Investigation of Breach and Security Incidents Sample Clauses

Investigation of Breach and Security Incidents. The Contractor shall immediately investigate such breach or security incident. As soon as the information is known and subject to the legitimate needs of law enforcement, Contractor shall inform the DSH Program Contract Manager, the DSH Privacy Officer, and the DSH Chief Information Security Officer of: 1. what data elements were involved, and the extent of the data disclosure or access involved in the breach, including, specifically, the number of individuals whose personal information was breached; and 2. a description of the unauthorized persons known or reasonably believed to have improperly used the DSH PCI and/or a description of the unauthorized persons known or reasonably believed to have improperly accessed or acquired the DSH PCI, or to whom it is known or reasonably believed to have had the DSH PCI improperly disclosed to them; and 3. a description of where the DSH PCI is believed to have been improperly used or disclosed; and 4. a description of the probable and proximate causes of the breach or security incident; and
AutoNDA by SimpleDocs
Investigation of Breach and Security Incidents. The Agency shall immediately investigate such breach or security incident. As soon as the information is known and shall inform the City of: i. what data elements were involved, and the extent of the data disclosure or access involved in the breach, including, specifically, the number of individuals whose personal information was breached; and ii. a description of the unauthorized persons known or reasonably believed to have improperly used the City Data and/or a description of the unauthorized persons known or reasonably believed to have improperly accessed or acquired the City Data, or to whom it is known or reasonably believed to have had the City Data improperly disclosed to them; and iii. a description of where the City Data is believed to have been improperly used or disclosed; and iv. a description of the probable and proximate causes of the breach or security incident; and v. whether any federal or state laws requiring individual notifications of breaches have been triggered.
Investigation of Breach and Security Incidents. Blue Shield shall immediately investigate such Breach or Security Incident. As soon as the information is known, and subject to the legitimate needs of law enforcement, Blue Shield shall inform the Agency Contract Manager, the CDPH Privacy Officer, and the CDPH Chief Information Security Officer of: 1. what data elements were involved and the extent of the data unauthorized Use or Disclosure involved in the Breach or Security Incident, including, specifically, the number of individuals whose CDPH PCI was breached; and 2. a description of the unauthorized persons known or reasonably believed to have improperly Used or Disclosed the CDPH PCI, and/or to the persons whom it is known or reasonably believed to have had the CDPH PCI improperly Disclosed to them; and 3. a description of where the CDPH PCI is believed to have been improperly Used or Disclosed; and
Investigation of Breach and Security Incidents. The Applicant shall immediately investigate such breach or security incident. As soon as the information is known and subject to the legitimate needs of law enforcement, Applicant shall inform the CDPH Program Contract Manager, the CDPH Privacy Officer, and the CDPH Chief Information Security Officer of: 1. what data elements were involved, and the extent of the data disclosure or access involved in the breach, including, specifically, the number of individuals whose personal information was breached; and 2. a description of the unauthorized persons known or reasonably believed to have improperly used the CDPH PCI and/or a description of the unauthorized persons known or reasonably believed to have improperly accessed or acquired the CDPH PCI, or to whom it is known or reasonably believed to have had the CDPH PCI improperly disclosed to them; and 3. a description of where the CDPH PCI is believed to have been improperly used or disclosed; and 4. a description of the probable and proximate causes of the breach or security incident; and 5. whether Civil Code section 1798.29 or any other federal or state laws requiring individual notifications of breaches have been triggered.
Investigation of Breach and Security Incidents. The Contractor shall immediately investigate such breach or security incident. As soon as the information is known and subject to the legitimate needs of law enforcement, Contractor shall inform the CDPH Program Contract Manager, the CDPH Privacy Officer, and the CDPH Chief Information Security Officer of: 1. what data elements were involved and the extent of the data disclosure or access involved in the breach, including, specifically, the number of individuals whose personal information was breached; and 2. a description of the unauthorized persons known or reasonably believed to have improperly used the CDPH PCI and/or a description of the unauthorized persons known or reasonably believed to have improperly accessed or acquired the CDPH PCI, or to whom it is known or reasonably believed to have had the CDPH PCI improperly disclosed to them; and 3. a description of where the CDPH PCI is believed to have been improperly used or disclosed; and CDPH IPSR (10/19)

Related to Investigation of Breach and Security Incidents

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Investigation of Breach If the Seller (i) has knowledge of a breach of a representation or warranty made in Section 3.4, (ii) receives notice from the Depositor, the Trust, the Owner Trustee or the Indenture Trustee of a breach of a representation or warranty made in Section 3.4, (iii) receives a written request to repurchase a Receivable due to an alleged breach of a representation and warranty in Section 3.4 from the Owner Trustee, the Indenture Trustee, any Verified Note Owner or any Noteholder (which repurchase request shall provide sufficient detail so as to allow the Seller to reasonably investigate the alleged breach of the representations and warranties in Section 3.4; provided, that with respect to a repurchase request from a Noteholder or a Verified Note Owner, such repurchase request shall initially be provided to the Indenture Trustee) for a Receivable (each, a “Repurchase Request”) or (iv) receives a final report from the Asset Representations Reviewer that indicates that the Asset Representations Reviewer has determined that a test procedure under the Asset Representations Review Agreement has not been satisfied with respect to a representation or warranty set forth in Section 3.4 for a Receivable, then, in each case, the Seller will investigate the Receivable to confirm the breach and determine if the breach materially and adversely affects the interests of the Purchaser, the Issuer or the Noteholders in any Receivable. None of the Servicer, the Issuer, the Owner Trustee, the Indenture Trustee, the Asset Representations Reviewer or the Administrator will have an obligation to investigate whether a breach of any representation or warranty has occurred or whether any Receivable is required to be repurchased under this Section 3.5.

  • Investigation of Accidents The Occupational Health and Safety Committees, as provided in Clause 22.2, shall be notified of each accident or injury and shall investigate and report to the Union and Employer on the nature and cause of the accident or injury. In the event of a fatality the Employer shall immediately notify the President of the nature and circumstances of the accident.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • No Conflict, Breach, Violation or Default The execution, delivery and performance of the Transaction Documents by the Company and the issuance and sale of the Securities will not conflict with or result in a breach or violation of any of the terms and provisions of, or constitute a default under (i) the Company’s Articles of Incorporation or the Company’s Bylaws, both as in effect on the date hereof (true and complete copies of which have been made available to the Investor through the XXXXX system), or (ii)(a) any statute, rule, regulation or order of any governmental agency or body or any court, domestic or foreign, having jurisdiction over the Company, any Subsidiary or any of their respective assets or properties, or (b) any agreement or instrument to which the Company or any Subsidiary is a party or by which the Company or a Subsidiary is bound or to which any of their respective assets or properties is subject.

  • Complaints Investigation The employee who complains of harassment under the provisions of the Human Rights Code must first comply with the Employer’s harassment policy procedures before filing a grievance or human rights complaint.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Investigations and Remediations Lessor shall retain the responsibility and pay for any investigations or remediation measures required by governmental entities having jurisdiction with respect to the existence of Hazardous Substances on the Premises prior to the Start Date, unless such remediation measure is required as a result of Lessee's use (including "Alterations", as defined in Paragraph 7.3(a) below) of the Premises, in which event Lessee shall be responsible for such payment. Lessee shall cooperate fully in any such activities at the request of Lessor, including allowing Lessor and Lessor's agents to have reasonable access to the Premises at reasonable times in order to carry out Lessor's investigative and remedial responsibilities.

  • Background and Security Investigations 7.5.1 Each of Contractor’s staff performing services under this Contract, who is in a designated sensitive position, as determined by County in County's sole discretion, shall undergo and pass a background investigation to the satisfaction of County as a condition of beginning and continuing to perform services under this Contract. Such background investigation must be obtained through fingerprints submitted to the California Department of Justice to include State, local, and federal-level review, which may include, but shall not be limited to, criminal conviction information. The fees associated with the background investigation shall be at the expense of the Contractor, regardless of whether the member of Contractor’s staff passes or fails the background investigation. If a member of Contractor’s staff does not pass the background investigation, County may request that the member of Contractor’s staff be removed immediately from performing services under the Contract. Contractor shall comply with County’s request at any time during the term of the Contract. County will not provide to Contractor or to Contractor’s staff any information obtained through the County’s background investigation. 7.5.2 County, in its sole discretion, may immediately deny or terminate facility access to any member of Contractor’s staff that does not pass such investigation to the satisfaction of the County or whose background or conduct is incompatible with County facility access. 7.5.3 Disqualification of any member of Contractor’s staff pursuant to this Paragraph 7.5 shall not relieve Contractor of its obligation to complete all work in accordance with the terms and conditions of this Contract.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!