Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.
Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.
Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.
No Conflict, Breach, Violation or Default The execution, delivery and performance of the Transaction Documents by the Company and the issuance and sale of the Securities will not conflict with or result in a breach or violation of any of the terms and provisions of, or constitute a default under (i) the Company’s Articles of Incorporation or the Company’s Bylaws, both as in effect on the date hereof (true and complete copies of which have been made available to the Investor through the XXXXX system), or (ii)(a) any statute, rule, regulation or order of any governmental agency or body or any court, domestic or foreign, having jurisdiction over the Company, any Subsidiary or any of their respective assets or properties, or (b) any agreement or instrument to which the Company or any Subsidiary is a party or by which the Company or a Subsidiary is bound or to which any of their respective assets or properties is subject.
Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Breach of Contract Claims [Option (Include if University prefers an abbreviated Breach of Contract Claims provision): To the extent that Chapter 2260, Texas Government Code, is applicable to this Agreement and is not preempted by other applicable law, the dispute resolution process provided for in Chapter 2260 and the related rules adopted by the Texas Attorney General pursuant to Chapter 2260, will be used by University and Contractor to attempt to resolve any claim for breach of contract made by Contractor that cannot be resolved in the ordinary course of business. The chief business officer of University will examine Contractor's claim and any counterclaim and negotiate with Contractor in an effort to resolve the claims. The parties specifically agree (i) neither execution of this Agreement by University nor any other conduct, action or inaction of any representative of University relating to this Agreement constitutes or is intended to constitute a waiver of University’s or the state's sovereign immunity to suit; and (ii) University has not waived its right to seek redress in the courts.] 19.1 To the extent that Chapter 2260, Texas Government Code, as it may be amended from time to time (Chapter 2260), is applicable to this Agreement and is not preempted by other Applicable Laws, the dispute resolution process provided for in Chapter 2260 will be used, as further described herein, by University and Contractor to attempt to resolve any claim for breach of contract made by Contractor: 12.19.1.1 Contractor’s claims for breach of this Agreement that the parties cannot resolve pursuant to other provisions of this Agreement or in the ordinary course of business will be submitted to the negotiation process provided in subchapter B of Chapter 2260. To initiate the process, Contractor will submit written notice, as required by subchapter B of Chapter 2260, to University in accordance with the notice provisions in this Agreement. Contractor's notice will specifically state that the provisions of subchapter B of Chapter 2260 are being invoked, the date and nature of the event giving rise to the claim, the specific contract provision that University allegedly breached, the amount of damages Contractor seeks, and the method used to calculate the damages. Compliance by Contractor with subchapter B of Chapter 2260 is a required prerequisite to Contractor's filing of a contested case proceeding under subchapter C of Chapter 2260. The chief business officer of University, or another officer of University as may be designated from time to time by University by written notice to Contractor in accordance with the notice provisions in this Agreement, will examine Contractor's claim and any counterclaim and negotiate with Contractor in an effort to resolve the claims. 12.19.1.2 If the parties are unable to resolve their disputes under Section 12.19.1.1, the contested case process provided in subchapter C of Chapter 2260 is Contractor’s sole and exclusive process for seeking a remedy for any and all of Contractor's claims for breach of this Agreement by University. 12.19.1.3 Compliance with the contested case process provided in subchapter C of Chapter 2260 is a required prerequisite to seeking consent to xxx from the Legislature under Chapter 107,
Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.
Failure to Perform Obligations In the event Business Associate fails to perform its obligations under this Agreement, Covered Entity may immediately discontinue providing PHI to Business Associate. Covered Entity may also, at its option, require Business Associate to submit to a plan of compliance, including monitoring by Covered Entity and reporting by Business Associate, as Covered Entity in its sole discretion determines to be necessary to maintain compliance with this Agreement and applicable law.
Data Breaches 4.1 The Data Processor does not guarantee that its security measures will be effective under all conditions. If the Data Processor discovers a data breach within the meaning of Article
Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.