Notification and Data Breaches Sample Clauses

Notification and Data Breaches. Vendor agrees to comply with all applicable laws that require the notification of individuals in the event of unauthorized release of personally identifiable information or other event requiring notification. In the event of a data breach of any Vendor's security obligations or other event requiring notification under applicable law, Vendor agrees to assume responsibility for informing all such individuals in accordance with applicable laws and to indemnify, hold harmless and defend FIU against any claims, damages, or other harm related to such event.
AutoNDA by SimpleDocs
Notification and Data Breaches. For purposes of this article, the term, “Breach,” has the meaning given to it under the applicable Florida (F.S. 501.171) or federal law. Immediately upon discovery of a confirmed or suspected Breach, Contractor shall report both orally and in writing to FIU. In no event shall the report be made more than two (2) business days after Contractor knows or reasonably suspects a Breach has or may have occurred. In the event of a suspected Breach, Contractor shall keep FIU informed regularly of the progress of its investigation until the uncertainty is resolved. Contractor’s report shall identify: (i) The nature of the unauthorized access, use or disclosure, (ii) The data accessed, used or disclosed, (iii) The person(s) who accessed, used and disclosed and/or received data (if known), (iv) What Contractor has done or will do to mitigate any deleterious effect of the unauthorized access, use or disclosure, and (v) What corrective action Contractor has taken or will take to prevent future unauthorized access, use or disclosure. Contractor shall provide such other information, including a written report, as reasonably requested by FIU. In the event of a Breach, Contractor will: (1) immediately preserve any potential forensic evidence relating to the breach; (2) promptly (within 2 business days) designate a contact person to whom FIU will direct inquiries, and who will communicate Contractor responses to FIU inquiries; (3) as rapidly as circumstances permit, apply appropriate resources to remedy the breach condition, investigate, document, restore FIU service(s) as directed by FIU, and undertake appropriate response activities; (4) provide status reports to FIU on Breach response activities, either on a daily basis or a frequency approved by FIU;
Notification and Data Breaches to comply with all applicable laws that require the notification of individuals in the event of unauthorized release of personally identifiable information or other event requiring notification in accordance therewith. In the event of a data breach of any Contractor’s security obligations or other event requiring notification under applicable law (a “Notification Event”), Contractor agrees to assume responsibility for informing all such individuals in accordance with applicable laws and to indemnify, hold harmless and defend UWF against any claims, damages, or other harm related to such Notification Event.
Notification and Data Breaches to comply with all applicable laws that require the notification of individuals in the event of unauthorized release of personally identifiable information or other event requiring notification in accordance therewith. In the event of a data breach of any Vendor’s security obligations or other event requiring notification under applicable law (a “Notification Event”), Vendor agrees to assume responsibility for informing all such individuals in accordance with applicable laws and to indemnify, hold harmless and defend FIU against any claims, damages, or other harm related to such Notification Event.

Related to Notification and Data Breaches

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process: (1) The security breach notification described above shall include, at a minimum, the following information to the extent known by the Provider and as it becomes available: i. The name and contact information of the reporting LEA subject to this section. ii. A list of the types of personal information that were or are reasonably believed to have been the subject of a breach. iii. If the information is possible to determine at the time the notice is provided, then either (1) the date of the breach, (2) the estimated date of the breach, or (3) the date range within which the breach occurred. The notification shall also include the date of the notice. iv. Whether the notification was delayed as a result of a law enforcement investigation, if that information is possible to determine at the time the notice is provided; and v. A general description of the breach incident, if that information is possible to determine at the time the notice is provided. (2) Provider agrees to adhere to all federal and state requirements with respect to a data breach related to the Student Data, including, when appropriate or required, the required responsibilities and procedures for notification and mitigation of any such data breach. (3) Provider further acknowledges and agrees to have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of Student Data or any portion thereof, including personally identifiable information and agrees to provide XXX, upon request, with a summary of said written incident response plan. (4) LEA shall provide notice and facts surrounding the breach to the affected students, parents or guardians. (5) In the event of a breach originating from XXX’s use of the Service, Provider shall cooperate with XXX to the extent necessary to expeditiously secure Student Data.

  • Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Termination and Data Destruction Upon Project Close-out, the Requester and Approved Users agree to destroy all copies, versions, and Data Derivatives of the dataset(s) retrieved from NIH-designated controlled-access databases, on both local servers and hardware, and if cloud computing was used, delete the data and cloud images from cloud computing provider storage, virtual and physical machines, databases, and random access archives, in accord with the NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy. However, the Requester may retain these data as necessary to comply with any institutional policies (e.g., scientific data retention policy), law, and scientific transparency expectations for disseminated research results, and/or journal policies. A Requester who retains data for any of these purposes continues to be a xxxxxxx of the data and is responsible for the management of the retained data in accordance with the NIH Security Best Practices for ControlledAccess Data Subject to the NIH Genomic Data Sharing (GDS) Policy, and any institutional policies. Any retained data may only be used by the PI and Requester to support the findings (e.g., validation) resulting from the research described in the DAR that was submitted by the Requester and approved by NIH. The data may not be used to answer any additional research questions, even if they are within the scope of the approved Data Access Request, unless the Requester submits a new DAR and is approved by NIH to conduct the additional research. If a Requester retains data for any of these purposes, the relevant portions of Terms 4, 5, 6, 7, 8, and 12 remain in effect after termination of this Data Use Certification Agreement. These terms remain in effect until the data is destroyed.

  • Notification of Breach During the term of this Agreement:

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • TERMINATION AND BREACH This License Agreement shall be terminated: a) in the event of any affirmative act of insolvency by MARKETING; or b) upon the appointment of any receiver or trustee to take possession of the properties of MARKETING. REALTY shall have the right to terminate this License Agreement either a) upon a material default by MARKETING under the Master Lease which is not cured within the cure periods specified therein; or b) upon a material default by MARKETING with respect to its obligations under the Reorganization and Distribution Agreement between the parties of even date which is not Rcured within the cure periods specified therein. In the event of any other breach or threatened breach of this License Agreement, notice shall be given and the parties shall promptly consult in good faith to cure such breach, with the party at fault being given an adequate period of time to remedy the matter. If such breach is not cured within sixty (60) days of the notice, the matter may be submitted to arbitration in accordance with paragraph 16 below, which may include a determination whether a material breach has occurred and/or been cured. In the event the arbitrator determines that a material breach has occurred, the arbitrator shall not be authorized to terminate this License Agreement (except in the case of a material breach by MARKETING which creates a substantial likelihood of loss of rights in the Licensed Marks) but shall be authorized to issue any other order or award any other relief deemed appropriate, including, without limitation, injunctive relief. In the event of a material breach by MARKETING which creates a substantial likelihood of loss of rights in the Licensed Marks, the arbitrator shall be authorized to issue any order awarding any relief deemed appropriate, including, without limitation, injunctive relief, and further providing that in the event MARKETING fails to comply with the relief ordered within a specified period of time, the license shall be terminated.

  • Notification of personal data breach 1. In case of any personal data breach, the data processor shall, without undue delay after having become aware of it, notify the data controller of the personal data breach. 2. The data processor’s notification to the data controller shall, if possible, take place within 24 hours after the data processor has become aware of the personal data breach to enable the data controller to comply with the data controller’s obligation to notify the personal data breach to the competent supervisory authority, cf. Article 33

  • Handling Sensitive Personal Information and Breach Notification A. As part of its contract with HHSC Contractor may receive or create sensitive personal information, as section 521.002 of the Business and Commerce Code defines that phrase. Contractor must use appropriate safeguards to protect this sensitive personal information. These safeguards must include maintaining the sensitive personal information in a form that is unusable, unreadable, or indecipherable to unauthorized persons. Contractor may consult the “Guidance to Render Unsecured Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals” issued by the U.S. Department of Health and Human Services to determine ways to meet this standard. B. Contractor must notify HHSC of any confirmed or suspected unauthorized acquisition, access, use or disclosure of sensitive personal information related to this Contract, including any breach of system security, as section 521.053 of the Business and Commerce Code defines that phrase. Contractor must submit a written report to HHSC as soon as possible but no later than 10 business days after discovering the unauthorized acquisition, access, use or disclosure. The written report must identify everyone whose sensitive personal information has been or is reasonably believed to have been compromised. C. Contractor must either disclose the unauthorized acquisition, access, use or disclosure to everyone whose sensitive personal information has been or is reasonably believed to have been compromised or pay the expenses associated with HHSC doing the disclosure if: 1. Contractor experiences a breach of system security involving information owned by HHSC for which disclosure or notification is required under section 521.053 of the Business and Commerce Code; or 2. Contractor experiences a breach of unsecured protected health information, as 45 C.F.R. §164.402 defines that phrase, and HHSC becomes responsible for doing the notification required by 45 C.F.R. §164.404. HHSC may, at its discretion, waive Contractor's payment of expenses associated with HHSC doing the disclosure.

  • Notification of Breach / Compliance Reports The Adviser shall notify the Trust immediately upon detection of (i) any material failure to manage any Fund in accordance with its investment objectives and policies or any applicable law; or (ii) any material breach of any of the Funds’ or the Adviser’s policies, guidelines or procedures. In addition, the Adviser shall provide a quarterly report regarding each Fund’s compliance with its investment objectives and policies, applicable law, including, but not limited to the 1940 Act and Subchapter M of the Code, as applicable, and the Fund’s policies, guidelines or procedures as applicable to the Adviser’s obligations under this Agreement. The Adviser agrees to correct any such failure promptly and to take any action that the Board may reasonably request in connection with any such breach. Upon request, the Adviser shall also provide the officers of the Trust with supporting certifications in connection with such certifications of Fund financial statements and disclosure controls pursuant to the Xxxxxxxx-Xxxxx Act. The Adviser will promptly notify the Trust in the event (i) the Adviser is served or otherwise receives notice of any action, suit, proceeding, inquiry or investigation, at law or in equity, before or by any court, public board, or body, involving the affairs of the Trust (excluding class action suits in which a Fund is a member of the plaintiff class by reason of the Fund’s ownership of shares in the defendant) or the compliance by the Adviser with the federal or state securities laws or (ii) an actual change in control of the Adviser resulting in an “assignment” (as defined in the 0000 Xxx) has occurred or is otherwise proposed to occur.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!