Discovery of Breaches and Security Incidents Sample Clauses

Discovery of Breaches and Security Incidents. For purposes of this Agreement, a breach of, or security incident involving, PSEI or PHI shall be treated as discovered by CONTRACTOR as of the first (1st) day on which such breach is known, or by exercising reasonable diligence would have been known, to CONTRACTOR, or any employee or agent thereof, other than the person committing the suspected breach.
AutoNDA by SimpleDocs
Discovery of Breaches and Security Incidents. For purposes of these Terms and Conditions, a breach of, or security incident involving, Patient Data shall be treated as discovered by the breaching party as of the first day on which such breach is known, or by exercising reasonable diligence would have been known, to the breaching party or any person, other than the person committing the suspected breach, who is an employee, officer or other agent of the breaching party.

Related to Discovery of Breaches and Security Incidents

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Background and Security Investigations 7.5.1 Each of Contractor’s staff performing services under this Master Agreement who is in a designated sensitive position, as determined by County in County's sole discretion, shall undergo and pass a background investigation to the satisfaction of County as a condition of beginning and continuing to perform services under this Master Agreement. Such background investigation must be obtained through fingerprints submitted to the California Department of Justice to include State, local, and federal-level review, which may include, but shall not be limited to, criminal conviction information. The fees associated with the background investigation shall be at the expense of the Contractor, regardless if the member of Contractor’s staff passes or fails the background investigation.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Data Incidents If Apple becomes aware that Personal Data has been altered, deleted, or lost as a result of any unauthorized access to the Service (a “Data Incident”), Apple will notify Institution without undue delay if required by law, and Apple will take reasonable steps to minimize harm and secure the data. Notification of, or response to, a Data Incident by Apple will not be construed as an acknowledgment by Apple of any responsibility or liability with respect to a Data Incident. Institution is responsible for complying with applicable incident notification laws and fulfilling any third-party obligations related to Data Incident(s). Apple will not access the contents of Personal Data in order to identify information subject to any specific legal requirements.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!