Data Security; Incident Notification Sample Clauses

Data Security; Incident Notification. The Parties acknowledge and agree to implement commercially reasonable measures to protect the confidentiality, integrity, and availability of all information and records pertaining to education records, as well as any information identified as confidential or sensitive by one party or the other. In the event a party experiences a security incident or breach that involves education records, that party shall inform the other party within 48 hours of its discovery and it shall conduct a reasonable prompt investigation of the same. To the extent that any such breach of security incident requires notification to any individuals under applicable law, the party experiencing the breach of security incident shall bear all reasonable costs associated therewith.
AutoNDA by SimpleDocs
Data Security; Incident Notification. If ADP becomes aware of a security breach (as defined in any applicable law) or any other event that compromises the security, confidentiality or integrity of Client's Personal Information (an "Incident"), ADP will take appropriate actions to contain, investigate and mitigate the Incident. In the event that applicable law requires notification to individuals and others of such an Incident, ADP will take additional mitigation steps including providing assistance with the drafting and mailing of such notifications. ADP and Client shall mutually agree on the content and timing of any such notifications, in good faith and as needed to meet applicable legal requirements.
Data Security; Incident Notification. If a party (Security Notifying Party) becomes aware of a Data Security Incident the Security Notifying Party must:
Data Security; Incident Notification. Greatland uses commercially reasonable efforts to ensure that its information systems are protected against security risks and vulnerabilities that the Software contains no “computer viruses” or “time bombs” as those terms are commonly understood in the information processing industry. Greatland also uses commercially reasonable efforts to protect your Confidential Information consistent with applicable federal and state laws and regulations. Additional details about Greatland’s security practices and safeguards are available at xxxxx://xxx.xxxxxxxxx.xxx/content/pdf/Greatland-Information-Security-Controls-for-XXXX-and- DPA.pdf. Except where prohibited by applicable law, Greatland will promptly notify you upon becoming aware of any unauthorized access to, use or disclosure of any of your Personal Information while in the possession or control of Greatland, and will take such actions as are commercially reasonable or necessary to assess the nature and scope of such incident to prevent further occurrences.

Related to Data Security; Incident Notification

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

Time is Money Join Law Insider Premium to draft better contracts faster.