LOSS OR UNAUTHORISED RELEASE Sample Clauses

LOSS OR UNAUTHORISED RELEASE. 13.1. CORE data providers will report to MHCLG any loss or unauthorised release of the Data as soon as possible and no later than 24 hours after the loss or unauthorised release is identified.
AutoNDA by SimpleDocs
LOSS OR UNAUTHORISED RELEASE. 11.1 The Local Authority and MHCLG (including any contractor and the evaluation contractor) will report to all parties (MHCLG, The Local Authority) any loss or unauthorised release of the personal data no later than 48 hours after the loss or unauthorised release is identified [/comes to their attention]. In the case of a personal data breach, the controller shall without undue delay and, where feasible, not later than 72 hours after having become aware of it, notify the personal data breach to the supervisory authority competent in accordance with Article 55, unless the personal data breach is unlikely to result in a risk to the rights and freedoms of natural persons. Where the notification to the supervisory authority is not made within 72 hours, it shall be accompanied by reasons for the delay.
LOSS OR UNAUTHORISED RELEASE. 13.1. The Council and DCLG will report to both parties (DCLG and the Council) any loss or unauthorised release of the Data as soon as possible and no later than 24 hours after the loss or unauthorised release is identified. DCLG will instruct ONS to do so. DCLG will inform the Information Commissioners Office if both parties agree there has been a serious breach.
LOSS OR UNAUTHORISED RELEASE. 11.1. CORE data providers will report to DLUHC any loss or unauthorised release of the Data as soon as possible and no later than 24 hours after the loss or unauthorised release is identified. DLUHC will report to CORE data providers any loss or unauthorised release of the Data as soon as possible and no later than 24 hours after the loss or unauthorised release is identified.
LOSS OR UNAUTHORISED RELEASE. 13.1. The Council and MHCLG will report to all parties (MHCLG, The Council and the Information Commissioners Office) any loss or unauthorised release of the Data as soon as possible and no later than 24 hours after the loss or unauthorised release is identified.

Related to LOSS OR UNAUTHORISED RELEASE

  • Notification of Xxxxxx and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release.

  • Unauthorised disclosure For the avoidance of doubt, a party will be responsible for any unauthorised disclosure of Confidential Information made by that party’s employees, directors, agents or advisors and by a bona fide potential purchaser to whom Confidential Information has been disclosed by that party under clause 22.2(f).

  • Unauthorised Use of Confidential Information The Supplier/Service Provider shall not authorise any party to act on or use in any way any Confidential Information belonging to Transnet whether or not such party is aware of such Confidential Information, and shall promptly notify Transnet of the information if it becomes aware of any party so acting, and shall provide Transnet the information with such assistance as Transnet reasonably requires, at Transnet’s cost and expense, to prevent such third party from so acting.

  • Unauthorised use We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorised use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgements, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorised such use.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Unauthorised Transactions As between you and Stripe, you are responsible for Card Transactions, and fees and penalties Stripe incurs resulting from any Card Authorised User’s failure to (a) exercise reasonable care in safeguarding Cards from loss or theft; or (b) promptly report loss or theft, including fraud. Additionally, to the extent Law permits, if you or a Card Authorised User allows another party to use the Card or Card Account Data for any purpose or if an unauthorised person uses a Card or Card Account Data, you will be liable for that use, including all losses, damages and costs arising out of or relating to that use. To the extent Law permits, Stripe is not liable for any losses, damages or costs to you or your Card Authorised Users arising out of or relating to (y) unauthorised access to or use of a Card or your Stripe Issuing Account; or (z) your failure to use or implement anti-fraud measures, security controls or any other data security measures.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Unauthorised Payments The Private Party shall not:

Time is Money Join Law Insider Premium to draft better contracts faster.