DATA SECURITY BREACHES AND REPORTING PROCEDURES Sample Clauses

DATA SECURITY BREACHES AND REPORTING PROCEDURES. 5.1. The parties agree to provide reasonable assistance to each other to facilitate the handling of any data security breach in an expeditious and compliant manner. 5.2. The parties should notify any relevant potential or actual losses of the Shared Personal Data and remedial steps taken as soon as possible, to enable the parties to consider what further action is required either individually or jointly. The e-mail address to send a notification about a (possible) breach to Bolt is xxxxxxx@xxxx.xx.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 11.1 The Parties are under a strict obligation to notify any potential or actual losses of the Shared Personal Data to the other Party as soon as possible and, in any event, within 1 Business Day of identification of any potential or actual loss to enable the Parties to consider what action is required in order to resolve the issue in accordance with the applicable national data protection laws and guidance. 11.2 Clause 11.1 also applies to any breaches of security which may compromise the security of the Shared Personal Data. 11.3 The Parties agree to provide reasonable assistance as is necessary to each other to facilitate the handling of any Data Security Breach in an expeditious and compliant manner.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 6.1 The PAA must notify any data security breach in relation to any personal data processed by them under this Agreement to the Commissioner without undue delay and in any event no later than 24 hours after becoming aware of it, following the procedure in Schedule Two of the Agreement. 6.2 The PAA shall assist the Commissioner in relation to the Commissioner’s obligation to notify any data security breach to the ICO and with communication of a personal data breach to a Data Subject.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 11.1 The Parties shall notify any potential or actual losses of the Shared Personal Data to the other Party as soon as possible and, in any event, within 1 Business Day of identification of any potential or actual loss to enable the Parties to consider what action is required in order to resolve the issue in accordance with the applicable national data protection laws and guidance. 11.2 Clause 11.1 also applies to any breaches of security which may compromise the security of the Shared Personal Data. 11.3 The Parties agree to provide reasonable assistance as is necessary to each other to facilitate the handling of any Data Security Breach in an expeditious and compliant manner.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. ‌ 11.1 Having considered the Privacy and Data Protection Requirements, the parties have in place their own guidance that must be followed in the event of a Data Security Breach. 11.2 Parties are under a strict obligation to notify any potential or actual losses of the Shared Personal Data to the relevant SPoC or each and every SPoC, where applicable, as soon as possible and, in any event, within 24 hours of identification of any potential or actual loss to enable the parties to consider what action is required in order to resolve the issue in accordance with the Privacy and Data Protection Requirements. 11.3 Clause 11.1 also applies to any breaches of security which may compromise the security of the Shared Personal Data. 11.4 The parties agree to provide reasonable assistance as is necessary to each other to facilitate the handling of any Data Security Breach in an expeditious and compliant manner.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 9.1. The Data Processor is under a strict obligation to notify the Data Controller and the Data Controller’s Key Contact of any potential or actual losses of the Shared Personal Data as soon as possible and, in any event, within 24 hours of identification of any Data Security Breach. Such notification shall: 9.1.1. be made irrespective of any requirement to notify the Data Protection Authority or any Supervisory Authority or Data Subject(s); and 9.1.2. contain such information necessary, in the opinion of the Data Controller, to assist the Data Controller with its legal and investigatory obligations and requirements. 9.2. Immediately following any accidental, unauthorised or unlawful Shared Personal Data processing or Data Security Breach, the parties will co-ordinate with each other to investigate the matter and the Data Processor will reasonably co-operate with the Data Controller at no additional cost to the Data Controller, in the Data Controller’s handling of the matter. 9.3. The Data Processor will not inform any third-party, save for its insurer, of any accidental, unauthorised or unlawful processing of all or part of the Shared Personal Data and/or a Data Security Breach without first obtaining the Data Controller’s written consent, except when required to do so by Applicable Law. 9.4. The Data Processor agrees that the Data Controller has the sole right to determine: 9.4.1. whether to provide notice, and the method of such notice, of the accidental, unauthorised or unlawful processing and/or any Data Security Breach to any Data Subjects, the Data Protection Authority or any other regulators, law enforcement agencies or others; and 9.4.2. whether to offer any type of remedy to affected Data Subjects, including the nature and extent of such remedy. 9.5. The Data Processor will also reimburse the Data Controller for reasonable expenses that the Data Controller incurs when responding to an incident of accidental, unauthorised or unlawful processing and/or a Data Security Breach to the extent that the Data Processor caused such Data Security Breach, including all costs of notices and any remedy as set out in Clause 9.4.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 11.1 The Parties are under a strict obligation to notify any potential or actual losses of the Shared Personal Data to the other Party as soon as possible and, in any event, within 1 Business Day of identification of any potential or actual loss to enable the Parties to consider what action is required in order to resolve the issue in accordance with the applicable Data Protection Legislation.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 11.1 The Data Processor is under a strict obligation to immediately notify the Data Controller of any Data Security Breach and no later than within 24 hours of the Data Processor becoming aware of the breach. 11.2 In the event of a Data Security Breach, the Data Processor is required to provide the Data Controller with the information detailed in Schedule 3. 11.3 The Data Processor agrees to provide any reasonable assistance as is required by the Data Controller or the Data Protection Authority to facilitate the handling of any Data Security breach in an expeditious and compliant manner.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. Having considered the applicable Data Protection Legislation, the parties confirm they have in place their own guidance that must be followed in the event of a Data Security Breach. Parties are under a strict obligation to notify any potential or actual losses of the Shared Personal Data or any breach of security which may compromise the security of the Shared Personal Data to the other party’s SPoC as soon as possible and, in any event, within 24 hours of identification of any potential or actual loss to enable the parties to consider what action is required in order to resolve the issue in accordance with the applicable Data Protection Legislation. The parties agree to provide reasonable assistance as is necessary to each other to facilitate the handling of any Data Security Breach in an expeditious and compliant manner. Notification of security breaches, as per clause 13.2, should be made to each party’s relevant Information Security/Information Governance team. For xx  notifications should be sent to Click here to enter the email address of external organisation For SEUPB breach notifications should be sent to: xxxx.xxxxxxxxxx@xxxxx.xx
DATA SECURITY BREACHES AND REPORTING PROCEDURES. ‌ 16 The parties agree to provide reasonable assistance to each other to facilitate the handling of any Data Security Breach in an expeditious and compliant manner.