Information Security Incidents and/or Breaches Sample Clauses

Information Security Incidents and/or Breaches. If an ENTITY knows of an activity or practice of ENTITY that constitutes a material breach or violation of ENTITY’s obligation, ENTITY must take reasonable steps to cure the breach or end the violation. A. Information Security Incidents and/or Breaches Response Responsibility. ENTITY shall be responsible for facilitating the Information Security Incident and/or Breach response process as described in 45 CFR 164.308 B. Discovery and Notification of Information Security Incidents and/or Breaches. ENTITY shall notify the STATE Program Contract Manager and the STATE Information Security Officer immediately by telephone call and email upon the discovery of the Information Security Incident and/or Breach affecting the security of CURES data if the CURES data was, or is reasonably believed to have been, acquired by an unauthorized person, or there is an intrusion, potential loss, actual loss, or unauthorized use or disclosure of the CURES data is in violation of this MOU, this provision, or applicable state or federal law. ENTITY shall take: i. Prompt corrective action to mitigate the risks or damages involved with the Information Security Incident and/or Breach and to protect the operating environment; and ii. Any action pertaining to such unauthorized disclosure required by applicable Federal and State laws and regulations. C. Investigation of Information Security Incidents and/or Breaches. ENTITY shall promptly investigate such Information Security Incidents and/or Breaches.
AutoNDA by SimpleDocs
Information Security Incidents and/or Breaches. If an ENTITY knows of an activity or practice of ENTITY that constitutes a material breach or violation of ENTITY’s obligation, ENTITY must take reasonable steps to cure the breach or end the violation. A. Information Security Incidents and/or Breaches Response Responsibility. B. Discovery and Notification of Information Security Incidents and/or Breaches. ENTITY shall notify the STATE Program Contract Manager and the STATE Information Security Officer immediately by telephone call and email upon the discovery of the Information Security Incident and/or Breach affecting the security of CURES data if the CURES data was, or is reasonably believed to have been, acquired by an unauthorized person, or there is an intrusion, potential loss, actual loss, or unauthorized use or disclosure of the CURES data is in violation of this MOU, this provision, or applicable state or federal law. ENTITY shall take: i. Prompt corrective action to mitigate the risks or damages involved with the Information Security Incident and/or Breach and to protect the operating environment; and ii. Any action pertaining to such unauthorized disclosure required by applicable Federal and State laws and regulations. C. Investigation of Information Security Incidents and/or Breaches. ENTITY shall promptly investigate such Information Security Incidents and/or Breaches.
Information Security Incidents and/or Breaches. If an ENTITY knows of an activity or practice of ENTITY that constitutes a material breach or violation of ENTITY’s obligation, ENTITY must take reasonable steps to cure the breach or end the violation. Violations include the failure to implement safeguards that reasonably and appropriately protect e-PHI. A. Information Security Incidents and/or Breaches Response Responsibility. ENTITY shall be responsible for facilitating the Information Security Incident and/or Breach response process as described in 45 CFR 164.308 B. Discovery and Notification of Information Security Incidents and/or Breaches. ENTITY shall notify the STATE Program Contract Manager and the STATE Information Security Officer immediately by telephone call and email upon the discovery of the Information Security Incident and/or Breach affecting the security of CURES data if the CURES data was, or is reasonably believed to have been, acquired by an unauthorized person, or there is an intrusion, potential loss, actual loss, or unauthorized use or disclosure of the CURES data is in violation of this MOU, this provision, or applicable state or federal law. ENTITY shall take: i. Prompt corrective action to mitigate the risks or damages involved with the Information Security Incident and/or Breach and to protect the operating environment; and ii. Any action pertaining to such unauthorized disclosure required by applicable Federal and State laws and regulations. C. Investigation of Information Security Incidents and/or Breaches. ENTITY shall promptly investigate such Information Security Incidents and/or Breaches. STATE shall have the right to participate in the investigation of such Information Security Incidents and/or Breaches. STATE shall also have the right to conduct its own independent investigation, and ENTITY shall cooperate fully in such investigations.

Related to Information Security Incidents and/or Breaches

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Personal Information security breach Supplier/Service Provider’s Obligations a) The Supplier/Service Provider shall notify the Information Officer of Transnet, in writing as soon as possible after it becomes aware of or suspects any loss, unauthorised access or unlawful use of any personal data and shall, at its own cost, take all necessary remedial steps to mitigate the extent of the loss or compromise of personal data and to restore the integrity of the affected Goods/Services as quickly as is possible. The Supplier/Service Provider shall also be required to provide Transnet with details of the persons affected by the compromise and the nature and extent of the compromise, including details of the identity of the unauthorised person who may have accessed or acquired the personal data. b) The Supplier/Service Provider shall provide on-going updates on its progress in resolving the compromise at reasonable intervals until such time as the compromise is resolved. c) Where required, the Supplier/Service Provider may be required to notify the South African Police Service; and/or the State Security Agency and where applicable, the relevant regulator and/or the affected persons of the security breach. Any such notification shall always include sufficient information to allow the persons to take protective measures against the potential consequences of the compromise. d) The Supplier/Service Provider undertakes to co‑operate in any investigation relating to security which is carried out by or on behalf of Transnet including providing any information or material in its possession or control and implementing new security measures.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • WAIVER OR BREACH It is agreed that a waiver by either party of a breach of any provision of this Agreement shall not operate, or be construed, as a waiver of any subsequent breach by that same party.

  • Authority; No Breach By Agreement (a) NDC has the corporate power and authority necessary to execute, deliver and perform its obligations under this Agreement and to consummate the transactions contemplated hereby. The execution, delivery and performance of this Agreement and the consummation of the transactions contemplated herein, including the Merger, have been duly and validly authorized by all necessary corporate action in respect thereof on the part of NDC. This Agreement represents a legal, valid, and binding obligation of NDC, enforceable against NDC in accordance with its terms (except in all cases as such enforceability may be limited by applicable bankruptcy, insolvency, reorganization, receivership, conservatorship, moratorium, or similar Laws affecting the enforcement of creditors' rights generally and except that the availability of the equitable remedy of specific performance or injunctive relief is subject to the discretion of the court before which any proceeding may be brought). (b) Neither the execution and delivery of this Agreement by NDC, nor the consummation by NDC of the transactions contemplated hereby, nor compliance by NDC with any of the provisions hereof, will (i) conflict with or result in a breach of any provision of NDC's Certificate of Incorporation or Bylaws, or (ii) constitute or result in a Default under, or require any Consent pursuant to, or result in the creation of any Lien on any Asset of any NDC Entity under, any Contract or Permit of any NDC Entity, or, (iii) subject to receipt of the requisite Consents referred to in Section 9.1(b), constitute or result in a Default under, or require any Consent pursuant to, any Law or Order applicable to any NDC Entity or any of their respective material Assets. (c) Other than in connection or compliance with the provisions of the Securities Laws, applicable state corporate and securities Laws, and rules of the NYSE, and other than Consents required from Regulatory Authorities, and other than notices to or filings with the Internal Revenue Service or the Pension Benefit Guaranty Corporation with respect to any employee benefit plans, or under the HSR Act, no notice to, filing with, or Consent of, any public body or authority is necessary for the consummation by NDC of the Merger and the other transactions contemplated in this Agreement.

  • FALSE STATEMENTS; BREACH OF REPRESENTATIONS The Parties acknowledge that this Agreement has been negotiated, and is being executed, in reliance upon the information contained in the Application, and any supplements or amendments thereto, without which the Comptroller would not have approved this Agreement and the District would not have executed this Agreement. By signature to this Agreement, the Applicant: A. represents and warrants that all information, facts, and representations contained in the Application are true and correct to the best of its knowledge; B. agrees and acknowledges that the Application and all related attachments and schedules are included by reference in this Agreement as if fully set forth herein; and C. acknowledges that if the Applicant submitted its Application with a false statement, signs this Agreement with a false statement, or submits a report with a false statement, or it is subsequently determined that the Applicant has violated any of the representations, warranties, guarantees, certifications, or affirmations included in the Application or this Agreement, the Applicant shall have materially breached this Agreement and the Agreement shall be invalid and void except for the enforcement of the provisions required by Section 9.2 of this Agreement.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!