Procedures for Security Breaches Clause Samples
The Procedures for Security Breaches clause outlines the steps that must be taken in the event of an actual or suspected security breach involving confidential or sensitive information. Typically, this clause requires the affected party to promptly notify the other party, investigate the breach, and take remedial actions such as containing the incident and preventing further unauthorized access. By establishing clear protocols for response and communication, this clause helps ensure that breaches are managed efficiently and transparently, minimizing potential harm and legal exposure.
Procedures for Security Breaches. In the event FMC and/or FMER, as applicable, knows or reasonably believes that there has been any unauthorized access or attempted unauthorized access to Proprietary Information of SunTrust or Consumer Information in the possession or control of FMC or FMER, as applicable, that compromises the security, confidentiality or integrity of such Proprietary Information or Consumer Information, FMC or FMER, as applicable, shall take the following actions:
(a) immediately notify SunTrust of such unauthorized access or attempted unauthorized access;
(b) take reasonable steps to remedy the circumstances that permitted any such unauthorized access to occur;
(c) take reasonable steps to prohibit further disclosure of Proprietary Information or Consumer Information;
(d) upon request, cooperate with SunTrust or its agents to investigate the scope and content of the unauthorized access; and
(e) take corrective action as required by SunTrust in its sole discretion as related to SunTrust Consumer Information.
Procedures for Security Breaches. For purposes of this Section, “Breach” is defined as an incident of unauthorized access by a third party to Sensitive Customer Information maintained by Servicer.
Procedures for Security Breaches. In the event Advisor knows or reasonably believes that there has been any unauthorized access (or attempted unauthorized access) to Borrower Information in the possession or control of Advisor that compromises (or threatens to compromise) the security, confidentiality or integrity of such Borrower Information, Advisor, as applicable, shall take the following actions:
(a) immediately notify Owner of such unauthorized access or attempted unauthorized access;
(b) take commercially reasonable steps to remedy the circumstances that permitted any such unauthorized access to occur;
(c) take commercially reasonable steps to prohibit further disclosure of Proprietary Information or Borrower Information; and
(d) permit Owner or its agents to investigate the scope and content of the unauthorized access and pay any reasonable costs of computer forensics experts retained by Owner for such purpose.
Procedures for Security Breaches. In the event that a Party knows or reasonably believes that there has been any unauthorized access or a serious incident of attempted unauthorized access to Proprietary Information of either Party or Consumer Information in the possession or control of such Party that compromises the security, confidentiality or integrity of such Proprietary Information or Consumer Information, such Party shall take the following actions:
(a) promptly notify the other Parties of such unauthorized access or serious incident of attempted unauthorized access;
(b) take reasonable steps to remedy the circumstances that permitted any such unauthorized access to occur;
(c) take reasonable steps to prohibit any further disclosure of Proprietary Information or Consumer Information;
(d) upon request, cooperate with the other Party or its designated agents to investigate the scope and content of the unauthorized access; and
(e) take appropriate corrective action related to any disclosure of Consumer Information.
Procedures for Security Breaches. In the event Receiver knows or reasonably believes that there has been any unauthorized access (or attempted unauthorized access) to Proprietary Information in the possession or control of Receiver that compromises (or threatens to compromise) the security, confidentiality or integrity of such Proprietary Information, Receiver shall take the following actions:
(a) immediately notify the Disclosing Party of such unauthorized access or attempted unauthorized access;
(b) take reasonable steps to remedy the circumstances that permitted any such unauthorized access to occur; and
(c) take reasonable steps to prohibit further disclosure of Proprietary Information.
Procedures for Security Breaches. In the event Savvis knows or reasonably believes that there has been unauthorized access (or attempted unauthorized access) to Customer Data in the possession or control of Savvis that compromises or threatens to compromise the security, confidentiality or integrity of such Customer Data, Savvis shall use all commercially reasonable efforts to take the following actions:
(i) immediately notify Customer of such unauthorized access or attempted unauthorized access; and
(ii) identify to Customer what specific Customer Data may have been accessed; and
(iii) take reasonable steps to remedy the circumstances that permitted any such unauthorized access to occur; and
(iv) take reasonable steps to prohibit further disclosure of Customer Data; and
(v) cooperate with Customer as reasonably necessary to facilitate compliance with any applicable law regarding unauthorized access of Customer Data; and
(vi) at Savvis’ sole expense, conduct an investigation (the scope of which will be reasonably determined by Savvis) specifically limited to Savvis’ infrastructure and equipment; provided, however, that Savvis’ obligation to investigate under this sub-section shall no longer apply if Savvis reasonably determines through such investigation that the compromising of the Customer Data did not occur due to Savvis’ infrastructure, equipment or Personnel.
