Notification of Breach of Security Procedures Sample Clauses

Notification of Breach of Security Procedures. You must notify us immediately if there has been a breach of your security, including, without limitation, if any Login Credentials or other Security Procedure has been lost, stolen, misused or compromised or if you believe anyone other than an Authorized User has gained access to them; or if any of your Account information, personal identification information, or other confidential information has been, or may have been, used or accessed without your permission. You should notify the Bank of such breach of security at your local branch or at the telephone numbers of the Bank provided for such purpose on the Bank’s website or in your Account Documents.
AutoNDA by SimpleDocs

Related to Notification of Breach of Security Procedures

  • Notification of Breach During the term of this Agreement:

  • Breach of Security 6.1 Either party shall notify the other immediately upon becoming aware of any Breach of Security including, but not limited to an actual, potential or attempted breach, or threat to, the Security Plan.

  • COMPLIANCE WITH BREACH NOTIFICATION AND DATA SECURITY LAWS Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law § 899-aa and State Technology Law § 208) and commencing March 21, 2020 shall also comply with General Business Law § 899-bb.

  • Indemnification (Breach of Warranty of Security) The Contractor agrees to defend, indemnify and hold harmless the Department, Customer, the State of Florida, its officers, directors and employees for any claims, suits or proceedings related to a breach of the Warranty of Security. The Contractor will include credit monitoring services at its own cost for those individuals affected or potentially affected by a breach of this warranty for a two year period of time following the breach.

  • Notification of Government Investigation or Legal Proceedings Within 30 days after discovery, Xxxxx shall notify OIG, in writing, of any ongoing investigation or legal proceeding known to Xxxxx conducted or brought by a governmental entity or its agents involving an allegation that Xxxxx has committed a crime or has engaged in fraudulent activities. This notification shall include a description of the allegation, the identity of the investigating or prosecuting agency, and the status of such investigation or legal proceeding. Xxxxx shall also provide written notice to OIG within 30 days after the resolution of the matter, and shall provide OIG with a description of the findings and/or results of the proceedings, if any.

  • Data Breach Notification Seller will promptly notify Buyer of any actual or potential exposure or misappropriation of Buyer data ("breach") that comes to Seller's attention. Seller will cooperate with Xxxxx and in investigating any such breach, at Xxxxxx's expense. Seller will likewise cooperate with Buyer and, as applicable, with law enforcement agencies in any effort to notify injured or potentially injured parties, and such cooperation will be at Seller's expense, except to the extent that the breach was caused by Xxxxx. The remedies and obligations set forth in this subsection are in addition to any others Buyer may have, including, but not limited to, any requirements in the “Privacy, Confidentiality, and Security” provisions of this Agreement.

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

  • Notification of Government Investigation or Legal Proceeding Within 30 days after discovery, Progenity shall notify OIG, in writing, of any ongoing investigation or legal proceeding known to Progenity conducted or brought by a governmental entity or its agents involving an allegation that Progenity has committed a crime or has engaged in fraudulent activities. This notification shall include a description of the allegation, the identity of the investigating or prosecuting agency, and the status of such investigation or legal proceeding. Progenity shall also provide written notice to OIG within 30 days after the resolution of the matter, and shall provide OIG with a description of the findings and/or results of the investigation or proceeding, if any.

  • CONFIDENTIALITY AND NON-DISCLOSURE; SECURITY BREACH REPORTING 2.1 For purposes of this Contract, confidential information will not include information or material which (a) enters the public domain (other than as a result of a breach of this Contract); (b) was in the receiving party’s possession prior to its receipt from the disclosing party; (c) is independently developed by the receiving party without the use of confidential information; (d) is obtained by the receiving party from a third party under no obligation of confidentiality to the disclosing party; or (e) is not exempt from disclosure under applicable State law.

  • Notification of Possible Breach BA shall notify CE within twenty-four (24) hours of any suspected or actual breach of Protected Information; any use or disclosure of Protected Information not permitted by the Contract or Addendum; any security incident (i.e., any attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in and information system) related to Protected Information, and any actual or suspected use or disclosure of data in violation of any applicable federal or state laws by BA or its agents or subcontractors. The notification shall include, to the extent possible, the identification of each individual whose unsecured Protected Information has been, or is reasonably believed by the BA to have been, accessed, acquired, used, or disclosed, as well as any other available information that CE is required to include in notification to the individual, the media, the Secretary, and any other entity under the Breach Notification Rule and any other applicable state or federal laws, including, but not limited to, 45 C.F.R. Section 164.404 through 45 C.F.R. Section 164.408, at the time of the notification required by this paragraph or promptly thereafter as information becomes available. BA shall take (i) prompt corrective action to cure any deficiencies and (ii) any action pertaining to unauthorized uses or disclosures required by applicable federal and state laws [42 U.S.C. Section 17921; 45 C.F.R. Section 164.504(e)(2)(ii)(c); 45 C.F.R. Section164.308(b)].

Time is Money Join Law Insider Premium to draft better contracts faster.