Information Security Incident Notification Sample Clauses

Information Security Incident Notification. In the event of any breach or cybersecurity incident impacting Agent that has a reasonable likelihood of resulting in the loss or unauthorized access, use, or disclosure of PII or otherwise prevents Agent from complying with all of the privacy and security requirements set forth in this Agreement or applicable laws and regulations (“Security Incident”), Agent will, at its sole expense (i) immediately (and in any event within 24 hours after Agent, or its affiliate or subcontractor learns of an data breach or suspected data breach report such incident to Company by sending an email to XX-XX-XXXXXxxxxxxxx@xxxx.xxx, summarizing in reasonable detail the effect on Company or Company Affiliates, if known, and designating a single point of contact at Agent who will be available to Company 24x7 for information and assistance related to the Information Security Incident; Agent hereby certifies to Company that it understands the restrictions and obligations set forth in this Section and will ensure that Agent and anyone acting on Agent’s behalf comply with the same. As needed to comply with applicable laws and regulations concerning the processing of PII or personal information security, or to the extent required by any changes in such laws or the enactment of new laws, the Parties agree to work cooperatively and in good faith to amend this Agreement in a mutually agreeable and timely manner, or to enter into further mutually agreeable agreements in an effort to comply with any such laws applicable to the Parties. If the Parties cannot so agree, or if Agent cannot comply with the new or additional requirements, Company may terminate this Agreement upon written notice to Agent.
AutoNDA by SimpleDocs
Information Security Incident Notification. If Oort becomes aware of an Information Security Incident, Oort will: (a) notify Customer of the Information Security Incident without undue delay after becoming aware of the Information Security Incident; and (b) take reasonable steps to identify the case of such Information Security Incident, minimize harm and prevent a recurrence.
Information Security Incident Notification. If Botsify Inc. becomes aware of an Information Security Incident, Botsify Inc. will: (a) notify Customer of the Information Security Incident without undue delay after becoming aware of the Information Security Incident; and (b) take reasonable steps to identify the case of such Information Security Incident, minimize harm and prevent a recurrence.
Information Security Incident Notification. If Blinkfire Analytics becomes aware of an Information Security Incident, Blinkfire Analytics will: (a) notify Customer of the Information Security Incident without undue delay after becoming aware of the Information Security Incident; and (b) take reasonable steps to identify the cause of such Information Security Incident, minimise harm and prevent a recurrence. Customer agrees that the provisions of this Section 5.2 (Information Security Incidents) satisfy the requirements under Clause 5(d)(2) of the Model Contract Clauses.
Information Security Incident Notification. (a) Vendor shall immediately inform Company in writing of any Information Security Incident of which Vendor becomes aware, but in no case longer than twenty-four (24) hours after it becomes aware of the Information Security Incident. The notification to Company shall include all available information regarding such Information Security Incident, including information on: (i) the nature of the Information Security Incident including where possible, the categories and approximate number of affected individuals and the categories and approximate number of affected Personal Information records; (ii) the likely consequences of the Information Security Incident; and (iii) the measures taken or proposed to be taken to address the Information Security Incident, including, where appropriate, measures to mitigate its possible adverse effects.
Information Security Incident Notification. (a) In the event of any Information Security Incident, Voya will, at its sole expense promptly (and in any event within 72 hours after Voya confirms an Information Security Incident) report such Information Security Incident to Client by sending an email to Client Contact Information, summarizing in reasonable detail the effect on Client, if known, and designating a single point of contact at Voya who will be:

Related to Information Security Incident Notification

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Acknowledgement Regarding Purchaser’s Trading Activity Anything in this Agreement or elsewhere herein to the contrary notwithstanding (except for Sections 3.2(e) and 4.14 hereof), it is understood and acknowledged by the Company that: (i) none of the Purchasers has been asked by the Company to agree, nor has any Purchaser agreed, to desist from purchasing or selling, long and/or short, securities of the Company, or “derivative” securities based on securities issued by the Company or to hold the Securities for any specified term; (ii) past or future open market or other transactions by any Purchaser, specifically including, without limitation, Short Sales or “derivative” transactions, before or after the closing of this or future private placement transactions, may negatively impact the market price of the Company’s publicly-traded securities; (iii) any Purchaser, and counter-parties in “derivative” transactions to which any such Purchaser is a party, directly or indirectly, presently may have a “short” position in the Common Stock, and (iv) each Purchaser shall not be deemed to have any affiliation with or control over any arm’s length counter-party in any “derivative” transaction. The Company further understands and acknowledges that (y) one or more Purchasers may engage in hedging activities at various times during the period that the Securities are outstanding, including, without limitation, during the periods that the value of the Warrant Shares deliverable with respect to Securities are being determined, and (z) such hedging activities (if any) could reduce the value of the existing stockholders' equity interests in the Company at and after the time that the hedging activities are being conducted. The Company acknowledges that such aforementioned hedging activities do not constitute a breach of any of the Transaction Documents.

  • Acknowledgment Regarding Purchaser’s Trading Activity Anything in this Agreement or elsewhere herein to the contrary notwithstanding (except for Sections 3.2(f) and 4.14 hereof), it is understood and acknowledged by the Company that: (i) none of the Purchasers has been asked by the Company to agree, nor has any Purchaser agreed, to desist from purchasing or selling, long and/or short, securities of the Company, or “derivative” securities based on securities issued by the Company or to hold the Securities for any specified term; (ii) past or future open market or other transactions by any Purchaser, specifically including, without limitation, Short Sales or “derivative” transactions, before or after the closing of this or future private placement transactions, may negatively impact the market price of the Company’s publicly-traded securities; (iii) any Purchaser, and counter-parties in “derivative” transactions to which any such Purchaser is a party, directly or indirectly, presently may have a “short” position in the Common Stock, and (iv) each Purchaser shall not be deemed to have any affiliation with or control over any arm’s length counter-party in any “derivative” transaction. The Company further understands and acknowledges that (y) one or more Purchasers may engage in hedging activities at various times during the period that the Securities are outstanding, including, without limitation, during the periods that the value of the Warrant Shares deliverable with respect to Securities are being determined, and (z) such hedging activities (if any) could reduce the value of the existing stockholders’ equity interests in the Company at and after the time that the hedging activities are being conducted. The Company acknowledges that such aforementioned hedging activities do not constitute a breach of any of the Transaction Documents.

Time is Money Join Law Insider Premium to draft better contracts faster.