Reporting a security incident or breach Sample Clauses

Reporting a security incident or breach. It is good practice for agencies to have in place a mechanism for staff and the public to report information security incidents (for example, loss or theft of personal or confidential data held on computer equipment or paper) whether they are actual incidents or near misses. These incidents should be reported to the person responsible for Information Security or Data Protection within the relevant agency. If personal data is lost or stolen and contains information which has been provided by another agency, the originating agency must be told and kept informed of the outcome of the investigation into the incident. Security incidents involving information provided by or to the MASH must be brought to the attention of the MASH Operational Lead) who will report the incident to Devon County Council’s IG Team email xxxxxxxxxxxxxxxxxx@xxxxx.xxx.xx. Serious security incidents will be reported to the MASH Strategy Group.
AutoNDA by SimpleDocs
Reporting a security incident or breach. Parties to the agreement will have in place a mechanism for staff and the public to report information security incidents (for example, loss or theft of personal or confidential data held on computer equipment or paper) whether they are actual incidents or near misses. These incidents should be reported to the person responsible for Information Security or Data Protection within the relevant agency. If personal data is lost or stolen and contains information which has been provided by another agency, the originating agency must be told and kept informed of the outcome of the investigation into the incident. Security incidents involving information provided by or to the MASH must be brought to the attention of the MASH Operational Lead who will report the incident to the MASH Strategic Group. Information Governance breaches will also need to be reported via the individual agency incident reporting processes. Any unauthorised release of information or breach of conditions in this agreement will be dealt with through the internal discipline procedures of the individual Party to the agreement.

Related to Reporting a security incident or breach

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Default or Breach A default or breach may be declared with or without termination. The following shall constitute a default or breach:

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • WAIVER OF DEFAULT OR BREACH 7 Waiver by COUNTY of any default by CONTRACTOR shall not be considered a waiver of any 8 subsequent default. Waiver by COUNTY of any breach by CONTRACTOR of any provision of this 9 Agreement shall not be considered a waiver of any subsequent breach. Waiver by COUNTY of any 10 default or any breach by CONTRACTOR shall not be considered a modification of the terms of this 11 Agreement. 12 // 13 // 14 // 15 // 16 // 17 // 18 // 19 // 20 // 21 // 22 // 23 // 24 // 25 // 26 // 27 // 28 // 29 // 30 // 31 // 32 // 33 // 34 // 35 // 36 // 37 //

Time is Money Join Law Insider Premium to draft better contracts faster.