Describe policies and procedures regarding notifications to both the State and the Cardholders of a data breach Sample Clauses

Describe policies and procedures regarding notifications to both the State and the Cardholders of a data breach as defined in this RFP, and the mitigation of such a breach. Knowledge Services meets the requirement for a notification process in the event of a security incident, including relating to timing and incident levels. Knowledge Services understands and will comply with the requirement that Purchasing Entities may have different notification requirements based on applicable laws and the categorization type of the data being processed or stored. A robust network security monitoring solution is in place that leverages signature based software and live analysts monitoring the network traffic of our organization. The false positive rate is extremely low and all events are thoroughly analyzed. In the event of an incident, the third party company alerts a local point of contact to investigate the issue. The third party provides full details regarding the event and recommended remediation steps based on the severity of the issue. • Personnel – A local point of contact from Knowledge Services will be contacted by third party monitoring analyst. The local point of contact from Knowledge Services will notify the Contract Manager which will then contact Purchasing Entities point of contact. • Response timesThe response time in the event of a data breach is within an hour of identification of a true positive. • Methods of communication – The methods of communication of a data breach are via a portal, email and phone. Migration and Redeployment Plan (Section 8.7)
AutoNDA by SimpleDocs

Related to Describe policies and procedures regarding notifications to both the State and the Cardholders of a data breach

  • Overpayment Policies and Procedures Within 90 days after the Effective Date, Xxxxx shall develop and implement written policies and procedures regarding the identification, quantification and repayment of Overpayments received from any Federal health care program.

  • SECURITY POLICIES AND NOTIFICATIONS State Security Policies and Procedures The Contractor and its personnel shall review and be familiar with all State security policies, procedures and directives currently existing or implemented during the term of the Contract, including ITS Policy NYS-P03-002 Information Security Policy (or successor policy). Security Incidents Contractor shall address any Security Incidents in the manner prescribed in ITS Policy NYS-P03-002 Information Security Policy (or successor policy), including the New York State Cyber Incident Reporting Procedures incorporated therein or in such successor policy.

  • Violence Policies and Procedures The Employer agrees to have in place explicit policies and procedures to deal with violence. The policy will address the prevention of violence, the management of violent situations, provision of legal counsel and support to employees who have faced violence. The policies and procedures shall be part of the employee's health and safety policy and written copies shall be provided to each employee. Prior to implementing any changes to these policies, the employer agrees to consult with the Association.

  • Policies and Procedures i) The policies and procedures of the designated employer apply to the employee while working at both sites.

  • Incorporation of Prompt Payment Policy Statement into Contracts The provisions of this Exhibit shall apply to all Payments as they become due and owing pursuant to the terms and conditions of this Agreement, notwithstanding that NYSERDA may subsequently amend its Prompt Payment Policy by further rulemaking.

  • Privacy Notification (1) The authority to request the above personal information from a seller of goods or services or a lessor of real or personal property, and the authority to maintain such information, is found in Section 5 of the State Tax Law. Disclosure of this information by the seller or lessor to the State is mandatory. The principal purpose for which the information is collected is to enable the State to identify individuals, businesses and others who have been delinquent in filing tax returns or may have understated their tax liabilities and to generally identify persons affected by the taxes administered by the Commissioner of Taxation and Finance. The information will be used for tax administration purposes and for any other purpose authorized by law. (2) The personal information is requested by the purchasing unit of the agency contracting to purchase the goods or services or lease the real or personal property covered by this contract or lease. The information is maintained in the Statewide Financial System by the Vendor Management Unit within the Bureau of State Expenditures, Office of the State Comptroller, 000 Xxxxx Xxxxxx, Xxxxxx, Xxx Xxxx 00000.

  • Safeguarding requirements and procedures (1) The Contractor shall apply the following basic safeguarding requirements and procedures to protect covered contractor information systems. Requirements and procedures for basic safeguarding of covered contractor information systems shall include, at a minimum, the following security controls:

  • Provisions for Covered Entity to Inform Business Associate of Privacy Practices and Restrictions (a) Covered Entity shall notify Business Associate of any limitation(s) in the notice of privacy practices of Covered Entity under 45 CFR 164.520, to the extent that such limitation may affect Business Associate’s use or disclosure of protected health information.

  • Disclosure Statement for Xxxx IRAs 1. Am I Eligible to Contribute to a Xxxx XXX? Anyone with compensation income whose Modified Adjusted Gross Income (AGI) does not exceed the limits described below is eligible to contribute to a Xxxx XXX. (For convenience, all future references to compensation are deemed to mean “earned income” in the case of a self- employed individual.) Employers may also contribute to Xxxx IRAs established for the benefit of their employees. You may also establish a Xxxx XXX to receive rollover contributions or transfers from another Xxxx XXX or, in some cases, from a Traditional IRA. A Qualified Rollover Contribution can be made to a Xxxx XXX and is a distribution from an IRA that meets the requirements of section 408(d)(3), a rollover from a designated Xxxx account described in section 402A, or a rollover from an eligible retirement plan as described in section 402(c)(8)(B).

  • Notification Procedures To address non-compliance, the receiving Competent Authority would notify the providing Competent Authority pursuant to Article 5 of the IGA. The notification procedures would differ depending upon whether the receiving Competent Authority seeks to address administrative or other minor errors or significant non-compliance.

Time is Money Join Law Insider Premium to draft better contracts faster.