Reporting Information Security Events and Weaknesses. To protect Supplier Information Processing Systems and system files containing Company Confidential Information, Supplier will: (a) Implement a process to ensure that Information Security Events and Security Breaches are reported through appropriate management channels as soon as possible but in any event no later than eight hours after the occurrence of the event; (b) Train all Personnel and require all Provider users of information systems and services how to report any observed or suspected Information Security Events and Security Breaches; and
Appears in 4 contracts
Samples: Global Services Agreement, Global Services Agreement, Global Services Agreement