Security Breach Management. 8.1 Contract Eagle will comply with all applicable laws requiring notification to The Subscriber of any accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data Processed by Contract Eagle or its Sub-Processors of which it becomes aware (Breach Incident).
8.2 Contract Eagle will make reasonable efforts to identify the cause of that Breach Incident, notify The Subscriber within a timely manner to allow The Subscriber to meet its obligations to report a Breach Incident, cooperate with The Subscriber in good faith and provide any assistance reasonably necessary for The Subscriber to comply with its obligations under Applicable Data Protection Laws with respect to a Breach Incident, including any obligations The Subscriber has under Applicable Data Protection Laws to report, notify or investigate a Breach Incident, and take steps Contract Eagle considers necessary and reasonable to remediate the cause of the Breach Incident, to the extent remediation is within Contract Eagle’s reasonable control.
Security Breach Management. 8.1 We will comply with all Applicable Data Protection Laws requiring notification to you of any accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data Processed by us or our Sub-Processors of which we become aware (Breach Incident).
8.2 We will make reasonable efforts to identify the cause of that Breach Incident, notify you within a timely manner to allow you to meet your obligations to report a Breach Incident, cooperate with you in good faith and provide any assistance reasonably necessary for you to comply with your obligations under Applicable Data Protection Laws with respect to a Breach Incident, including any obligations you have under Applicable Data Protection Laws to report, notify or investigate a Breach Incident, and take steps we consider necessary and reasonable to remediate the cause of the Breach Incident, to the extent remediation is within our reasonable control.
Security Breach Management. Producer shall notify The Hartford within 72 hours following discovery of any Security Breach via e-mail to Xxxxxxxxxxx_Xxxxxxxx_Xxxxxxxx@xxxxxxxxxxx.xxx, or as otherwise directed by The Hartford. Producer shall: (a) immediately remedy the Security Breach; (b) provide all necessary assistance and cooperation to enable The Hartford to remedy any impact of the Security Breach, and to meet its obligations with respect to the Security Breach; (c) participate in a virtual control verification and remediate any medium or high risk control gaps as required by The Hartford; and (d) indemnify and reimburse The Hartford for costs and expenses incurred by The Hartford in connection with the Security Breach.
Security Breach Management. 7.1 Each of the Parties shall have the manpower, system, facilities and equipment in place to properly monitor access to Personal Data, and to monitor and identify a Security Breach.
7.2 If the Recipient becomes aware of any Security Breach on its personnel, premises, facilities, system, or equipment, it shall, within a reasonable period, notify the Company of the Security Breach, investigate the Security Breach and provide the Company with information about the Security Breach, and take reasonable steps to mitigate the effects and to minimize any damage resulting from the Security Breach.
(a) The Recipient shall cooperate with the Company in relation to the incident investigation requirements for any Security Breach of Personal Data.
(b) The Parties agree that:
(i) An unsuccessful Security Breach attempt will not be subject to this Section. An unsuccessful Security Breach attempt is one that results in no unauthorized access, processing, disclosure, alteration, loss, damage, or destruction to Personal Data or to any equipment or facilities storing Personal Data, which includes, but not limited to, pings and other broadcast attacks on firewalls or edge servers, port scans, unsuccessful log-on attempts, denial of service attacks, packet sniffing (or other unauthorized access to traffic data that does not result in access beyond internet protocol addresses or headers) or similar incidents; and
(ii) the Recipient shall send the notification of any Security Breach to the Company within 24 hours from knowledge thereof.
Security Breach Management. 7.1 Notice. *****.
Security Breach Management. Meraki maintains security incident management policies and procedures, including detailed security incident escalation procedures. If Meraki becomes aware of any unlawful destruction, loss, alteration or unauthorized disclosure of Customer Data (a “Security Incident”), then Meraki will notify Customer without undue delay and provide Customer with relevant information about the Security Incident, including the type of Customer Data involved, the volume of Customer Data disclosed, the circumstances of the incident, mitigation steps taken, and remedial and preventative action taken. The obligations in this Section 7 do not apply to Security Incidents caused by Customer or Customer’s Network Users.
Security Breach Management. Notify Company within 72 hours following discovery of any Security Breach via e-mail to Xxxxxxxxxxx_Xxxxxxxx_Xxxxxxxx@xxxxxxxxxxx.xxx, or as otherwise directed by Company. Producer shall: (a) immediately remedy the Security Breach; (b) provide all necessary assistance and cooperation to enable Company to remedy any impact of the Security Breach, and to meet its obligations with respect to the Security Breach; (c) participate in a virtual control verification and remediate any medium or high risk control gaps as required by Company, and (d) indemnify and reimburse Company for costs and expenses incurred by Company in connection with the Security Breach.
Security Breach Management