Data Security Breaches; Remediation of Malicious Code Sample Clauses

Data Security Breaches; Remediation of Malicious Code. (a) Data Security Breaches. Provider will monitor and record security related events on all systems and log such events. If Provider discovers or become aware of an actual Data Security Breach, Provider shall, except to the extent instructed by legal or regulatory authorities not to do so: (i) promptly notify the BTC Relationship Manager by telephone and e-mail as soon as practicable but in any event within the earlier of any of the following: (i) forty-eight (48) hours after detecting or becoming aware of such breach or (ii) within a shorter timeframe if required under a Lending Fund Law of which Provider is notified; (ii) provide confirmatory written notice to the BTC Relationship Manager as soon as practicable after detecting or becoming aware of such breach; and (iii) investigate and remediate the effects of the breach, and provide the applicable Lending Funds with reasonable assurance that safeguards consistent with Provider’s obligations under this Article 11 have been implemented.
AutoNDA by SimpleDocs
Data Security Breaches; Remediation of Malicious Code. (a) Data Security Breaches. Provider will monitor and record security related events on all systems and log such events. If Provider discovers or become aware of an actual Data Security Breach, Provider shall, except to the extent instructed by legal or regulatory authorities not to do so: Master Services Agreement CONFIDENTIAL (i) promptly notify the BFA Relationship Manager by telephone and e-mail as soon as practicable but in any event within the earlier of any of the following: (i) forty-eight (48) hours after detecting or becoming aware of such breach or (ii) within a shorter timeframe if required under a BFA Recipient Law of which Provider is notified; (ii) provide confirmatory written notice to the BFA Relationship Manager as soon as practicable after detecting or becoming aware of such breach; and (iii) investigate and remediate the effects of the breach, and provide the applicable BFA Recipients with reasonable assurance that safeguards consistent with Provider’s obligations under this Article 13 have been implemented.
Data Security Breaches; Remediation of Malicious Code. (a) Data Security Breaches. State Street will monitor and record security related events on all systems and log such events. If State Street discovers or become aware of an actual breach of security relating to BFA Data, except to the extent instructed by legal or regulatory authorities not to do so: (i) promptly notify the BFA Regional Program Manager by telephone and e-mail as soon as practicable but in any event within the earlier of any of the following: (i) 5:00 PM, local time, the next Business Day after detecting or becoming aware of such breach; (ii) forty-eight (48) hours after detecting or becoming aware of such breach; or (iii) within a shorter timeframe if required under a State Street Known Law; (ii) provider confirmatory written notice or fax to the BFA Regional Program Manager as soon as practicable after detecting or becoming aware of such breach; and (iii) investigate and remediate the effects of the breach, and provide the applicable BFA Recipients with reasonable assurance that safeguards consistent with State Street’s obligations under this Article 10 have been implemented.
Data Security Breaches; Remediation of Malicious Code 

Related to Data Security Breaches; Remediation of Malicious Code

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Investigation of Breach If the Seller (i) has knowledge of a breach of a representation or warranty made in Section 3.4, (ii) receives notice from the Depositor, the Trust, the Owner Trustee or the Indenture Trustee of a breach of a representation or warranty made in Section 3.4, (iii) receives a written request to repurchase a Receivable due to an alleged breach of a representation and warranty in Section 3.4 from the Owner Trustee, the Indenture Trustee, any Verified Note Owner or any Noteholder (which repurchase request shall provide sufficient detail so as to allow the Seller to reasonably investigate the alleged breach of the representations and warranties in Section 3.4; provided, that with respect to a repurchase request from a Noteholder or a Verified Note Owner, such repurchase request shall initially be provided to the Indenture Trustee) for a Receivable (each, a “Repurchase Request”) or (iv) receives a final report from the Asset Representations Reviewer that indicates that the Asset Representations Reviewer has determined that a test procedure under the Asset Representations Review Agreement has not been satisfied with respect to a representation or warranty set forth in Section 3.4 for a Receivable, then, in each case, the Seller will investigate the Receivable to confirm the breach and determine if the breach materially and adversely affects the interests of the Purchaser, the Issuer or the Noteholders in any Receivable. None of the Servicer, the Issuer, the Owner Trustee, the Indenture Trustee, the Asset Representations Reviewer or the Administrator will have an obligation to investigate whether a breach of any representation or warranty has occurred or whether any Receivable is required to be repurchased under this Section 3.5.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.

  • FALSE STATEMENTS; BREACH OF REPRESENTATIONS The Parties acknowledge that this Agreement has been negotiated, and is being executed, in reliance upon the information contained in the Application, and any supplements or amendments thereto, without which the Comptroller would not have approved this Agreement and the District would not have executed this Agreement. By signature to this Agreement, the Applicant: A. represents and warrants that all information, facts, and representations contained in the Application are true and correct to the best of its knowledge; B. agrees and acknowledges that the Application and all related attachments and schedules are included by reference in this Agreement as if fully set forth herein; and C. acknowledges that if the Applicant submitted its Application with a false statement, signs this Agreement with a false statement, or submits a report with a false statement, or it is subsequently determined that the Applicant has violated any of the representations, warranties, guarantees, certifications, or affirmations included in the Application or this Agreement, the Applicant shall have materially breached this Agreement and the Agreement shall be invalid and void except for the enforcement of the provisions required by Section 9.2 of this Agreement.

  • Default Breach Remedies See Addendum 13.1

  • Rectification of Safety Hazard Where, because of the existence of a safety hazard, a site has been stopped for a defined period of time and Employees sent off site by agreement between Site Managers and any combination of Union Official/s, Health and Safety Committee, those people who remain on site to do rectification work will be paid at the rate of double time for all such work.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!