unsecured PHI that were involved in the Breach (such 2 as whether full name, social security number, date of birth, home address, account number, diagnosis, 3 disability code, or other types of information were involved); 4 3) Any steps Individuals should take to protect themselves from potential harm 5 resulting from the Breach; 6 4) A brief description of what CONTRACTOR is doing to investigate the Breach, to 7 mitigate harm to Individuals, and to protect against any future Breaches; and 8 5) Contact procedures for Individuals to ask questions or learn additional information, 9 which shall include a toll-free telephone number, an e-mail address, Web site, or postal address. 10 4. COUNTY may require CONTRACTOR to provide notice to the Individual as required in 11 45 CFR § 164.404, if it is reasonable to do so under the circumstances, at the sole discretion of the 12 COUNTY. 13 5. In the event that CONTRACTOR is responsible for a Breach of Unsecured PHI in violation 14 of the HIPAA Privacy Rule, CONTRACTOR shall have the burden of demonstrating that 15 CONTRACTOR made all notifications to COUNTY consistent with this Subparagraph F and as 16 required by the Breach notification regulations, or, in the alternative, that the acquisition, access, use, or 17 disclosure of PHI did not constitute a Breach. 18 6. CONTRACTOR shall maintain documentation of all required notifications of a Breach or 19 its risk assessment under 45 CFR § 164.402 to demonstrate that a Breach did not occur. 20 7. CONTRACTOR shall provide to COUNTY all specific and pertinent information about the 21 Breach, including the information listed in Section E.3.b.(1)-(5) above, if not yet provided, to permit 22 COUNTY to meet its notification obligations under Subpart D of 45 CFR Part 164 as soon as 23 practicable, but in no event later than fifteen (15) calendar days after CONTRACTOR’s initial report of 24 the Breach to COUNTY pursuant to Subparagraph F.2. above. 25 8. CONTRACTOR shall continue to provide all additional pertinent information about the

  • Optional Xactimate Response Attachment (Part 2)

  • Employee Response The employee upon whom a Notice of Proposed Action has been served shall have seven (7) calendar days to respond to the appointing authority either orally or in writing before the proposed action may be taken. Upon request of the employee and for good cause, the appointing authority may extend in writing the period to respond. If the employee's response is not filed within seven (7) days or during an extension, the right to respond is lost.

  • Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.

  • Notification of personal data breach 1. In case of any personal data breach, the data processor shall, without undue delay after having become aware of it, notify the data controller of the personal data breach. 2. The data processor’s notification to the data controller shall, if possible, take place within 24 hours after the data processor has become aware of the personal data breach to enable the data controller to comply with the data controller’s obligation to notify the personal data breach to the competent supervisory authority, cf. Article 33

  • Failure to Respond If you fail to respond by the date given above, your application will be refused under Section 3A(4)(a) of the Registered Designs Act 1949.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!