Data Security Notification Letter Sample Clauses

Data Security Notification Letter. Provides documentation and notification of any Security Breach or attempted Security Breach involving SOF Production Data, the HRIS, or any Subcontractor or Service Provider facility housing SOF Production Data. In the event no Security Breach or attempted Security Breach has occurred, the Service Provider shall provide written confirmation of such, as prescribed in subsection 6.5.4 (“Data Security Notification Letter”).
AutoNDA by SimpleDocs
Data Security Notification Letter. The Contractor shall provide to the Department, quarterly, on the Contractor's letterhead and signed by an Officer of the Contractor, a Data Security Notification Letter providing documentation and notification of any breach of Security Involving State Data, the eProcurement Solution, or any subcontractor or the Contractor facility housing State Data.
Data Security Notification Letter. The Contractor shall provide documentation and notification of any confirmed Security Breach involving State Data, the eProcurement Solution, or any subcontractor or Contractor facility housing State Data. The documentation may be either Contractor or third-party entity produced, as determined applicable to the system component or platform tier impacted. This documentation and notification is due within five (5) business days of confirmation of the Security Breach.
Data Security Notification Letter. In addition to the foregoing notification requirements, the Service Provider shall provide to the Department quarterly, on the Service Provider's letterhead and signed by a Corporate Officer of the Service Provider, a Data Security Notification Letter providing documentation and notification of any Security Breach or attempted Security Breach of security involving SOF Production Data, the HRIS, or any Subcontractor or the Service Provider facility housing SOF Production Data. In the event no Security Breach or attempted Security Breach has occurred, the Service Provider shall provide written confirmation of such.
Data Security Notification Letter. In addition to the foregoing notification requirements, the Contractor shall provide to the Department quarterly, on the Contractor's letterhead and signed by a Corporate Officer of the Contractor, a Data Security Notification Letter providing documentation and notification of any Security Breach or attempted Security Breach of security involving State of Florida Data, the HRIS, or any Subcontractor or the Contractor facility housing State of Florida Data. In the event no Security Breach or attempted Security Breach has occurred, the Contractor shall provide written confirmation of such. THIS SPACE INTENTIONALLY LEFT BLANK
Data Security Notification Letter. In addition to the notice requirements set forth above, the Contractor shall provide to the Department, quarterly, documentation and notification of any security breach or attempted security breach involving State data, including any Subcontractor or Contractor facility housing State data. The notice will include a post-incident report documenting all containment, eradication, and recovery measures taken. In the event no breach or attempted breach has occurred, the Contractor shall provide written confirmation of such.
Data Security Notification Letter. In addition to the foregoing notification requirements, Vendor shall provide to the Department annually on Vendor’s letterhead and signed by a corporate officer of Vendor, a Data Security Notification Letter providing documentation and notification of any Breach of security involving State of Florida Data or any Subcontractor or Vendor facility housing State of Florida Data. In the event that no Breach has occurred, Vendor shall provide written confirmation of such.
AutoNDA by SimpleDocs

Related to Data Security Notification Letter

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

  • Union Notification The Union shall be notified of all appointments, hirings, layoffs, transfers, recalls and terminations of employment.

  • REPORTING - NOTIFICATION Reports, Evaluations, and Reviews required under this §8 shall be in accordance with the procedures of and in such form as prescribed by the State and in accordance with §19, if applicable.

  • Exclusion Letter If, at the conclusion of the 30-day period, Progenity fails to satisfy the requirements of Section X.D.3, OIG may exclude Progenity from participation in the Federal health care programs. OIG shall notify Progenity in writing of its determination to exclude Progenity. (This letter shall be referred to as the “Exclusion Letter.”) Subject to the Dispute Resolution provisions in Section X.E, below, the exclusion shall go into effect 30 days after the date of Progenity’s receipt of the Exclusion Letter. The exclusion shall have national effect. Reinstatement to program participation is not automatic. At the end of the period of exclusion, Progenity may apply for reinstatement by submitting a written request for reinstatement in accordance with the provisions at 42 C.F.R. §§ 1001.3001-.3004.

  • Association Notification Copies of all sabbatical applications, returning placement agreements and extension requests, as well as their disposition, shall be provided to the Association by the District upon request.

  • Special Instructions As used herein, the term "Special Instructions" shall mean Proper Instructions countersigned or confirmed in writing by the Treasurer or any Deputy or Assistant Treasurer of the applicable Fund or any other person designated by the Treasurer of such Fund in writing, which countersignature or confirmation shall be (i) included on the same instrument containing the Proper Instructions or on a separate instrument relating thereto, and (ii) delivered by hand, by facsimile transmission, or in such other manner as the applicable Fund and the Custodian agree in writing.

  • Acceptable Use Policy Agreement I understand that I must use school IT systems in a responsible way, to ensure that there is no risk to my safety or to the safety and security of the IT systems and other users. For my own personal safety: • I understand that the school will monitor my use of the IT systems, email and other digital communications. • I will treat my username and password like my toothbrush – I will not share it, nor will I try to use any other person’s username and password. • I will be aware of “stranger danger”, when I am communicating on-line. • I will not disclose or share personal information about myself or others when on-line. • If I arrange to meet people off-line that I have communicated with on-line, I will do so in a public place and take an adult with me. • I will immediately report any unpleasant or inappropriate material or messages or anything that makes me feel uncomfortable when I see it on-line. I understand that everyone has equal rights to use technology as a resource and: • I understand that the school IT systems are primarily intended for educational use and that I will not use the systems for personal or recreational use unless I have permission to do so. • I will not try (unless I have permission) to make large downloads or uploads that might take up internet capacity and prevent other users from being able to carry out their work. • I will not use the school IT systems for on-line gaming, on-line gambling, internet shopping, file sharing, or video broadcasting (e.g. YouTube), unless I have permission of a member of staff to do so. I will act as I expect others to act toward me: • I will respect others’ work and property and will not access, copy, remove or otherwise alter any other user’s files, without the owner’s knowledge and permission. • I will be polite and responsible when I communicate with others, I will not use strong, aggressive or inappropriate language and I appreciate that others may have different opinions. • I will not take or distribute images of anyone without their permission. I recognise that the school has a responsibility to maintain the security and integrity of the technology it offers me and to ensure the smooth running of the school: • I will only use my personal hand held / external devices (mobile phones / USB devices etc) in school if I have permission. I understand that, if I do use my own devices in school, I will follow the rules set out in this agreement, in the same way as if I was using school equipment. • I understand the risks and will not try to upload, download or access any materials which are illegal or inappropriate or may cause harm or distress to others, nor will I try to use any programmes or software that might allow me to bypass the filtering / security systems in place to prevent access to such materials.

  • Additional Instructions Owner may issue additional instructions during the progress of the Work by means of Drawings or other media necessary to illustrate changes in the Work.

  • Special Account Instructions You may request that we facilitate certain trust, will, or court-ordered account arrangements. However, because we do not give legal advice, we cannot counsel you as to which account arrangement most appropriately meets the specific requirements of your trust, will, or court order. If you ask us to follow any instructions that we believe might expose us to claims, lawsuits, expenses, liabilities, or damages, whether directly or indirectly, we may refuse to follow your instructions or may require you to indemnify us or post a bond or provide us with other protection. We may require that account changes requested by you, or any account owner, such as adding or closing an account or service, be evidenced by a signed Account Change Card or other document which evidences a change to an account and accepted by us.

  • Control Area Notification At least three months before Initial Synchronization Date, Interconnection Customer shall notify Distribution Provider in writing of the Control Area in which the Generating Facility will be located. If Interconnection Customer elects to locate the Generating Facility in a Control Area other than the Control Area in which the Generating Facility is physically located, and if permitted to do so by the relevant transmission tariffs, all necessary arrangements, including but not limited to those set forth in Article 7 and Article 8 of this GIA, and remote Control Area generator interchange agreements, if applicable, and the appropriate measures under such agreements, shall be executed and implemented prior to the placement of the Generating Facility in the other Control Area.

Time is Money Join Law Insider Premium to draft better contracts faster.