NOTICE OF DATA BREACH OR DATA INCIDENT Sample Clauses

NOTICE OF DATA BREACH OR DATA INCIDENT. In the event of discovering a Vulnerability, or in the event of a Cyberattack or Data Breach, concerning the SEMS system, infrastructure, or its environment, CONTRACTOR shall (i) provide written notice to SECRETARY of a known Vulnerability as soon as reasonable but no later than twenty-four (24) hours after becoming aware of the Vulnerability. CONTRACTOR shall (ii) provide written notice to SECRETARY of a Cyberattack or Data Breach as immediately as reasonably practicable, but no later than one (1) hour after Service Provider becomes aware of the Cyberattack or Data Breach. Immediately following the CONTRACTOR’s notification to SECRETARY of a Cyberattack or Data Breach, CONTRACTOR and SECRETARY shall coordinate to investigate the Cyberattack or Data Breach. CONTRACTOR shall bear all costs and expenses associated with investigating, reporting, and remediating the Cyberattack or Data Breach and shall cooperate with SECRETARY’s personnel, including any local, state, or federal law enforcement agency to which SECRETARY reports the incident, full, including, without limitation, by providing access to SECRETARY and/or its personnel, to relevant records, logs, files, data reporting or other materials requested. CONTRACTOR expressly agrees that it shall not inform any third party, including any law enforcement agency, of a Cyberattack or Data Breach without first notifying SECRETARY. Notices under this section shall be directed to technical personnel designated by the SECRETARY and shall not be given under Section 20 of this agreement. For the purpose of this section, the below terms shall have the following meaning:
AutoNDA by SimpleDocs

Related to NOTICE OF DATA BREACH OR DATA INCIDENT

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process:

  • Deliverables Upon satisfactory completion of the work authorization, the Engineer shall submit the deliverables as specified in the executed work authorization to the State for review and acceptance.

  • Subprocessors Provider shall enter into written agreements with all Subprocessors performing functions for the Provider in order for the Provider to provide the Services pursuant to the Service Agreement, whereby the Subprocessors agree to protect Student Data in a manner no less stringent than the terms of this DPA.

  • Disposition of Data Upon written request from the LEA, Provider shall dispose of or provide a mechanism for the LEA to transfer Student Data obtained under the Service Agreement, within sixty (60) days of the date of said request and according to a schedule and procedure as the Parties may reasonably agree. Upon termination of this DPA, if no written request from the LEA is received, Provider shall dispose of all Student Data after providing the LEA with reasonable prior notice. The duty to dispose of Student Data shall not extend to Student Data that had been De-Identified or placed in a separate student account pursuant to section II 3. The LEA may employ a “Directive for Disposition of Data” form, a copy of which is attached hereto as Exhibit “D”. If the LEA and Provider employ Exhibit “D,” no further written request or notice is required on the part of either party prior to the disposition of Student Data described in Exhibit “D.

  • Subprocessor For the purposes of this DPA, the term “Subprocessor” (sometimes referred to as the “Subcontractor”) means a party other than LEA or Provider, who Provider uses for data collection, analytics, storage, or other service to operate and/or improve its service, and who has access to Student Data.

  • Force Majeure If by reason of Force Majeure, either party hereto shall be rendered unable wholly or in part to carry out its obligations under this Agreement then such party shall give notice and full particulars of Force Majeure in writing to the other party within a reasonable time after occurrence of the event or cause relied upon, and the obligation of the party giving such notice, so far as it is affected by such Force Majeure, shall be suspended during the continuance of the inability then claimed, except as hereinafter provided, but for no longer period, and such party shall endeavor to remove or overcome such inability with all reasonable dispatch. Choice of Law The Agreement between the Vendor and TIPS/ESC Region 8 and any addenda or other additions resulting from this procurement process, however described, shall be governed by, construed and enforced in accordance with the laws of the State of Texas, regardless of any conflict of laws principles. Venue, Jurisdiction and Service of Process Any Proceeding arising out of or relating to this procurement process or any contract issued by TIPS resulting from or any contemplated transaction shall be brought in a court of competent jurisdiction in Camp County, Texas and each of the parties irrevocably submits to the exclusive jurisdiction of said court in any such proceeding, waives any objection it may now or hereafter have to venue or to convenience of forum, agrees that all claims in respect of the Proceeding shall be heard and determined only in any such court, and agrees not to bring any proceeding arising out of or relating to this procurement process or any contract resulting from or any contemplated transaction in any other court. The parties agree that either or both of them may file a copy of this paragraph with any court as written evidence of the knowing, voluntary and freely bargained for agreement between the parties irrevocably to waive any objections to venue or to convenience of forum. Process in any Proceeding referred to in the first sentence of this Section may be served on any party anywhere in the world. Venue for any dispute resolution process, other than litigation, between TIPS and the Vendor shall be located in Camp or Xxxxx County, Texas.

  • De-Identified Data Provider agrees not to attempt to re-identify de-identified Student Data. De-Identified Data may be used by the Provider for those purposes allowed under FERPA and the following purposes:

  • Confidential Information “Confidential Information” is all confidential information disclosed by a party (“Disclosing Party”) to the other party (“Receiving Party”), whether orally or in writing, that is designated as confidential or that reasonably should be understood to be confidential given the nature of the information and the circumstances of disclosure. Your Confidential Information will include Your Data. Intermedia’s Confidential Information will include the Services (and any portion thereof), the terms and conditions of this Agreement and any Schedules, and all related Service order forms, as well as Intermedia’s business and marketing plans, technology and technical information, product plans and designs, and business processes disclosed by Intermedia. Confidential Information will not include any information that (i) is or becomes generally known to the public without breach of any obligation owed to the Disclosing Party, (ii) was known to the Receiving Party prior to its disclosure by the Disclosing Party without breach of any obligation owed to the Disclosing Party, (iii) is received from a third party without breach of any obligation owed to the Disclosing Party, or (iv) was independently developed by the Receiving Party. The Receiving Party may disclose Confidential Information to the extent required to comply with binding orders of governmental entities that have jurisdiction over it; provided however that, to the extent legally permitted by law to do so, the Receiving Party gives the Disclosing Party reasonable written notice to allow the Disclosing Party to seek a protective order or other appropriate remedy, discloses only such Confidential Information as is required by the governmental entity, and uses commercially reasonable efforts to obtain confidential treatment for any Confidential Information disclosed. You acknowledge that Intermedia, and its licensors, retain all intellectual property rights and title, in and to, all of their Confidential Information and/or other proprietary information. This shall include, but not be limited to: products, services, and the ideas, concepts, techniques, inventions, processes, software or works of authorship developed, embodied in, or practiced in connection with the Services provided by Intermedia hereunder.

  • Authorized Use The Student Data shared pursuant to the Service Agreement, including persistent unique identifiers, shall be used for no purpose other than the Services outlined in Exhibit A or stated in the Service Agreement and/or otherwise authorized under the statutes referred to herein this DPA.

  • SERVICE LEVELS All service level requirements will be set forth in Exhibit A (“XXXX.xxx Referral Service Level Requirements”). Recipient Xxxxxx agrees to adhere, and encourage Recipient Agent’s adherence, with the version of the XXXX.xxx Referral Service Level Requirements in effect at the time XXXX.xxx identifies the Referral to Recipient Broker/Agent.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!