Incident Response and Management Sample Clauses

Incident Response and Management. Protect the organization’s information, including personal data, as well as its reputation, by developing and implementing an incident response infrastructure (e.g., plans, defined roles, training, communications, management oversight, retainers, and insurance) for quickly discovering an attack and then effectively containing the damage, eradicating the attacker's presence, and restoring the integrity of the organization’s network and systems.
AutoNDA by SimpleDocs
Incident Response and Management. Where possible, partners will take immediate reasonable steps locally to contain any information incident impact that has arisen to support the overall management effort. Wiltshire Council’s Data Controller and Information Governance Lead will work in conjunction with partner organisations Information Governance Leads and Wiltshire Council Head of IT, as necessary, to co-ordinate the initial response to any information security incident from Single View. An initial assessment of the incident will be made to determine a management plan for the incident, including o Identification of members for incident response ‘team’; o Risk Assessment o Containment and recovery actions o Escalation / Notification to stakeholder parties of incident proportionate to the severity and risk of the incident o Mobilisation of any necessary incident response ‘team’. The Incident Management Plan will be a bespoke response to the security incident and shall in addition to the above considerations include an assessment of whether there needs to be an investigation on a criminal basis. This will be documented as a record of actions taken and will be updated as effectiveness of actions are completed and evaluated. The record will be a source for post-incident written reports and recommendations of any remedial action for policy or process improvement. Staff from all Single View partner organisations will be expected to provide relevant information to assist with any investigation that may follow a reported information security incident: in some instances they may be required to lead and undertake aspects of the investigation. Where a crime is suspected, then it should be reported to the Police and any investigative action undertaken must not compromise formal investigative procedures. Staff disciplinary investigations will be undertaken in relation to information security incidents where necessary and these investigations will involve HR and Legal services of affected partner organisations as appropriate. Communications protocols and a coordinated communications plan for the security incident will be put in place resulting from collaboration between stakeholders, for example business partners, third parties, police, media and communications support. Following risk assessment, significant information security incidents will be reported to the Information Commissioners Office. If the information security incident compromises health data a report will also be submitted to HSCIC using th...
Incident Response and Management a. Process to Detect a Security Related Incident. Each Party shall define and maintain a process to monitor and detect unauthorized access to, misuse or misappropriation of or fraudulent activity involving, Covered Information of the other Party by any personnel, temporary staff and third parties (e.g., subcontractor or outsourced service provider) of such Party that it uses to perform any of the obligations to be performed by such Party under the Program (a “Security Related Incident”).
Incident Response and Management. The Processor will implement and maintain a comprehensive incident response and management process designed to address and manage actions required by Processor as a result of a cyber attack or network security breach. Access Control Processor will maintain appropriate access controls, including, but not limited to, restricting access to Personal Data to the minimum number of Processor personnel who require such access. Only authorized staff can grant, modify or revoke access to an information system that uses or houses Personal Data. Processor will maintain an audit log. User administration procedures define user roles and their privileges, and how access is granted, changed and terminated; address appropriate segregation of duties; and define the logging/monitoring requirements and mechanisms. All employees of the Processor are assigned unique User IDs. Access rights are implemented adhering to the “principle of least privilege.” Processor will implement commercially reasonable physical and electronic security to create and protect passwords. ON Semiconductor will establish security procedures to prevent Personal Data Processing systems from being used accidentally or without authorization, such as through logical access controls.
Incident Response and Management. The Lender Information Risk Management Computer Incident Response Team ("CIRT") will be promptly notified by DealerTrack or its security designee when either DealerTrack or its security designee knows that a Security Event related to Lender's Customer Information at DealerTrack's site has occurred. DealerTrack will provide Lender with access, at DealerTrack's facility, to the hard, unaltered data and logs of the activity within seventy-two (72) hours of request from CIRT, subject to Lender's obligations with respect to confidentiality and reasonableness set forth in Section 23(a)(ii) above. Notwithstanding anything else to the contrary, this access to hard, unaltered data and logs shall not constitute or be deemed one of the two permitted audits set forth in Section 23(a)(ii) above.
Incident Response and Management 

Related to Incident Response and Management

  • Client Responsibilities You are responsible for (a) assessing each participants’ suitability for the Training, (b) enrollment in the appropriate course(s) and (c) your participants’ attendance at scheduled courses.

  • Joint Responsibilities 2.1.1 University and Affiliate each will identify, and notify each other of, a person responsible for serving as its liaison during the course of this affiliation. The appointment of liaisons shall be subject to mutual approval of the parties.

  • Transportation Management Tenant shall fully comply with all present or future programs intended to manage parking, transportation or traffic in and around the Building, and in connection therewith, Tenant shall take responsible action for the transportation planning and management of all employees located at the Premises by working directly with Landlord, any governmental transportation management organization or any other transportation-related committees or entities.

  • Joint Responsibility If the Seller determines that the Interface Problem is attributable partially to the design of a Warranted Part and partially to the design of any Supplier Part, the Seller will, if so requested by the Buyer, seek a solution to the Interface Problem through cooperative efforts of the Seller and any Supplier involved. The Seller will promptly advise the Buyer of such corrective action as may be proposed by the Seller and any such Supplier. Such proposal will be consistent with any then existing obligations of the Seller hereunder and of any such Supplier towards the Buyer. Such corrective action, unless reasonably rejected by the Buyer, will constitute full satisfaction of any claim the Buyer may have against either the Seller or any such Supplier with respect to such Interface Problem.

  • Development Responsibilities Unless the Parties agree in writing upon an alternate allocation of responsibility, the Parties shall have the following rights and obligations with respect to operational responsibilities under each Development Plan:

  • Construction Management Landlord or its Affiliate or agent shall supervise the Work, make disbursements required to be made to the contractor, and act as a liaison between the contractor and Tenant and coordinate the relationship between the Work, the Building and the Building’s Systems. In consideration for Landlord’s construction supervision services, Tenant shall pay to Landlord a construction supervision fee equal to three percent (3%) of Tenant’s Costs specified in Section 7.

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Contractor Responsibilities 19.1. Contractor shall perform national criminal history checks for Ohio, Indiana, and Kentucky, and 10-panel drug screening tests on all prospective employees performing work under this RFP or coming onto a CMHA property and any resulting contract and provide summaries of the results to the Authority if requested. For the purposes of this section, the term “employees” includes contractor. Prospective employees whose criminal background check discloses a misdemeanor or felony involving crimes of moral turpitude, sexual offenses or harm to persons or property shall not be employed to perform work under this RFP or any resulting contract. Contractor is required to perform drug screening of all employees and to ensure acceptable test results. Criminal history and drug screening checks will be completed at the sole expense of the contractor. Any employee of the Contractor suspected of being under the influence of drugs and or alcohol will be reported to the appropriate personnel at CMHA and/or other local law enforcement. If the employee is determined to be under the influence of drugs or alcohol in any form or manner, or believed by proper authority to be dealing in illicit sale of alcohol or drugs they will be removed and shall not be allowed to return to any job site on the Authority’s property. The Contractor’s contract may be suspended and/or terminated should such a situation occur or if the Contractor fails to submit results pursuant to this section.

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

Time is Money Join Law Insider Premium to draft better contracts faster.