Potential Data Security Breach Sample Clauses

Potential Data Security Breach. If at any time Outside Entity has reason to believe that PHI transmitted pursuant to this Agreement may have been accessed or disclosed without proper authorization and contrary to the terms of this Agreement, Outside Entity will immediately give Connecticut Children’s notice and take actions to eliminate the cause of the breach. To the extent Connecticut Children’s deems warranted, in its sole discretion, Connecticut Children’s will provide notice (at Outside Entity’s expense) or require Outside Entity (at its own expense) to provide notice to individuals whose PHI may have been improperly accessed or disclosed. In the event credit monitoring is necessary for affected individuals, it shall be provided at Outside Entity’s sole cost and expense.
AutoNDA by SimpleDocs
Potential Data Security Breach. If at any time Outside Entity has reason to believe that PHI transmitted pursuant to this Agreement may have been accessed or disclosed without proper authorization and contrary to the terms of this Agreement, Outside Entity will promptly give Connecticut Children’s notice, but in no event longer than three business days, and take actions to eliminate the cause of the breach. To the extent Connecticut Children’s deems reasonably warranted, in its sole discretion, Connecticut Children’s will provide notice (at Outside Entity’s expense) or require Outside Entity (at its own expense) to provide notice to individuals whose PHI may have been improperly accessed or disclosed. In the event credit monitoring is necessary for affected individuals as a result of an improper access or disclosure judicially determined to be attributable to Outside Entity, it shall be provided at Outside Entity’s sole cost and expense. Notwithstanding the foregoing, Outside Entity will not be responsible for notice or credit monitoring costs and expenses in the event that the improper access or disclosure is not attributable to an act or omission of Outside Entity or its employees, officers, directors, or agents.
Potential Data Security Breach. If Outside Entity at any time has reason to believe that PHI transmitted pursuant to this Agreement may have been accessed or disclosed without proper authorization and contrary to the terms of this Agreement, Outside Entity shall immediately notify HRH's Privacy Officer and take actions to eliminate the cause of the breach. To the extent HRH deems warranted, in its sole discretion, HRH will provide notice, or require Outside Entity to provide notice, to individuals whose PHI may have been improperly accessed or disclosed.

Related to Potential Data Security Breach

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

  • Security Breach Notifications Notice must be given by the Subrecipient to anyone whose PSCI could have been breached in accordance with HIPAA, the Information Practices Act of 1977, and State policy.

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process:

  • Intrusion Detection All systems involved in accessing, holding, transporting, and protecting PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY that are accessible via the Internet must be protected by a comprehensive intrusion detection and prevention solution.

  • Personal Data Breach 7.1 Processor shall notify Company without undue delay upon Processor becoming aware of a Personal Data Breach affecting Company Personal Data, providing Company with sufficient information to allow the Company to meet any obligations to report or inform Data Subjects of the Personal Data Breach under the Data Protection Laws.

  • Contractor Default Failure of the Contractor, which has neither been remedied nor waived, to perform or otherwise to comply with the terms of the Construction Contract.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!