Eligible Data Breach Sample Clauses

Eligible Data Breach. (a) In this clause Eligible Data Breach has the same meaning as it has in the Privacy Act. (b) If the Consultant becomes aware that there are reasonable grounds to suspect that there may have been an Eligible Data Breach in relation to any Personal Information held by the Consultant as a result of this Agreement or its performance of the Agreement, the Consultant agrees to: (i) notify the Foundation in writing as soon as possible, which must be no later than within 3 days; and (ii) carry out an assessment in accordance with the requirements of the Privacy Act. (c) Where the Consultant is aware that there are reasonable grounds to believe there has been, or where the Foundation notifies the Consultant that there has been, an Eligible Data Breach in relation to any Personal Information held by the Consultant as a result of this Agreement or its performance of the services, the Consultant agrees to: (i) take all reasonable action to mitigate the risk of the Eligible Data Breach causing serious harm to any of the individuals to whom it relates; and (ii) take all other action necessary to comply with the requirements of the Privacy Act.
AutoNDA by SimpleDocs
Eligible Data Breach. (a) If either Party: (i) becomes aware that there are reasonable grounds to suspect that there may have been an Eligible Data Breach; or (ii) becomes aware that there are reasonable grounds to believe that there has been an Eligible Data Breach, it will notify the other party of this fact as soon as practicable. (b) Where either of Powernet or the Client are required to comply with any obligations arising under the Privacy Xxx 0000 (Cth) in relation to an Eligible Data Breach of the Client’s data, the Client must ensure compliance with all those obligations. (c) If the Client believes it is unable for any reason to comply with its obligations without the assistance of Powernet, the Client must notify Powernet as soon as practicable and in any event within 7 days, that it requires such assistance from Powernet, specifying the nature of that assistance. (d) If Powernet provides any services to the Client to assist it to comply with the obligations under clause 5.3(a), those services may be provided as an Out of Scope service.
Eligible Data Breach. Where there are reasonable grounds to believe there has been an eligible data breach we will, within 30 days of when we first become aware of the suspected breach, undertake a reasonable and expeditious assessment of the potential breach. Where it is determined that an eligible data breach has occurred, we will report the breach to the Office of the Australian Information Commissioner and you.
Eligible Data Breach. In relation to Personal information handled pursuant to this Agreement, the Counterparty must immediately upon becoming aware that there are reasonable grounds to believe there has been an Eligible Data Breach: (a) provide the following information to Alinta Energy, to the extent known: i. the basis upon which a reasonable person would or would not conclude that the incident would be likely to result in serious harm to any of the individuals subject to the Eligible Data Breach; ii. any remedial action the Counterparty has taken or proposes to take in relation to the incident; iii. proposed steps that the Counterparty recommends the individuals subject to the Eligible Data Breach should take in response to the incident; and iv. details of the assessment undertaken by the Counterparty to assess whether the incident amounts to an Eligible Data Breach; (collectively, the Notifiable Matters); (b) provide Alinta Energy with all information, documents and assistance it reasonably requires in respect of the Eligible Data Breach and any notification requirements; (c) provide Alinta Energy with ongoing updates (at least every two business days) with respect to the Notifiable Matters until such time as Alinta Energy determines that the incident has been remedied; and (d) not notify OAIC or affected individuals of the incident unless first approved by Alinta Energy (acting reasonably).
Eligible Data Breach. ‌ (a) If the Provider has reasonable grounds to suspect there may have been an event which amounts to an Eligible Data Breach in relation to any Personal Information the Provider holds as a result of this Head Agreement or its performance of the Services, the Provider must:‌ (i) immediately, and no later than the Business Day after the Provider becomes so aware, Notify the impacted Agency or Agencies and the Lead Agency; (ii) comply with its obligations under the Privacy Act in relation to that event; (iii) unless otherwise directed by the Lead Agency, carry out an assessment as to whether there are reasonable grounds to believe that there has been an Eligible Data Breach in accordance with the requirements of the Privacy Act; (iv) provide the impacted Agency or Agencies and the Lead Agency (as relevant) with all information requested by the impacted Agency or Agencies and the Lead Agency about the event; and (v) if requested, allow the impacted Agency or Agencies and the Lead Agency to participate in the Provider's assessment of the event and whether it amounts to an Eligible Data Breach. (b) If the Provider is aware, including after complying with clause 31.4(a), that there are reasonable grounds to believe that there has been, or where an Agency or the Lead Agency Notifies the Provider that there has been, an Eligible Data Breach in relation to any Personal Information the Provider holds as a result of this Head Agreement or its performance of the Services, the Provider must: (i) take all reasonable action to mitigate the risk of the breach causing serious harm to any of the individuals to whom the Personal Information relates; (ii) take all other action necessary to comply with the requirements of the Privacy Act (including, subject to clause 31.4(c), preparing a statement for the Australian Information Commissioner and notifying affected individuals about the Eligible Data Breach where required); and (iii) take any other action as reasonably directed by the impacted Agency or Agencies or the Lead Agency, or the Australian Information Commissioner. (c) If notification of an Eligible Data Breach is required under the Privacy Act, the Provider must:‌ (i) immediately inform the impacted Agency or Agencies and the Lead Agency; (ii) if requested by the impacted Agency, discuss with the impacted Agency and endeavour to agree which Party will issue the notification;‌ (iii) if a discussion under clause 31.4(c)(ii) is not requested by the impacted Agency, compl...

Related to Eligible Data Breach

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.

  • Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article

  • Personal Data Breach 7.1 Processor shall notify Company without undue delay upon Processor becoming aware of a Personal Data Breach affecting Company Personal Data, providing Company with sufficient information to allow the Company to meet any obligations to report or inform Data Subjects of the Personal Data Breach under the Data Protection Laws. 7.2 Processor shall co-operate with the Company and take reasonable commercial steps as are directed by Company to assist in the investigation, mitigation and remediation of each such Personal Data Breach.

  • Personal Data Breaches 5.7.1 The Data Processor shall give immediate notice to the Data Controller if a breach occurs, that can lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to, personal data transmitted, stored or otherwise processed re the Personal Data processed on behalf of the Data Controller (a “Personal Data Breach”). 5.7.2 The Data Processor shall make reasonable efforts to identify the cause of such a breach and take those steps as they deem necessary to establish the cause, and to prevent such a breach from reoccurring.

  • Confidential Information Breach This shall mean, generally, an instance where an unauthorized person or entity accesses Confidential Information in any manner, including but not limited to the following occurrences: (1) any Confidential Information that is not encrypted or protected is misplaced, lost, stolen or in any way compromised; (2)one or more third parties have had access to or taken control or possession of any Confidential Information that is not encrypted or protected without prior written authorization from the State; (3) the unauthorized acquisition of encrypted or protected Confidential Information together with the confidential process or key that is capable of compromising the integrity of the Confidential Information; or (4) if there is a substantial risk of identity theft or fraud to the Client Agency, the Contractor, DAS or State.

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Termination for Material Breach Either Party (the “Terminating Party”) may terminate this Agreement in its entirety, or on a country-by-country and Product-by-Product basis, in the event the other Party (the “Breaching Party”) has materially breached this Agreement, and such material breach has not been cured within sixty (60) days after receipt of written notice of such breach by the Breaching Party from the Terminating Party (the “Cure Period”). The written notice describing the alleged material breach shall provide sufficient detail to put the Breaching Party on notice of such material breach. Any termination of this Agreement pursuant to this Section 10.3 shall become effective at the end of the Cure Period, unless the Breaching Party has cured any such material breach prior to the expiration of such Cure Period; provided that in the event a claim of material breach is being contested diligently and in good faith by appropriate proceedings hereunder, any termination pursuant to this Section shall not become effective unless and until such material breach has been established in such proceedings and, in the event that, following such establishment, a cure may then be accomplished by the payment of money or the taking of certain actions, such payment or actions are not paid or taken within sixty (60) days of the conclusion of such proceedings. The right of either Party to terminate this Agreement as provided in this Section 10.3 shall not be affected in any way by such Party’s waiver of or failure to take action with respect to any previous breach under this Agreement.

  • Notification of personal data breach 1. In case of any personal data breach, the data processor shall, without undue delay after having become aware of it, notify the data controller of the personal data breach. 2. The data processor’s notification to the data controller shall, if possible, take place within 24 hours after the data processor has become aware of the personal data breach to enable the data controller to comply with the data controller’s obligation to notify the personal data breach to the competent supervisory authority, cf. Article 33

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!