Security Breach of Cardholder Data Sample Clauses

Security Breach of Cardholder Data. Without limiting the obligations set forth in Section 9, in the event that any Security Breach is alleged or confirmed to involve Cardholder Data, Company shall fully cooperate with AHS and any applicable Payment Card Brand Organization in investigating and remediating such Security Breach. Without limiting the obligations set forth in Section 9, Company will, upon request from AHS, and at Company’s sole cost and expense, engage a forensic investigator approved by AHS no later than forty-eight (48) hours following Company’s receipt of notice from AHS to investigate such Security Breach. Company shall (a) allow such forensic investigator to conduct promptly an examination of Company’s systems, procedures and records (and shall provide access, information and assistance as necessary to conduct such examination), (b) support such forensic investigator in producing an oral and written report, (c) discuss the investigator’s initial findings with AHS, and (d) cause such forensic investigator to issue a written report of its findings to AHS. In addition to the foregoing, Company will provide to AHS all information related to Company’s or any Payment Card Brand Organization’s investigation related to any unauthorized use, access, or processing of Cardholder Data, including, but not limited to, all forensic reports and systems audits.
AutoNDA by SimpleDocs
Security Breach of Cardholder Data. Notwithstanding the requirements in Section 9, in the event that Company experiences any Security Breach which is alleged or confirmed to involve Cardholder Data, then Company shall cooperate with AHS and/or any Payment Card Brand Organization in investigating such Security Breach. Company will, upon request from AHS, and at Company’s sole cost and expense, engage a forensic investigator approved by AHS no later than forty-eight (48) hours following Company’s notice of the Security Incident to AHS to investigate the Security Breach. Company shall allow such forensic investigator to promptly conduct an examination of Company’s systems, procedures and records, orally report and discuss the investigator’s initial findings with AHS, and thereafter issue a written report of its findings to the Company and AHS. For avoidance of doubt, Company shall provide such access, information, and assistance as is necessary for the forensic investigator, AHS, and/or Payment Card Brand Organizations to complete the investigation of the Security Incident. All information associated with Company’s or any Payment Card Brand Organization’s investigation related to any unauthorized use, access, or Processing of Cardholder Data including, but not limited, to forensic reports and systems audits shall be provided by Company to AHS.

Related to Security Breach of Cardholder Data

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer. Confidentiality

  • Data Breach In the event of an unauthorized release, disclosure or acquisition of Student Data that compromises the security, confidentiality or integrity of the Student Data maintained by the Provider the Provider shall provide notification to LEA within seventy-two (72) hours of confirmation of the incident, unless notification within this time limit would disrupt investigation of the incident by law enforcement. In such an event, notification shall be made within a reasonable time after the incident. Provider shall follow the following process:

  • Data Breaches A. Upon the discovery by the Contractor of a confirmed breach of security that results in the unauthorized release, disclosure, or acquisition of student data, the Contractor shall provide initial notice to the Board as soon as reasonably possible, after such discovery (“Initial Notice”). The Initial Notice shall be delivered to the Board by electronic mail to Superintendent Xxxxxxx X. Xxxx, xxxxx@xxxxxxxxxxxx.xxx or to the contact currently on file and shall include the following information, to the extent known at the time of notification:

  • Personal Data Breach 7.1 Processor shall notify Company without undue delay upon Processor becoming aware of a Personal Data Breach affecting Company Personal Data, providing Company with sufficient information to allow the Company to meet any obligations to report or inform Data Subjects of the Personal Data Breach under the Data Protection Laws.

  • Personal Data Breaches 5.7.1 The Data Processor shall give immediate notice to the Data Controller if a breach occurs, that can lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to, personal data transmitted, stored or otherwise processed re the Personal Data processed on behalf of the Data Controller (a “Personal Data Breach”).

  • Security Breach Notifications Notice must be given by the Subrecipient to anyone whose PSCI could have been breached in accordance with HIPAA, the Information Practices Act of 1977, and State policy.

Time is Money Join Law Insider Premium to draft better contracts faster.