Information Security Incident Management Policy & Procedures Content Sample Clauses

Information Security Incident Management Policy & Procedures Content. Contractor should establish a formal information security event reporting procedure, together with an incident response and escalation procedure to be executed in the event of a potential incident.
AutoNDA by SimpleDocs

Related to Information Security Incident Management Policy & Procedures Content

  • SYSTEM AGENCY DATA A. As between the Parties, all data and information acquired, accessed, or made available to Grantee by, through, or on behalf of System Agency or System Agency contractors, including all electronic data generated, processed, transmitted, or stored by Grantee in the course of providing data processing services in connection with Xxxxxxx’s performance hereunder (the “System Agency Data”), is owned solely by System Agency.

  • How Do I Get More Information? For more information, including the full Notice, Claim Forms and Settlement Agreement go to xxx.xxxxxxxxxxxxxxxxxxxx.xxx, contact the settlement administrator at 0-000-000-0000, or call Class Counsel at 1-866-354-3015. Exhibit E UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF FLORIDA Xxxxx v. AvMed, Inc., Case No. 10-cv-24513 If You Paid for or Received Insurance from AvMed, Inc. at Any Time Through December of 2009, You May Be Part of a Class Action Settlement. IMPORTANT: PLEASE READ THIS NOTICE CAREFULLY. THIS NOTICE RELATES TO THE PENDENCY OF A CLASS ACTION LAWSUIT AND, IF YOU ARE A MEMBER OF THE SETTLEMENT CLASSES, CONTAINS IMPORTANT INFORMATION ABOUT YOUR RIGHTS TO MAKE A CLAIM UNDER THE SETTLEMENT OR TO OBJECT TO THE SETTLEMENT (A federal court authorized this notice. It is not a solicitation from a lawyer.) Your legal rights are affected whether or not you act. Please read this notice carefully. YOUR LEGAL RIGHTS AND OPTIONS IN THIS SETTLEMENT SUBMIT A CLAIM FORM This is the only way to receive a payment. EXCLUDE YOURSELF You will receive no benefits, but you will retain any rights you currently have to xxx the Defendant about the claims in this case. OBJECT Write to the Court explaining why you don’t like the Settlement. GO TO THE HEARING Ask to speak in Court about your opinion of the Settlement. DO NOTHING You won’t get a share of the Settlement benefits and will give up your rights to xxx the Defendant about the claims in this case. These rights and options – and the deadlines to exercise them – are explained in this Notice. QUESTIONS? CALL 0-000-000-0000 TOLL FREE, OR VISIT XXX.XXXXXXXXXXXXXXXXXXXX.XXX PARA UNA NOTIFICACIÓN EN ESPAÑOL, LLAMAR O VISITAR NUESTRO WEBSITE BASIC INFORMATION

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • SCOPE OF SERVICES/CASE HANDLING A. Upon execution by Xxxxxx, Attorneys are retained to provide legal services for the purpose of seeking damages and other relief in the Litigation. Client agrees that Xxxxxx may choose to associate additional law firm(s) and/or lawyer(s) to represent Client in connection with the investigation and prosecution of the rights Client has as a purchaser of publically traded securities of Xxxxxx, and Client understands that such representation shall be on the same terms as those described in this agreement.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Secure Information Handling and Transfers 7.1 Physical and electronic handling, processing and transferring of DWP Data, including secure access to systems and the use of encryption where appropriate.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Monitoring and Management Information C10.1 The Contractor shall comply with the monitoring arrangements set out in the Monitoring Schedule including, but not limited to, providing such data and information as the Contractor may be required to produce under the Contract.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • Individual Special Circumstance Arrangements Notwithstanding Article 2.02, the Home and the Union may agree in certain circumstances, to adjust the schedule of an individual full-time employee who normally works seventy five (75) hours bi-weekly, to enable an average bi-weekly work assignment of sixty (60) to seventy five (75) hours.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!