Incident Management and Breach Notification. 9.1 Oracle has implemented controls and policies designed to detect and promptly respond to incidents that create suspicion of or indicate destruction, loss, alteration, unauthorized disclosure or access to Your Content (as such term is defined in the Services Agreement) transmitted, stored or otherwise Processed. Oracle will promptly define escalation paths to investigate such incidents in order to confirm if an Information Breach has occurred, and to take reasonable measures designed to identify the root cause(s) of the Information Breach, mitigate any possible adverse effects and prevent a recurrence.
9.2 Oracle will notify you of a confirmed Information Breach without undue delay but at the latest within 24 hours. As information regarding the Information Breach is collected or otherwise reasonably becomes available to Oracle, Oracle will also provide You with (i) a description of the nature and reasonably anticipated consequences of the Information Breach; (ii) the measures taken to mitigate any possible adverse effects and prevent a recurrence; and (iii) where possible, information about the types of information that were the subject of the Information Breach. You agree to coordinate with Oracle on the content of Your intended public statements or required notices for the affected Individuals and/or notices to the relevant Regulators regarding the Information Breach.
Incident Management and Breach Notification. HTM evaluates and responds to incidents that create suspicion of or indicate a Personal Data Breach. HTM operations staff is instructed on responding to Personal Data Breach as required pursuant to the Data Protection Laws. HTM will notify Customer as soon as reasonably practicable, and in any event within any notice period required pursuant to the Data Protection Laws, if HTM has determined that Personal Data Breach has occurred that involves Customer Persona Data. HTM will promptly investigate the Personal Data Breach and take reasonable measures to identify its root cause(s) and prevent a recurrence. As information is collected or otherwise becomes available, unless prohibited by applicable law, HTM will provide Customer with a description of the Personal Data Breach, the type of Personal Data that was the subject of the Personal Data Breach, and other information Customer may reasonably request concerning the affected Data Subjects. The parties agree to coordinate in good faith on developing the content of any related public statements or any required notices for the affected Data Subjects and/or notices to the relevant data protection authorities.
Incident Management and Breach Notification. 8.1 Oracle has implemented controls and policies designed to detect and promptly respond to incidents that create suspicion of or indicate destruction, loss, alteration, unauthorized disclosure or access to Personal Information transmitted, stored or otherwise Processed. Oracle will promptly define escalation paths to investigate such incidents in order to confirm if a Personal Information Breach has occurred, and to take reasonable measures designed to identify the root cause(s) of the Personal Information Breach, mitigate any possible adverse effects and prevent a recurrence.
8.2 Oracle will notify you of a confirmed Personal Information Breach without undue delay but at the latest within 24 hours. As information regarding the Personal Information Breach is collected or otherwise reasonably becomes available to Oracle, Oracle will also provide You with (i) a description of the nature and reasonably anticipated consequences of the Personal Information Breach; (ii) the measures taken to mitigate any possible adverse effects and prevent a recurrence; and (iii) where possible, information about the types of Personal Information that were the subject of the Personal Information Breach. You agree to coordinate with Oracle on the content of Your intended public statements or required notices for the affected Individuals and/or notices to the relevant Regulators regarding the Personal Information Breach.
Incident Management and Breach Notification. Oracle evaluates and responds to incidents that create suspicion of unauthorized access to or handling of Personal Data (“Incident”). GIS is informed of such Incidents and, depending on the nature of the activity, defines escalation paths and response teams to address those Incidents. GIS will work with Customer, with internal Oracle lines of business, with the appropriate technical teams and, where necessary, with outside law enforcement to respond to the Incident. The goal of the Incident response will be to restore the confidentiality, integrity, and availability of the Cloud Services environment, and to establish root causes and remediation steps. Oracle operations staff is instructed on responding to Incidents where handling of Personal Data may have been unauthorized, including prompt and reasonable reporting to GIS and to Oracle Corporation’s legal department, escalation procedures, and chain of custody practices to secure relevant evidence.
Incident Management and Breach Notification.
(a) Workato shall, within 48 hours after becoming aware of a confirmed Personal Data Breach, inform Account Holder of the Personal Data Breach and take such steps as Workato in its sole discretion deems necessary and reasonable to remediate such violation (to the extent that remediation is within Workato’s reasonable control).
(b) In the event of a confirmed Personal Data Breach, Workato shall, taking into account the nature of the Processing and the information available to Workato, provide Account Holder with reasonable cooperation and assistance necessary for Account Holder to comply with its obligations under the applicable Data Protection Laws with respect to notifying (i) the relevant Supervisory Authority and (ii) Data Subjects affected by such Personal Data Breach without undue delay.
(c) As information regarding the Personal Data Breach is collected or otherwise reasonably becomes available to Workato, Workato will also provide Account Holder with (i) a description of the nature and reasonably anticipated consequences of the Personal Data Breach; (ii) the measures taken to mitigate any possible adverse effects and prevent a recurrence; and (iii) where possible, information about the types of Personal Data that were the subject of the Personal Data Breach. Account Xxxxxx agrees to coordinate with Workato on the content of Account Xxxxxx’s intended public statements or required notices for the affected Data Subjects and/or notices to the relevant Supervisory Authority regarding the Personal Data Breach. Further, Account Holder understands and agrees that it shall bear sole responsibility for communicating any updates related to a confirmed Personal Data Breach to its impacted Controllers (where Account Holder acts as the Processor pursuant to the Agreement, if applicable) and/or Data Subjects.
(d) The obligations described in Sections 10(a) and 10(b) (Incident Management and Breach Notification) above shall not apply in the event that a Personal Data Breach results from the actions or omissions of Account Holder. Notification of a Personal Data Breach does not constitute any acceptance of liability by Workato.
Incident Management and Breach Notification. Mendix evaluates and responds to incidents that create suspicion of unauthorized access to or handling of Customer Data (“Incident”). Mendix is informed of such Incidents and, depending on the nature of the activity, defines escalation paths and response teams to address those Incidents. Mendix will work with Customer and, where necessary, with outside law enforcement to respond to the Incident. The goal of the Incident response will be to restore the confidentiality, integrity, and availability of the services, and to establish root causes and remediation steps. For purposes of this section 8.8, “Security Breach” means the misappropriation of Customer Data located on Mendix systems that compromises the security, confidentiality or integrity of such information. Mendix will inform Customer within 36 hours if Mendix determines that Customer Data has been subject to a Security Breach (including by a Mendix employee) or any other circumstance in which Customer is required to provide a notification under applicable law, unless otherwise required by law. Mendix will promptly investigate the Security Breach and take reasonable measures to identify its root cause(s) and prevent a recurrence. As information is collected or otherwise becomes available, unless prohibited by law, Mendix will provide Customer with a description of the Security Breach, the type of data that was the subject of the breach, and other information Customer may reasonably request concerning the affected persons. The Parties agree to coordinate in good faith on developing the content of any related public statements or any required notices for the affected persons and/or the relevant data protection authorities.
Incident Management and Breach Notification. Oracle evaluates and responds to incidents that create suspicion of unauthorized access to or handling of Personal Data. GIS is informed of such incidents and, depending on the nature of the activity, defines escalation paths and response teams to address those incidents. GIS will work with Customer, with internal Oracle lines of business, with the appropriate technical teams and, where necessary, with outside law enforcement to respond to the incident. The goal of the incident response will be to restore the confidentiality, integrity, and availability of the Cloud Services environment, and to establish root causes and remediation steps. Oracle operations staff is instructed on responding to incidents where handling of Personal Data may have been unauthorized, including prompt and reasonable reporting to GIS and to Oracle Corporation’s legal department, escalation procedures, and chain of custody practices to secure relevant evidence. For purposes of this section, “security breach” means the misappropriation of Personal Data located on Oracle systems or the Cloud Services environment that compromises the security, confidentiality or integrity of such information. Oracle shall inform Customer within three business days if Oracle determines that Personal Data has been subject to a security breach (including by an Oracle employee) or any other circumstance in which Customer is required to provide a notification under applicable law, unless otherwise required by law. Oracle shall promptly investigate any security breach and take reasonable measures to identify its root cause(s) and prevent a recurrence. As information is collected or otherwise becomes available, unless prohibited by law, Oracle will provide Customer with a description of the security breach, the type of data that was the subject of the breach, and other information Customer may reasonably request concerning the affected persons. The parties agree to coordinate in good faith on developing the content of any related public statements or any required notices for the affected persons.
Incident Management and Breach Notification. 11.1 Extreme evaluates and responds to incidents that create suspicion of or indicate a Personal Data Breach. Extreme operations staff is instructed to respond to Personal Data Breach as required pursuant to EU Data Protection Laws.
11.2 Extreme will notify Company as soon as reasonably practicable, and in any event within any notice period required pursuant to EU Data Protection Laws, if Extreme has determined that Personal Data Breach has occurred that involves Company Personal Data.
11.3 Extreme will promptly investigate any such Personal Data Breach and take reasonable measures to identify its root cause(s) and prevent a recurrence. As information is collected or otherwise becomes available, unless prohibited by applicable law, Extreme will provide Company with a description of the Personal Data Breach, the type of Personal Data that was the subject of the Personal Data Breach, and other information Company may reasonably request concerning the affected Data Subjects.
11.4 The parties agree to coordinate in good faith on developing the content of any related public statements or any required notices for the affected Data Subjects and/or notices to the relevant data protection authorities.
Incident Management and Breach Notification. 11.1. Selerant evaluates and responds to incidents that create suspicion of unauthorized access to or handling of Personal Data (“Incident”). Selerant IT is informed of such Incidents and, depending on the nature of the activity, defines escalation paths and response teams to address those Incidents. Selerant IT will work with Customer, with internal Selerant lines of business, with the appropriate technical teams and, where necessary, with outside law enforcement to respond to the Incident. The goal of the Incident response will be to restore the confidentiality, integrity, and availability of the Cloud Services environment, and to establish root causes and remediation steps.
11.2. Selerant operations staff is instructed on responding to Incidents where handling of Personal Data may have been unauthorized, including prompt and reasonable reporting to Selerant IT and to Selerant’s legal department, escalation procedures, and chain of custody practices to secure relevant evidence.
11.3. For purposes of this section, “Security Breach” means the misappropriation of Personal Data located on Selerant systems or the Cloud Services environment that compromises the security, confidentiality or integrity of such information. Selerant will inform Customer within 72 hours if Selerant determines that Personal Data has been subject to a Security Breach (including by a Selerant employee) or any other circumstance in which Customer is required to provide a notification under applicable law, unless otherwise required by law.
Incident Management and Breach Notification. 8.1 If a data breach is suspected JAF will promptly define escalation paths to investigate such incidents in order to confirm if a Personal Information Breach has occurred, and to
8.2 JAF will notify you of a confirmed Personal Information Breach without undue delay but at the latest within 24 hours. As information regarding the Personal Information Breach is collected or otherwise reasonably becomes available to JAF, JAF will also provide You with (i) a description of the nature and reasonably anticipated consequences of the Personal Information Breach; (ii) the measures taken to mitigate any possible adverse effects and prevent a recurrence; and (iii) where possible, information about the types of Personal Information that were the subject of the Personal Information Breach. You agree to coordinate with Oracle on the content of Your intended public statements or required notices for the affected Individuals and/or notices to the relevant Regulators regarding the Personal Information Breach.