Security Breach Management Sample Clauses

Security Breach Management. 8.1 Contract Eagle will comply with all applicable laws requiring notification to The Subscriber of any accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data Processed by Contract Eagle or its Sub-Processors of which it becomes aware (Breach Incident).
AutoNDA by SimpleDocs
Security Breach Management. 8.1 We will comply with all Applicable Data Protection Laws requiring notification to you of any accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to Personal Data Processed by us or our Sub-Processors of which we become aware (Breach Incident).
Security Breach Management. Producer shall notify The Hartford within 72 hours following discovery of any Security Breach via e-mail to Xxxxxxxxxxx_Xxxxxxxx_Xxxxxxxx@xxxxxxxxxxx.xxx, or as otherwise directed by The Hartford. Producer shall: (a) immediately remedy the Security Breach; (b) provide all necessary assistance and cooperation to enable The Hartford to remedy any impact of the Security Breach, and to meet its obligations with respect to the Security Breach; (c) participate in a virtual control verification and remediate any medium or high risk control gaps as required by The Hartford; and (d) indemnify and reimburse The Hartford for costs and expenses incurred by The Hartford in connection with the Security Breach.
Security Breach Management. 7.1 Each of the Parties shall have the manpower, system, facilities and equipment in place to properly monitor access to Personal Data, and to monitor and identify a Security Breach.
Security Breach Management. 7.1 Notice. *****.
Security Breach Management. Meraki maintains security incident management policies and procedures, including detailed security incident escalation procedures. If Meraki becomes aware of any unlawful destruction, loss, alteration or unauthorized disclosure of Customer Data (a “Security Incident”), then Meraki will notify Customer without undue delay and provide Customer with relevant information about the Security Incident, including the type of Customer Data involved, the volume of Customer Data disclosed, the circumstances of the incident, mitigation steps taken, and remedial and preventative action taken. The obligations in this Section 7 do not apply to Security Incidents caused by Customer or Customer’s Network Users.
Security Breach Management. Notify Company within 72 hours following discovery of any Security Breach via e-mail to Xxxxxxxxxxx_Xxxxxxxx_Xxxxxxxx@xxxxxxxxxxx.xxx, or as otherwise directed by Company. Producer shall: (a) immediately remedy the Security Breach; (b) provide all necessary assistance and cooperation to enable Company to remedy any impact of the Security Breach, and to meet its obligations with respect to the Security Breach; (c) participate in a virtual control verification and remediate any medium or high risk control gaps as required by Company, and (d) indemnify and reimburse Company for costs and expenses incurred by Company in connection with the Security Breach.
AutoNDA by SimpleDocs
Security Breach Management 

Related to Security Breach Management

  • Virus Management DST shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within DST environment.

  • Security Services CONTRACTOR shall provide security services designed for preventing escapes, maintaining order, providing care, custody, control, supervision and management of the inmate population. A successful security program depends heavily on staff training, effective administration, and the establishment of inmate programs. The organization, staffing, and administration of the security program are vital to the Facility. The direction provided by a well-organized and clearly articulated operations manual, and emergency planning provides a solid base for successful administration. The final operations manual shall be submitted to the Bureau prior to the Service Commencement Date and shall be reviewed annually and updated as needed. Documentation of the review shall be provided annually to the On- Site Contract Monitor. Changes to the plan require written permission by the Contract Manager. The Department reserves the right to require changes to plans submitted to the Bureau.

  • Incident Event and Communications Management a. Incident Management/Notification of Breach - DST shall develop, implement and maintain an incident response plan that specifies actions to be taken when DST or one of its subcontractors suspects or detects that a party has gained material unauthorized access to Fund Data or systems or applications containing any Fund Data (the “Response Plan”). Such Response Plan shall include the following:

  • Cybersecurity; Data Protection To the best knowledge of the Company after due inquiry, the Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and its Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any Governmental Entity, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Construction Management Landlord or its Affiliate or agent shall supervise the Work, make disbursements required to be made to the contractor, and act as a liaison between the contractor and Tenant and coordinate the relationship between the Work, the Building and the Building’s Systems. In consideration for Landlord’s construction supervision services, Tenant shall pay to Landlord a construction supervision fee equal to three percent (3%) of Tenant’s Costs specified in Section 7.

  • Security System The site and the Work area may be protected by limited access security systems. An initial access code number will be issued to the Contractor by the County. Thereafter, all costs for changing the access code due to changes in personnel or required substitution of contracts shall be paid by the Contractor and may be deducted from payments due or to become due to the Contractor. Furthermore, any alarms originating from the Contractor’s operations shall also be paid by the Contractor and may be deducted from payments due or to become due to the Contractor.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!