Security Breach and Response Sample Clauses

Security Breach and Response. 8.1 Supplier shall promptly notify VWGoA without undue delay and no later than 24 hours upon Supplier becoming aware of an actual or potential Security Breach. Supplier should notify VWGoA by telephone to Supplier’s primary business contact and via email at xxxxxxx@xx.xxx if it has knowledge that there is, or reasonably believes that there has been, an actual or potential Security Breach. Notice must include the following: • the nature of the Security Breach, • the categories and numbers of data subjects concerned, and the categories and numbers of records concerned; • the name and contact details of the Supplier contact from whom more information may be obtained; • describe the likely consequences of the Security Breach; and • describe the measures taken or proposed to be taken to address the Security Breach. • Other information as VWGoA may reasonably request 8.2 Supplier shall (i) cooperate with VWGoA in the manner reasonably requested by VWGoA and in accordance with law to investigate and resolve the Security Breach, and mitigate any harmful effects of the Security Breach; (ii) promptly implement any necessary remedial measures to ensure the protection of VWGoA Data or VWGoA Systems; and (iii) properly document responsive actions taken related to any Security Breach, including, without limitation, post-incident review of events and actions taken to make changes in business practices to ensure the protection of VWGoA Data or VWGoA Systems. 8.3 Except as required by Applicable Law or regulation, Supplier agrees that: (i) it shall not inform any third party of any Security Breach without first obtaining VWGoA' prior written consent, other than to inform a complainant that VWGoA shall be/has been informed of the Security Breach; and (ii) VWGoA shall have the right, but not the obligation, to determine whether notice of the Security Breach is to be provided to any individuals, authorities, regulators, law enforcement agencies, consumer reporting agencies, or others and the contents of any such notice. 8.4 If the Security Breach was a result of Supplier's or Authorized Persons’ negligence or breach of the requirements of this DPSA, Supplier shall bear all costs associated with (i) any investigations and resolution of the Security Breach, including, but not limited to, internal investigations as well as investigations by regulators or other authorities; (ii) notifications to individuals, authorities, regulators, or others; (iii) defense of any and all claims ...
AutoNDA by SimpleDocs
Security Breach and Response 

Related to Security Breach and Response

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request.

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include: a. A list of the students whose Student Data was involved in or is reasonably believed to have been involved in the breach, if known; and b. The name and contact information for an employee of the Provider whom parents may contact to inquire about the breach.

  • Timely and Sustained Response Interconnection Customer shall ensure that the Small Generating Facility’s real power response to sustained frequency deviations outside of the deadband setting is automatically provided and shall begin immediately after frequency deviates outside of the deadband, and to the extent the Small Generating Facility has operating capability in the direction needed to correct the frequency deviation. Interconnection Customer shall not block or otherwise inhibit the ability of the governor or equivalent controls to respond and shall ensure that the response is not inhibited, except under certain operational constraints including, but not limited to, ambient temperature limitations, physical energy limitations, outages of mechanical equipment, or regulatory requirements. The Small Generating Facility shall sustain the real power response at least until system frequency returns to a value within the deadband setting of the governor or equivalent controls. An Applicable Reliability Standard with equivalent or more stringent requirements shall supersede the above requirements.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • BREACH DISCOVERY AND NOTIFICATION 17 1. Following the discovery of a Breach of Unsecured PHI, CONTRACTOR shall notify 18 COUNTY of such Breach, however both parties agree to a delay in the notification if so advised by a 19 law enforcement official pursuant to 45 CFR § 164.412. 20 a. A Breach shall be treated as discovered by CONTRACTOR as of the first day on which 21 such Breach is known to CONTRACTOR or, by exercising reasonable diligence, would have been 22 known to CONTRACTOR. 23 b. CONTRACTOR shall be deemed to have knowledge of a Breach, if the Breach is 24 known, or by exercising reasonable diligence would have known, to any person who is an employee, 25 officer, or other agent of CONTRACTOR, as determined by federal common law of agency. 26 2. CONTRACTOR shall provide the notification of the Breach immediately to the COUNTY 27 Privacy Officer. CONTRACTOR’s notification may be oral, but shall be followed by written 28 notification within twenty four (24) hours of the oral notification. 29 3. CONTRACTOR’s notification shall include, to the extent possible: 30 a. The identification of each Individual whose Unsecured PHI has been, or is reasonably 31 believed by CONTRACTOR to have been, accessed, acquired, used, or disclosed during the Breach; 32 b. Any other information that COUNTY is required to include in the notification to 33 Individual under 45 CFR §164.404 (c) at the time CONTRACTOR is required to notify COUNTY or 34 promptly thereafter as this information becomes available, even after the regulatory sixty (60) day 35 period set forth in 45 CFR § 164.410 (b) has elapsed, including: 36 1) A brief description of what happened, including the date of the Breach and the date 37 of the discovery of the Breach, if known; 1 2) A description of the types of Unsecured PHI that were involved in the Breach (such 2 as whether full name, social security number, date of birth, home address, account number, diagnosis, 3 disability code, or other types of information were involved); 4 3) Any steps Individuals should take to protect themselves from potential harm 5 resulting from the Breach; 6 4) A brief description of what CONTRACTOR is doing to investigate the Breach, to 7 mitigate harm to Individuals, and to protect against any future Breaches; and 8 5) Contact procedures for Individuals to ask questions or learn additional information, 9 which shall include a toll-free telephone number, an e-mail address, Web site, or postal address. 10 4. COUNTY may require CONTRACTOR to provide notice to the Individual as required in 11 45 CFR § 164.404, if it is reasonable to do so under the circumstances, at the sole discretion of the 12 COUNTY. 13 5. In the event that CONTRACTOR is responsible for a Breach of Unsecured PHI in violation 14 of the HIPAA Privacy Rule, CONTRACTOR shall have the burden of demonstrating that 15 CONTRACTOR made all notifications to COUNTY consistent with this Subparagraph F and as 16 required by the Breach notification regulations, or, in the alternative, that the acquisition, access, use, or 17 disclosure of PHI did not constitute a Breach. 18 6. CONTRACTOR shall maintain documentation of all required notifications of a Breach or 19 its risk assessment under 45 CFR § 164.402 to demonstrate that a Breach did not occur. 20 7. CONTRACTOR shall provide to COUNTY all specific and pertinent information about the 21 Breach, including the information listed in Section E.3.b.(1)-(5) above, if not yet provided, to permit 22 COUNTY to meet its notification obligations under Subpart D of 45 CFR Part 164 as soon as 23 practicable, but in no event later than fifteen (15) calendar days after CONTRACTOR’s initial report of 24 the Breach to COUNTY pursuant to Subparagraph F.2. above. 25 8. CONTRACTOR shall continue to provide all additional pertinent information about the

  • Data Breach Notification Seller will promptly notify Buyer of any actual or potential exposure or misappropriation of Buyer data ("breach") that comes to Seller's attention. Seller will cooperate with Xxxxx and in investigating any such breach, at Xxxxxx's expense. Seller will likewise cooperate with Buyer and, as applicable, with law enforcement agencies in any effort to notify injured or potentially injured parties, and such cooperation will be at Seller's expense, except to the extent that the breach was caused by Xxxxx. The remedies and obligations set forth in this subsection are in addition to any others Buyer may have, including, but not limited to, any requirements in the “Privacy, Confidentiality, and Security” provisions of this Agreement.

  • Environment, Health, and Safety 23.4.1. The Supplier and its staff (and/or any sub-supplier and/or subcontractor) shall comply with the laws and regulations in force related to protection of the environment, the health and safety instructions applicable to the Goods and Services performed pursuant to the Contract and especially, if appropriate, to the Goodsand Services performedon any Site by a third company. 23.4.2. The Supplier and its staff (and/or any sub-supplier and/or subcontractor) shall also comply with the internal rules at the Purchaser and/or Customer’s site(s) where it may have to work for the purpose of performance of the Contract including EHS rules and requirements, as applicable. In case of conflict between different EHS requirements, the most stringent standard shall apply. 23.4.3. In the eventof presence or activity of the Supplier (and/or any sub-supplier and/or subcontractor) on any Purchaser and/or Customer Site, the Supplier, and any sub-supplier and/or subcontractor, as the case may be, the Supplier shall ensure appropriate personnel training and qualification and submit any proof relating to such qualification upon Purchaser’s request. Additionally, the Supplier shall consider any hazards associated with Site conditions, installations and/or machinery nearby. More generally, Supplier shall, at all times, comply with the Purchaser and/or Customer internal rules, including EHS rules and requirements, as applicable. In case of conflict between different EHS requirements, the most stringent standard shall apply. 23.4.4. If the Supplier’s staff (and/or any sub-supplier and/or subcontractor) fail to comply with any of the laws, regulation and or internal rules mentioned under this Article 23.4, the Purchaser is entitled to apply to the Supplier, penalties which in no case shall be considered asliquidateddamagesandwithoutanypriorofficialnotification, correspondingtothirtynine thousand Renminbi (39 000 CNY) per event, without prejudice (i) to the possibility for the Purchaser to ask for the replacement of its staff member or the staff member of its sub- supplier and/or subcontractor, responsible of the breach, and/or (ii) to the possibility for the Purchaser to terminate the Contract for Supplier’s default or to ask for the Supplier to terminate its sub-suppliers and/or subcontractors contracts, and/or (iii) for the Supplier to indemnify and hold harmless the Purchaser, its affiliates, officers, employees and agents 23.4.5. In application of applicable employment laws, the Purchaser must take all appropriate measures to ensure the safety and security as well as the physical and mental health of all employees present on its premises. 23.4.6. The Supplier shall be fully responsible and commits to take all necessary measures ensuring the safety and security as well as the physical and mental health of all its employees who could have to travel in whatever country for the proper execution by the supplier of its obligations as set out under the Contract.

  • Incident Response Operator shall have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of any portion of Data, including PII, and agrees to provide LEA, upon request, an executive summary of the written incident response plan.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!