Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.
Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.
Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.
Background and Security Investigations 7.5.1 Each of Contractor’s staff performing services under this Contract, who is in a designated sensitive position, as determined by County in County's sole discretion, shall undergo and pass a background investigation to the satisfaction of County as a condition of beginning and continuing to perform services under this Contract. Such background investigation must be obtained through fingerprints submitted to the California Department of Justice to include State, local, and federal-level review, which may include, but shall not be limited to, criminal conviction information. The fees associated with the background investigation shall be at the expense of the Contractor, regardless of whether the member of Contractor’s staff passes or fails the background investigation. If a member of Contractor’s staff does not pass the background investigation, County may request that the member of Contractor’s staff be removed immediately from performing services under the Contract. Contractor shall comply with County’s request at any time during the term of the Contract. County will not provide to Contractor or to Contractor’s staff any information obtained through the County’s background investigation. 7.5.2 County, in its sole discretion, may immediately deny or terminate facility access to any member of Contractor’s staff that does not pass such investigation to the satisfaction of the County or whose background or conduct is incompatible with County facility access. 7.5.3 Disqualification of any member of Contractor’s staff pursuant to this Paragraph 7.5 shall not relieve Contractor of its obligation to complete all work in accordance with the terms and conditions of this Contract.
Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.
Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.
Enforcement of Intellectual Property Rights I will cooperate fully with the Company, both during and after my employment with the Company, with respect to the procurement, maintenance and enforcement of Intellectual Property Rights in Company-Related Developments. I will sign, both during and after the term of this Agreement, all papers, including without limitation copyright applications, patent applications, declarations, oaths, assignments of priority rights, and powers of attorney, which the Company may deem necessary or desirable in order to protect its rights and interests in any Company-Related Development. If the Company is unable, after reasonable effort, to secure my signature on any such papers, I hereby irrevocably designate and appoint each officer of the Company as my agent and attorney-in-fact to execute any such papers on my behalf, and to take any and all actions as the Company may deem necessary or desirable in order to protect its rights and interests in any Company-Related Development.
Reporting Incidents The Interconnection Parties shall report to each other in writing as soon as practical all accidents or occurrences resulting in injuries to any person, including death, and any property damage arising out of the Interconnection Service Agreement.
Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.