INFORMATION SECURITY BREACH Sample Clauses
The INFORMATION SECURITY BREACH clause defines the obligations and procedures that parties must follow in the event of a breach of information security. Typically, this clause requires the party experiencing the breach to promptly notify the other party, investigate the incident, and take remedial actions to mitigate any harm. For example, if sensitive customer data is accessed by unauthorized individuals, the affected party must inform their counterpart and may need to cooperate in any subsequent investigation. The core function of this clause is to ensure a swift and coordinated response to security incidents, thereby minimizing potential damage and clarifying responsibilities in the event of a data breach.
INFORMATION SECURITY BREACH. In the event of a Breach of Security as defined in NY CLS Gen Bus §899-aa and NY CLS State Technology Law §208, or otherwise, involving AGENCY supplied Personal Information or Private Information from systems owned, operated, sub-contracted or otherwise routed through Contractors systems or networks, CONTRACTOR shall notify AGENCY immediately, without unreasonable delay. “
INFORMATION SECURITY BREACH. Service Provider shall promptly (inline with the legal and regulatory requirements applicable, whichever is most stringent) notify Flipkart if Service Provider knows or has reason to believe or/and confirmed on there has been any misuse, compromise, loss, or unauthorized disclosure or acquisition of, or access to Flipkart’s confidential data (an “Information Security Breach”). Upon any discovery of an Information Security Breach, the Service Provider shall investigate, remediate, and mitigate the effects of the Information Security Breach, and provide Flipkart with assurances reasonably satisfactory to Flipkart that such Information Security Breach shall not recur. Service Provider shall reasonably cooperate with Flipkart in connection with each of the foregoing and shall comply with any reasonable instructions provided by Flipkart in connection therewith. Flipkart reasonably determines that a third-party security assessment is required in connection with an Information Security Breach. Service Provider shall provide, at Flipkart’s request, any information related to any such Information Security Breach or requested by Flipkart, including but not limited to, vulnerabilities or flaws, start or end date, date of discovery, and specific actions taken to contain and/or mitigate. If any Information Security Breach occurs as a result of an act or omission of a Service Provider or its personnel, the Service Provider shall, at its sole expense, undertake remedial measures.
INFORMATION SECURITY BREACH. Supplier will notify Client within a commercially reasonable time period, after it becomes aware that an Information Security Breach has occurred in the Supplier Systems. Supplier will promptly take all necessary steps to mitigate the impact of the Information Security Breach, grant Client access to relevant systems and logs related to the Information Security Breach, and cooperatively share information with Client to address and remediate the Information Security Breach.
INFORMATION SECURITY BREACH. Participating Provider shall promptly (or in any case within 48 hours) notify Apple if Participating Provider knows or has reason to believe there has been any misuse, compromise, loss, or unauthorized disclosure or acquisition of, or access to, Confidential Data (an “Information Security Breach”). Upon any discovery of an Information Security Breach, Participating Provider will investigate, remediate, and mitigate the effects of the Information Security Breach. To the extent the Information Security Breach relates to Apple’s Confidential Information, Participating Provider will reasonably cooperate with Apple in connection with each of the foregoing and will comply with any reasonable instructions provided by Apple in connection therewith. Without limitation to the foregoing sentence, in the event that Apple reasonably determines that a third-party security assessment is recommended in connection with an Information Security Breach, Participating Provider will engage a third-party security assessor to conduct such an assessment. Participating Provider shall provide any information related to any such Information Security Breach requested by Apple, including but not limited to, vulnerabilities or flaws, start or end date, date of discovery, and specific actions taken to contain and/or mitigate. If any Information Security Breach occurs as a result of an act or omission of Participating Provider or Participating Provider’s Personnel, Participating Provider will, at Participating Provider’s sole expense, undertake remedial measures (including notice, credit monitoring services, fraud insurance and the establishment of a call center to respond to customer inquiries).
INFORMATION SECURITY BREACH an Information Security Incident where it is confirmed that a stated organisational policy or legal requirement regarding Information Security has been contravened.
INFORMATION SECURITY BREACH. (a) Subject to the rights of Bayer specified in this Article XXX (Data Security), Supplier shall be responsible for any and all information security incidents involving Personal Data that are handled by, or on behalf of, Supplier.
(b) Supplier shall notify Bayer in writing immediately (and in any event within twenty-four
INFORMATION SECURITY BREACH. In accordance with the Information and Security Breach Notification Act (ISBNA) (Chapter 442 of the Laws of 2005, as amended by Chapter 491 of the Laws of 2005), a Contractor with BOE shall be responsible for all applicable provisions of the ISBNA and the following terms herein with respect to any private information (as defined in the ISBNA) received by or on behalf of BOE under this Agreement. • Contractor shall supply BOE with a copy of its notification policy, which shall be modified to be in compliance with this provision, as well as BOE’s notification policy. • Contractor must encrypt any database fields and backup tapes that contain private data elements, as set forth in the ISBNA. • Contractor must ensure that private data elements are encrypted in transit to / from their systems. • In general, contractor must ensure that private data elements are not displayed to users on computer screens or in printed reports; however, specific users who are authorized to view the private data elements and who have been properly authenticated may view/receive such data. • Contractor must monitor for breaches of security to any of its systems that store or process private data owned by BOE. • Contractor shall take all steps as set forth in ISBNA to ensure private information shall not be released without authorization from BOE. • In the event a security breach occurs as defined by ISBNA Contractor shall immediately notify BOE and commence an investigation in cooperation with BOE to determine the scope of the breach. • Contractor shall also take immediate and necessary steps needed to restore the information security system to prevent further breaches. • Contractor shall immediately notify BOE following the discovery that ▇▇▇’▇ system security has been breached. • Unless the Contractor is otherwise instructed, Contractor is to first seek consultation and receive authorization from BOE prior to notifying the individuals whose personal identity information was compromised by the breach of security, the New York State Chief Information Security Office, the Department of State Division of Consumer Protection, the Attorney General’s Office or any consuming reporting agencies of a breach of the information security system or concerning any determination to delay notification for law enforcement investigations. • Contractor shall be responsible for providing all notices required by the ISBNA and for all costs associated with providing said notices. • This policy and proce...
INFORMATION SECURITY BREACH. Security breaches that the Processor becomes aware of must always be reported, without undue delay and within a maximum of 24 hours, to the Controller for its knowledge and for the application of measures that are necessary to remedy and mitigate the effects caused. All information necessary for the documentation and resolution of the incident must be attached to said communication. The notification of a security breach shall contain, at a minimum, the following information: · Description of the nature of the violation. · Categories and the approximate number of stakeholders affected. · Categories and the approximate number of data records affected. · Description of the possible consequences of the security breach. · Measures taken or proposed to remedy or mitigate the effects. · Contact details where more information can be obtained (DPO, Safety Officer, etc.). When the security breach has occurred under the responsibility of the Processor, the Controller may require it to notify the Supervisory Authority and, if necessary, to communicate it to the affected data subjects.
