HANDLING OF DATA BREACHES Sample Clauses

HANDLING OF DATA BREACHES. In the event of a Personal Data breach, that is, a breach (of security) leading to the accidental, unauthorised and/or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed, or any other threatening enforcement proceeding against the Company and/or the Data Processor pertaining to the processing of Personal Data, We will notify the Subject Person about this without undue delay, except and unless:
AutoNDA by SimpleDocs
HANDLING OF DATA BREACHES. In the event of a Personal Data Breach, or any other threatening enforcement proceeding against the Supplier pertaining to the processing of Personal Data, the Supplier will provide Purchaser with an accurate written notice immediately upon becoming aware of it, and in no event later than within forty-eight (48) hours. Supplier shall work with Purchaser’s prior approval on quickly resolving the issue, and prevent further losses, and provide any notices to an individual or government authority containing the information as mandated by the Laws. Supplier will also, upon Purchaser’s prior request, provide any appropriate remedial services to individuals.
HANDLING OF DATA BREACHES. If Processor observes any data breach, data leak or other incident threatening the confidentiality of Personal Data in its possession, Processor will provide UO with a written notice immediately upon becoming aware of such threat. Processor shall work closely with UO in order to quickly resolve the issue. Processor shall assist UO in providing any notices to Data Subjects or government authorities and taking other measures regarding the Personal Data as may be required by the Law.
HANDLING OF DATA BREACHES. In the event of a Personal Data breach, that is, a breach (of security) leading to the accidental, unauthorised and/or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed, or any other threatening enforcement proceeding against the Data Controller and/or the Data Processor pertaining to the processing of Personal Data, the Data Controller will provide the Data Subject with an immediate and accurate written notice. Data Processor will work with Data Controller’s prior approval on quickly resolving the issue, and prevent further losses, and provide any notices to the competent authority or body containing the information as mandated by the Laws. The Data Controller and/or the Data Processor will also provide any appropriate remedial services to the Data Subject. In case there is any claim of third party against the Data Processor/Sub-Contractor concerning the infringement of Laws in Data Processing or Data Breach that includes Personal Data relating to EPG, its employees (current and former), job applicants, external workforce or customers (prospective, current and former), Data Processor/Sub-Contractor shall reserve EPG the right either independently or as an intervener to participate in the negotiations and proceedings, at Data Processor/Sub-Contractor’s expense, in order to ensure the protection of its rights. If the Parties have agreed that EPG shall participate in an above manner in the negotiations and proceedings to ensure the protection of its rights and third party’s claim turns out to be frivolous, Data Processor/Sub-Contractor is not obliged to compensate aforementioned costs. In any other case Data Processor/Sub-Contractor shall be liable for any and all costs, expenses, compensations, losses and damages caused to EPG due to such third-party claims. The obligations set forth above shall survive the termination, cancellation or expiry of the main Agreement. Breach by Data Processor/Sub-Contractor (or its affiliates or representatives, as the case may be) of its obligations under this or ancillary documents will be deemed a material breach of the main Agreement. However, a breach of clearly minor nature is not deemed a material breach of the main Agreement. For the avoidance of doubt, and as stipulated in the applicable Agreement between the Data Controller and the Data Processors/Sub-Contractors, no limitation of liability shall be applicable to damages or losse...
HANDLING OF DATA BREACHES. If Processor observes any data breach, data leak or other incident threatening the confidentiality of Personal Data in its possession, Processor will provide Oamk with a written notice immediately upon becoming aware of such threat. Processor shall work closely with Oamk in order to quickly resolve the issue. Processor shall assist Oamk in providing any notices to Data Subjects or government authorities and taking other measures regarding the Personal Data as may be required by the Law.
HANDLING OF DATA BREACHES. In the event of a Personal Data Breach, or any other threatening enforcement proceeding against the Supplier pertaining to the processing of Personal Data, the Supplier will provide Sanoma with an accurate written notice immediately upon becoming aware of it, and in no event later than within twenty-four (24) hours. Supplier shall work with Sanoma’s prior approval on quickly resolving the issue, and prevent further losses, and provide any notices to an individual or government authority containing the information as mandated by the Laws. Supplier will also, upon Sanoma’s prior request, provide any appropriate remedial services to individuals.

Related to HANDLING OF DATA BREACHES

  • Data Breaches A. Upon the discovery by the Contractor of a confirmed breach of security that results in the unauthorized release, disclosure, or acquisition of student data, the Contractor shall provide initial notice to the Board as soon as reasonably possible, after such discovery (“Initial Notice”). The Initial Notice shall be delivered to the Board by electronic mail to Superintendent Xxxxxxx X. Xxxx, xxxxx@xxxxxxxxxxxx.xxx or to the contact currently on file and shall include the following information, to the extent known at the time of notification:

  • Processing of Data You acknowledge and agree that with each use of the Service initiated by your xxxxxxxxxx.xxx authenticated Users the Service will access Your xxxxxxxxxx.xxx account to retrieve, store, manipulate, process and modify Customer Data based on Your configuration of the Service (“Process”) and You expressly consent to such access solely as is necessary to provide the Service or Support Services. If the Service cannot for any reason access Your xxxxxxxxxx.xxx account, Conga will be excused from any nonperformance of the Service. You acknowledge that to provide the Service, Customer Data leaves the xxxxxxxxxx.xxx system. Xxxxxxxxxx.xxx is not responsible for Customer Data when it is outside of the xxxxxxxxxx.xxx system.

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process:

  • Personal Data Breaches 5.7.1 The Data Processor shall give immediate notice to the Data Controller if a breach occurs, that can lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to, personal data transmitted, stored or otherwise processed re the Personal Data processed on behalf of the Data Controller (a “Personal Data Breach”).

  • Personal Data Breach 7.1 Processor shall notify Company without undue delay upon Processor becoming aware of a Personal Data Breach affecting Company Personal Data, providing Company with sufficient information to allow the Company to meet any obligations to report or inform Data Subjects of the Personal Data Breach under the Data Protection Laws.

  • Marking of Data Pursuant to Paragraph A above, any Data delivered under this Agreement shall be marked with the following legend: Use, duplication, or disclosure is subject to the restrictions as stated in Agreement HR0011-XX-9-XXXX between the Government and the Performer.

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard.

  • HANDLING OF CONFIDENTIAL INFORMATION The Company agrees to undertake the following in relation to IHiS’ Confidential Information: to maintain the same in confidence and to use it only for the Purpose and for no other purpose; not to make any commercial use thereof; not to use the same for the benefit of itself or of any third party other than pursuant to a further agreement with IHiS; not to use the same for the purpose of guiding or conducting a search of any information, materials or sources, whether or not available to the public, for any purpose whatsoever, including without limitation, for the purpose of demonstrating that any information falls within one of the exceptions in Clause 1.1(b); not to copy, reproduce, reverse engineer or reduce to writing any part thereof except as may be reasonably necessary for the Purpose and that any copies, reproductions or reductions to writing so made shall be the property of IHiS; not to disclose the Confidential Information whether to its employees or to third parties except in confidence to such of its Representatives who have been informed of the confidential nature thereof and who need to know the same for the Purpose and that: such Representatives are contractually obliged (whether by their contracts of employment or service, or otherwise) not to disclose the same or to use the same otherwise than for the Purpose; and the Company shall enforce such obligations at its expense, and to such extent as may be required by IHiS, in the event of a breach thereof that relates to IHiS' Confidential Information; to ensure the compliance to this NDA (including sub-clauses (a) to (f) above) on the part of its Representatives to whom Confidential Information is disclosed; and to apply to the Confidential Information no lesser security measures and degree of care than those which the Company applies to its own confidential or proprietary information of similar nature, but in no event less than reasonable care, and which the Company warrants as being adequate protection of such information from unauthorised disclosure, copying or use. The Company, as the principal party, shall be responsible and held liable for any breach of this NDA by any of its Representatives. If the Company is uncertain as to whether any information is Confidential Information, the Company shall treat the information as if it was Confidential Information, unless otherwise agreed by IHiS in writing. The Company shall immediately notify IHiS of any unauthorised disclosure or use of the Confidential Information of which the Company becomes aware and will take all steps which IHiS may require in relation to such unauthorised disclosure or use, or to prevent further unauthorised disclosure or use. Notwithstanding the foregoing, the Company shall be entitled to make any disclosure of the Confidential Information as required by law, but shall give IHiS not less than TWO (2) business days' notice of such disclosure and shall consult with IHiS prior to such disclosure with a view to avoiding such disclosure, if legally possible.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • Handling of Personal Information The Organiser may use the personal information of individuals from exhibition related parties for any communications necessary for the holding of the Exhibition. In addition, the Organiser may send electronic mails or other advertising materials to exhibition related parties for promoting the Exhibition or other exhibitions to be organised by the Organiser. Exhibition related parties give their consent to the Organiser to provide their personal information to its designated partner company or a trade publication that gathers or features information related to the Exhibition whenever the Organiser deems such a provision necessary. Governing Law and Jurisdiction The Exhibition Rules and Regulations shall be governed by and construed in accordance with the laws of Japan. The Tokyo District Court shall have the exclusive jurisdiction over any dispute arising in connection with the Exhibition Rules and Regulations as the court of the first instance. Xxxx Exhibitions Japan Ltd. 18F Shinjuku-Nomura Bldg., 1-26-2 Nishishinjuku, Shinjuku-ku, Tokyo 000-0000, Japan TEL: +00-0-0000-0000 FAX: +00-0-0000-0000 A division of Xxxx Business Registered in England, Number 678540 AUTHORISED SIGNATURE

Time is Money Join Law Insider Premium to draft better contracts faster.