Reporting of Unauthorized Disclosures of Data and Information Sample Clauses

Reporting of Unauthorized Disclosures of Data and Information a. The Partner shall, within one business day of discovery, report to the District any use or disclosure of information not authorized by this Agreement or in writing by the District (a “Breach”). The Partner’s written report shall identify (i) the nature of the breach, (ii) what information was used or disclosed, (iii) who or what was the cause of the breach, (iv) what Partner has done or shall do to mitigate any deleterious effect of the breach, and (v) what corrective action Partner has taken or shall take to prevent future similar unauthorized use or disclosure. The Partner shall provide such other information, including a written report, as reasonably requested by the District.
AutoNDA by SimpleDocs
Reporting of Unauthorized Disclosures of Data and Information. 1. Contractor shall, within five business days of discovery, report to the District any use or disclosure of information not authorized by this Agreement or in writing by the District (a “Breach”). Contractor’s written report shall identify (i) the nature of the breach, (ii) what information was used or disclosed, (iii) who or what was the cause of the breach, (iv) what Contractor has done or shall do to mitigate any deleterious effect of the breach, and (v) what corrective action Contractor has taken or shall take to prevent future similar unauthorized use or disclosure. Contractor shall provide such other information, including a written report, as reasonably requested by the District.

Related to Reporting of Unauthorized Disclosures of Data and Information

  • Data and Information 12.1 The parties shall comply with all relevant UK and EU data protection legislation in delivering their obligations under the Agreement.

  • Reporting of Unauthorized Disclosure The Contractor shall immediately report to the State any unauthorized disclosure of confidential information.

  • Cost of Data and Information Exchange Each Party shall bear its own cost of providing information to the other Party.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • CONFIDENTIALITY of RECORDS and INFORMATION 20.1. XXXXXXXXXX agrees to maintain confidentiality of information and records as required by applicable Federal, State and local laws, regulations and rules. CONTRACTOR shall not use or disclose confidential information other than as permitted or required by this Agreement and will notify COUNTY of any discovered instances of breaches of confidentiality. CONTRACTOR shall ensure that any subcontractors’ agents receiving confidential information related to this Agreement agree to the same restrictions and conditions that apply to CONTRACTOR with respect to such information. XXXXXXXXXX agrees to hold COUNTY harmless from any breach of confidentiality, as set forth in the hold harmless provisions contained herein.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Access to Records – Files; Confidential Information Contractor shall maintain all books, documents, papers and records relating to the Agreement for at least seven years following completion of the project. Contractor shall maintain any other records pertinent to this Agreement in such a manner as to clearly document Contractor’s performance. City, state and federal government, and their duly authorized representatives shall have access to the books, documents, papers and records of the Contractor which are directly pertinent to the specific Agreement for the purpose of making audit, examination, excerpts and transcript. Contractor agrees that all files or other documents generated or in the possession of Contractor related to Contractor's delivery of service are the property of the City and shall be available to the City upon request. Contractor understands the nature of project/projects means that Contractor may be privy to information that is confidential, proprietary or sensitive in nature, which information shall not be disclosed to any third person or entity without the consent of the City of Bend or at the City's direction, either during the term of this Agreement or after its termination. Likewise, any analysis or commentary provided by Contractor of a confidential or sensitive nature shall not be released or disclosed to any person without the consent or direction of the City.

  • Access to Protected Information If BA maintains a designated record set on behalf of CE, BA shall make Protected Information maintained by BA or its agents or subcontractors in Designated Record Sets available to CE for inspection and copying within five (5) days of a request by CE to enable CE to fulfill its obligations under state law [Health and Safety Code Section 123110] and the Privacy Rule, including, but not limited to, 45 C.F.R. Section 164.524 [45 C.F.R. Section 164.504(e)(2)(ii)(E)]. If BA maintains Protected Information in electronic format, BA shall provide such information in electronic format as necessary to enable CE to fulfill its obligations under the HITECH Act and HIPAA Regulations, including, but not limited to, 42 U.S.C. Section 17935(e) and 45 C.F.R. Section 164.524.

  • Confidentiality and Safeguarding of University Records; Press Releases; Public Information Under this Agreement, Contractor may (1) create, (2) receive from or on behalf of University, or (3) have access to, records or record systems (collectively, University Records). Among other things, University Records may contain social security numbers, credit card numbers, or data protected or made confidential or sensitive by Applicable Laws. [Option (Include if University Records are subject to FERPA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Family Educational Rights and Privacy Act, 20 United States Code (USC) §1232g (FERPA) are addressed in Section 12.41.] [Option (Include if University is a HIPAA Covered Entity and University Records are subject to HIPAA.): Additional mandatory confidentiality and security compliance requirements with respect to University Records subject to the Health Insurance Portability and Accountability Act and 45 Code of Federal Regulations (CFR) Part 160 and subparts A and E of Part 164 (collectively, HIPAA) are addressed in Section 12.26.] Contractor represents, warrants, and agrees that it will: (1) hold University Records in strict confidence and will not use or disclose University Records except as (a) permitted or required by this Agreement, (b) required by Applicable Laws, or (c) otherwise authorized by University in writing; (2) safeguard University Records according to reasonable administrative, physical and technical standards (such as standards established by the National Institute of Standards and Technology and the Center for Internet Security [Option (Include if Section 12.39 related to Payment Card Industry Data Security Standards is not include in this Agreement.):, as well as the Payment Card Industry Data Security Standards]) that are no less rigorous than the standards by which Contractor protects its own confidential information; (3) continually monitor its operations and take any action necessary to assure that University Records are safeguarded and the confidentiality of University Records is maintained in accordance with all Applicable Laws and the terms of this Agreement; and (4) comply with University Rules regarding access to and use of University’s computer systems, including UTS165 at xxxx://xxx.xxxxxxxx.xxx/board-of-regents/policy-library/policies/uts165-information-resources-use-and-security-policy. At the request of University, Contractor agrees to provide University with a written summary of the procedures Contractor uses to safeguard and maintain the confidentiality of University Records.

  • Information and Data 21.1 At all times during the subsistence of this Agreement the duly authorized representatives of each Participant shall, at its and their sole risk and expense and at reasonable intervals and times, have access to the Property and to all technical records and other factual engineering data and information relating to the Property which is in the possession of the Operator.

Time is Money Join Law Insider Premium to draft better contracts faster.