Security Breach Response Sample Clauses

Security Breach Response. In the event CrowdStrike discovers a Security Breach, CrowdStrike shall:
AutoNDA by SimpleDocs
Security Breach Response. A. In the event of a breach of Section 5 [Sprint Provided Content Protection and Security] above with respect to Service Provider’s physical facilities or infrastructure, which breach affects any item of Content (a “Security Breach”), Service Provider agrees to notify Sprint of such Security Breach within twenty-four (24) hours of detection, if reasonably practicable, and follow such notification with a preliminary written assessment of the severity of the breach or failure within an additional forty-eight (48) hours, with proposed ways of redressing the problem(s) identified. For a Security Breach of any DRM Requirement involving any of the software and/or devices then in use by Users, Service Provider agrees to notify Sprint of the Security Breach within twenty-four (24) hours from the time Service Provider learns of the Security Breach, and follow such notification with a preliminary assessment of the severity of the Security Breach within an additional seventy-two (72) hours, with proposed ways of redressing the problem identified. Additionally, Sprint reserves the right, with written notice to Service Provider, to pull the Sprint Provided Content in whole or in part from Service Provider’s service within twenty-four (24) hours of Security Breach discovery.
Security Breach Response. Immediately upon becoming aware of a Security Breach of Moderate or High information, or of circumstances that could have resulted in unauthorized access to or disclosure or use of University Data, Supplier will notify University, fully investigate the incident. Supplier will cooperate fully with the University’s investigation of and response to the incident, including providing University or its agents, or both, with access (physical and logical) to Supplier’s related documents and facilities. Except as otherwise required by law, Supplier will not provide notice of the incident directly to individuals whose Personal Information was involved, regulatory agencies, or other entities, without University’s prior written permission.
Security Breach Response. Upon becoming aware of a confirmed Security Breach, Campaign Monitor will notify Customer without undue delay after becoming aware of a confirmed Security Breach and will provide all assistance and information relating to the Security Breach as it becomes known or as is reasonably requested by Customer. Campaign Monitor will use reasonable endeavors to mitigate and, where possible, to remedy the effect of, any Security Breach in accordance with the Security Measures. Where required by applicable Data Protection Laws, Campaign Monitor shall document the Security Breach and the facts surrounding it, the effects and any remedial action taken.
Security Breach Response. Upon becoming aware of a Security Breach, Tines shall without undue delay, notify Customer (at the Customer-designated email address that Customer has provided via this link: xxxxx://xx.xxxxx.xx/pages/legal-emails/) of the discovery of the confirmed Security Breach. Such notification shall include, to the extent known: (i) a description of the likely consequences of the Security Breach, (ii) measures to mitigate its possible adverse effects; (iii) types of information affected by the Security Breach; and (iv) date and time of the Security Breach. Where required , Tines shall provide reasonable assistance to Customer to the extent required for Customer to comply with its obligations under Applicable Data Protection Laws.
Security Breach Response. (a) Upon becoming aware of any unauthorized or accidental access to or use or disclosure of any In-Scope Personal Data which is in the Service Provider’s custody or control, or the Service Provider having reasonable belief that any such access, use or disclosure has occurred or is at risk of occurring (which shall include, without limitation, the loss of or the inability to locate definitively any media, device or equipment on which In-Scope Personal Data is or may be stored), the Service Provider shall:
Security Breach Response. Client agrees and acknowledges that Company's notification of or response to a Security Breach will not be construed as an acknowledgment by Company of any fault or liability with respect to the Security Incident.
AutoNDA by SimpleDocs
Security Breach Response. Manager shall document responsive actions taken in connection with any incident involving a breach of security, and mandatory post-incident review of events and actions taken, if any, to make changes in business practices relating to protection of Owner Data.
Security Breach Response 

Related to Security Breach Response

  • Environment, Health, and Safety 24.4.1. The Supplier and its staff (and/or any sub-supplier and/or subcontractor) shall comply with the laws and regulations in force related to protection of the environment, the health and safety instructions applicable to the Goods and Services performed pursuant to the Contract and especially, if appropriate, to the Goodsand Services performedon any Site by a third company.

  • Failure to Respond If you fail to respond by the date given above, your application will be refused under Section 3A(4)(a) of the Registered Designs Act 1949.

  • Environmental, Health and Safety Matters (a) The Company has complied and is in compliance with all Environmental, Health, and Safety Requirements.

  • Environmental, Health and Safety i. Environment, Health and Safety Performance. Seller acknowledges and accepts full and sole responsibility to maintain an environment, health and safety management system ("EMS") appropriate for its business throughout the performance of this Contract. Buyer expects that Seller’s EMS shall promote health and safety, environmental stewardship, and pollution prevention by appropriate source reduction strategies. Seller shall convey the requirement of this clause to its suppliers. Seller shall not deliver goods that contain asbestos mineral fibers.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!