DATA SECURITY BREACHES AND REPORTING PROCEDURES. 5.1. The parties agree to provide reasonable assistance to each other to facilitate the handling of any data security breach in an expeditious and compliant manner.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 11.1 The Parties are under a strict obligation to notify any potential or actual losses of the Shared Personal Data to the other Party as soon as possible and, in any event, within 1 Business Day of identification of any potential or actual loss to enable the Parties to consider what action is required in order to resolve the issue in accordance with the applicable national data protection laws and guidance.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 6.1 The PAA must notify any data security breach in relation to any personal data processed by them under this Agreement to the Commissioner without undue delay and in any event no later than 24 hours after becoming aware of it, following the procedure in Schedule Two of the Agreement.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 11.1 The Data Processor is under a strict obligation to immediately notify the Data Controller of any Data Security Breach and no later than within 24 hours of the Data Processor becoming aware of the breach.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 11.1 Having considered the Privacy and Data Protection Requirements, the parties have in place their own guidance that must be followed in the event of a Data Security Breach.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. Having considered the applicable Data Protection Legislation, the parties confirm they have in place their own guidance that must be followed in the event of a Data Security Breach. Parties are under a strict obligation to notify any potential or actual losses of the Shared Personal Data or any breach of security which may compromise the security of the Shared Personal Data to the other party’s SPoC as soon as possible and, in any event, within 24 hours of identification of any potential or actual loss to enable the parties to consider what action is required in order to resolve the issue in accordance with the applicable Data Protection Legislation. The parties agree to provide reasonable assistance as is necessary to each other to facilitate the handling of any Data Security Breach in an expeditious and compliant manner. Notification of security breaches, as per clause 13.2, should be made to each party’s relevant Information Security/Information Governance team. For xx notifications should be sent to Click here to enter the email address of external organisation For SEUPB breach notifications should be sent to: xxxx.xxxxxxxxxx@xxxxx.xx
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 9.1 Having considered the applicable Data Protection Legislation, the parties confirm they have in place their own guidance that must be followed in the event of a Data Security Breach.
9.2 Notwithstanding paragraph 3.6.2 of Part 6 of the Schedule, the parties are under a strict obligation to notify any potential or actual Data Security Breach to the other party as soon as possible and, in any event, within 12 hours of identification to enable the parties to consider what action is required in order to resolve the issue in accordance with the applicable Data Protection Legislation.
9.3 The parties agree to provide reasonable assistance as is necessary to each other to facilitate the handling of any Data Security Breach in an expeditious and compliant manner. This Annex applies where the parties share the Shared Personal Data and the Academic Partner is the Data Controller and the Fundable Body is the Data Processor as set out in Section 3 of Annex A.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 10.1 SaTH and/or the IT Department are under a strict obligation to immediately notify Xxxxxx Xxxxxx of any Data Security Breach and no later than within 24 hours of SaTH and/or the IT Department becoming aware of the breach.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 11.1 Having considered the applicable PDPR and guidance, the Parties have in place their own guidance that must be followed in the event of a Data Security Breach.
DATA SECURITY BREACHES AND REPORTING PROCEDURES. 13.1 The Processor will promptly and without undue delay notify the Controller if any Personal Data is lost or destroyed or becomes damaged, corrupted, or unusable. The Processor will restore such Personal Data at its own expense.