Security Breach Sample Clauses

POPULAR SAMPLE Copied 537 times
Security Breach. In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.
Security Breach. In the event of a security breach, the Contractor shall take prompt corrective action to cure any such deficiencies and any action pertaining to such unauthorized disclosure required by applicable federal and state laws and regulations. a. You must report all Security Breaches, whether suspected or confirmed, to the System Manager promptly, but no later than one (1) business day, of the incident. If the System Manager is unavailable, or if there is a potential conflict of interest, report the incident to the Regional Manager or the Authority’s Chief Housing Solutions Officer. b. Document or maintain records of information and actions relevant to the incident as they may be required in the Security Breach handling report. i. Date and time of Security Breach; ii. Type of Security Breach (e.g. virus, hacking, e-mail, etc.); iii. Person(s) involved in Security Breach, if identifiable; and iv. Date and time Security Breach was reported and to whom. c. Any alleged violations that may constitute criminal misconduct, identify theft or other serious misconduct, or reflect systemic violations within the management of the Program will be reported to the MSHDA Compliance Unit as part of the Security Breach reporting Process. d. When reporting a Security Breach, do not further compromise the information or risk causing another Security Breach: i. Do not forward the compromised information when reporting an incident ii. If and when the compromised PII is needed, you will be given instructions regarding the individual to send it to and the process for submission. “Key Persons” are those individuals performing services and those performing services who may be subject to the State EmployeesRetirement Act, 2007 PA 95, MCL 38.68c. The Contractor acknowledges that the following personnel are Key Persons of the Contractor in accordance with Section 11 of the Housing Agent Agreement. Please have each Key Person sign the Exhibit FAgreement to Use and Release Information to Authority (“Release”), as well as the questions regarding the State Employees’ Retirement Act. The Authority will approve a Key Person only if (a) the Key Person signs the Release, (b) the Criminal Screenings review does not reveal any criminal records that the Authority, in its sole discretion, deems unacceptable, and (c) is not an active Participant on the Program or a current Waiting List Applicant for the Program. Please use one Release for each Key Person who shall be performing. In addition, the sel...
Security Breach. “Security Breach” means the unauthorized acquisition, access, use or disclosure of Protected Health Information which compromises the security or privacy of such information, except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information. Security Breach does not include:
Security Breach. As used in this Agreement
Security Breach. Civil Disorder or Riot occurs during Your Trip for at least six (6) consecutive hours, which prevents You from arriving at or continuing onto Your Scheduled Destination as shown on Your itinerary; 21. a theft or loss of passports or travel documents or visas while on Your Trip, specifically required for Your Trip, which is substantiated by a police report;
Security Breach. In the event of a security breach, the Contractor shall take prompt corrective action to cure any such deficiencies and any action pertaining to such unauthorized disclosure required by applicable federal and state laws and regulations. a. You must report all Security Breaches, whether suspected or confirmed, to the FSS Coordinator promptly, but no later than one (1) business day, of the incident. If the FSS Coordinator is unavailable, or if there is a potential conflict of interest, report the incident to the Homeless Programs Manager or the Director of Rental Assistance and Homeless Solutions. b. Document or maintain records of information and actions relevant to the incident as they may be required in the Security Breach handling report. i. Date and time of Security Breach; ii. Type of Security Breach (e.g. virus, hacking, e-mail, etc.); iii. Person(s) involved in Security Breach, if identifiable; and iv. Date and time Security Breach was reported and to whom. c. Any alleged violations that may constitute criminal misconduct, identify theft or other serious misconduct, or reflect systemic violations within the management of the Program will be reported to the MSHDA Compliance Unit as part of the Security Breach reporting Process. d. When reporting a Security Breach, do not further compromise the information or risk causing another Security Breach: i. Do not forward the compromised information when reporting an incident ii. If and when the compromised PII is needed, you will be given instructions regarding the individual to send it to and the process for submission.
Security Breach. If you suspect that your Coinbase Account or any of your security details have been compromised or if you become aware of any fraud or attempted fraud or any other security incident (including a cyber-security attack) affecting you and / or Coinbase (together a “Security Breach”), you must: (A) notify Coinbase Support as soon as possible by email free of charge at: ▇▇▇▇▇@▇▇▇▇▇▇▇▇.▇▇▇, or by calling us on: ▇▇▇▇ ▇▇▇ ▇▇▇▇, or +▇ (▇▇▇) ▇▇▇ ▇▇▇▇ (international charges may apply); (B) continue to provide accurate and up to date information throughout the duration of the Security Breach; and (C) you must take any steps that we reasonably require to reduce, manage or report any Security Breach. Failure to provide prompt notification of any Security Breach may be taken into account in our determination of the appropriate resolution of the matter.
Security Breach. An act from outside an organization that bypasses or violates security policies, practices, or procedures.
Security Breach. A Party will notify the other Party, as promptly as possible under the circumstances and without unreasonable delay, of any Security Breach involving any Protected Data (as defined on Schedule G hereof). As used herein, “Security Breach” is defined as any event involving a known, actual, or suspected compromise of the security, confidentiality or integrity of (i) the Protected Data (as defined on Schedule G hereof) of more than 5,000 customers of a Party or (ii) the video of the premises of one or more customers of a Party, including but not limited to any unauthorized access or use of such video, except where such Security Breach is due to the sole fault of a customer. The Party undergoing a Security Breach will use commercially reasonable efforts to contain such a breach and provide the other Party with a detailed description of the Security Breach, the type of data that was the subject of the Security Breach and the identity of each affected business (or person, to the extent permitted by Law), promptly after such information can be collected or otherwise becomes available. The Party undergoing the Security Breach agrees to take action immediately, at its own expense, to investigate the Security Breach, to take all commercially reasonable actions to identify, prevent, and mitigate the effects of any such Security Breach, and to carry out any recovery or other action (e.g., mailing statutory notices, providing credit monitoring services) necessary to remedy the Security Breach. The Party undergoing the Security Breach shall make commercially reasonable efforts to give the other Party a reasonable opportunity to consult in advance on any filings, communications, notices, press releases or reports related to any Security Breach, but the final decision on their contents shall belong to the Party undergoing the Security Breach. The Parties agree that any Person (to the extent engaging in a subscriber business) or subscriber business purchased or acquired by a Party via equity or asset sale or otherwise shall (x) comply with the standards set forth in Schedule G within one (1) year from such purchase or acquisition and (y) to the extent such Person does not offer services related to video surveillance that involves storing such video on such Person’s servers or other systems directly or through a vendor (“Hosted Video”) as of the date of such purchase or acquisition, not offer Hosted Video in any subscriber business until such time as such Person complies wit...
Security Breach. Each party shall promptly report any Security Breach to the other no later than forty-eight (48)-hours after discovery. The reporting party shall provide all known details reasonably required for a notice of Security Breach under applicable law. Each party shall cooperate in any Security Breach investigation that the other party conducts or is involved in and will take reasonable measures to mitigate any harmful effects of any Security Breach of which it becomes aware.