Security Breach Sample Clauses

Security Breach. In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.
AutoNDA by SimpleDocs
Security Breach. Civil Disorder or Riot occurs during Your Trip for at least six (6) consecutive hours, which prevents You from arriving at or continuing onto Your Scheduled Destination as shown on Your itinerary; 21. a theft or loss of passports or travel documents or visas while on Your Trip, specifically required for Your Trip, which is substantiated by a police report;
Security Breach. In the event of a security breach, the Contractor shall take prompt corrective action to cure any such deficiencies and any action pertaining to such unauthorized disclosure required by applicable federal and state laws and regulations. a. You must report all Security Breaches, whether suspected or confirmed, to the FSS Coordinator promptly, but no later than one (1) business day, of the incident. If the FSS Coordinator is unavailable, or if there is a potential conflict of interest, report the incident to the Homeless Programs Manager or the Director of Rental Assistance and Homeless Solutions. b. Document or maintain records of information and actions relevant to the incident as they may be required in the Security Breach handling report. i. Date and time of Security Breach; ii. Type of Security Breach (e.g. virus, hacking, e-mail, etc.); iii. Person(s) involved in Security Breach, if identifiable; and iv. Date and time Security Breach was reported and to whom. c. Any alleged violations that may constitute criminal misconduct, identify theft or other serious misconduct, or reflect systemic violations within the management of the Program will be reported to the MSHDA Compliance Unit as part of the Security Breach reporting Process. d. When reporting a Security Breach, do not further compromise the information or risk causing another Security Breach: i. Do not forward the compromised information when reporting an incident ii. If and when the compromised PII is needed, you will be given instructions regarding the individual to send it to and the process for submission.
Security Breach. In the event of a security breach, the Contractor shall take prompt corrective action to cure any such deficiencies and any action pertaining to such unauthorized disclosure required by applicable federal and state laws and regulations. a. You must report all Security Breaches, whether suspected or confirmed, to the System Manager promptly, but no later than one (1) business day, of the incident. If the System Manager is unavailable, or if there is a potential conflict of interest, report the incident to the Regional Manager or the Authority’s Chief Housing Solutions Officer. b. Document or maintain records of information and actions relevant to the incident as they may be required in the Security Breach handling report. i. Date and time of Security Breach; ii. Type of Security Breach (e.g. virus, hacking, e-mail, etc.); iii. Person(s) involved in Security Breach, if identifiable; and iv. Date and time Security Breach was reported and to whom. c. Any alleged violations that may constitute criminal misconduct, identify theft or other serious misconduct, or reflect systemic violations within the management of the Program will be reported to the MSHDA Compliance Unit as part of the Security Breach reporting Process. d. When reporting a Security Breach, do not further compromise the information or risk causing another Security Breach: i. Do not forward the compromised information when reporting an incident ii. If and when the compromised PII is needed, you will be given instructions regarding the individual to send it to and the process for submission. “Key Persons” are those individuals performing services and those performing services who may be subject to the State EmployeesRetirement Act, 2007 PA 95, MCL 38.68c. The Contractor acknowledges that the following personnel are Key Persons of the Contractor in accordance with Section 11 of the Housing Agent Agreement. Please have each Key Person sign the Exhibit FAgreement to Use and Release Information to Authority (“Release”), as well as the questions regarding the State Employees’ Retirement Act. The Authority will approve a Key Person only if (a) the Key Person signs the Release, (b) the Criminal Screenings review does not reveal any criminal records that the Authority, in its sole discretion, deems unacceptable, and (c) is not an active Participant on the Program or a current Waiting List Applicant for the Program. Please use one Release for each Key Person who shall be performing. In addition, the sel...
Security Breach. “Security Breach” means the unauthorized acquisition, access, use or disclosure of Protected Health Information which compromises the security or privacy of such information, except where an unauthorized person to whom such information is disclosed would not reasonably have been able to retain such information. Security Breach does not include:
Security Breach. An act from outside an organization that bypasses or violates security policies, practices, or procedures.
AutoNDA by SimpleDocs
Security Breach. A Party will notify the other Party, as promptly as possible under the circumstances and without unreasonable delay, of any Security Breach involving any Protected Data (as defined on Schedule G hereof). As used herein, “Security Breach” is defined as any event involving a known, actual, or suspected compromise of the security, confidentiality or integrity of (i) the Protected Data (as defined on Schedule G hereof) of more than 5,000 customers of a Party or (ii) the video of the premises of one or more customers of a Party, including but not limited to any unauthorized access or use of such video, except where such Security Breach is due to the sole fault of a customer. The Party undergoing a Security Breach will use commercially reasonable efforts to contain such a breach and provide the other Party with a detailed description of the Security Breach, the type of data that was the subject of the Security Breach and the identity of each affected business (or person, to the extent permitted by Law), promptly after such information can be collected or otherwise becomes available. The Party undergoing the Security Breach agrees to take action immediately, at its own expense, to investigate the Security Breach, to take all commercially reasonable actions to identify, prevent, and mitigate the effects of any such Security Breach, and to carry out any recovery or other action (e.g., mailing statutory notices, providing credit monitoring services) necessary to remedy the Security Breach. The Party undergoing the Security Breach shall make commercially reasonable efforts to give the other Party a reasonable opportunity to consult in advance on any filings, communications, notices, press releases or reports related to any Security Breach, but the final decision on their contents shall belong to the Party undergoing the Security Breach. The Parties agree that any Person (to the extent engaging in a subscriber business) or subscriber business purchased or acquired by a Party via equity or asset sale or otherwise shall (x) comply with the standards set forth in Schedule G within one (1) year from such purchase or acquisition and (y) to the extent such Person does not offer services related to video surveillance that involves storing such video on such Person’s servers or other systems directly or through a vendor (“Hosted Video”) as of the date of such purchase or acquisition, not offer Hosted Video in any subscriber business until such time as such Person complies wit...
Security Breach. Customer agrees that in the event of any breach or suspected breach in relation to (i) any Customer Data disclosed in violation of Vendor’s agreement with Company with respect to the API Service or the Customer Data Access Request Form, or (ii) any actual or suspected unauthorized access, disclosure or use of Customer Data that Vendor accesses via the API Service (each event being a “Security Breach”), Vendor, and not Company, shall be responsible for containing such Security Breach, mitigating potential risks to affected individuals and notifying affected individuals and regulatory authorities of the Security Breach where required by law. Vendor shall be solely responsible for all costs or expenses associated with any remedial actions or notifications.
Security Breach. A. Any security breach by Contractor or Contractor’s employees such as leaving the facility without fully securing all entrances or exits and arming the alarm system or allowing unauthorized access to the premises may result in immediate termination of the Agreement. Contractor will be notified by telephone by CHP Project Representative, immediately followed by written notification. B. Building keys in Contractor’s possession at the termination of this Agreement shall be returned to CHP Project Representative within twenty-four (24) hours from the termination of this Agreement. Contractor agrees that the costs for unreturned keys and consequential costs shall be deducted from any sums owed Contractor against this or any other active agreement with CHP. For example, a Contractor’s failure to return keys will result in an assessment of costs for the re-keying of the office and the cost of reissuing keys.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!