Security Breach Response Sample Clauses

Security Breach Response. In the event CrowdStrike discovers a Security Breach, CrowdStrike shall: a. Without undue delay but no later than 72 hours of becoming aware, notify Customer of the discovery of the Security Breach. Such notice shall summarize the known circumstances of the Security Breach and the corrective action taken or to be taken by CrowdStrike. b. Conduct an investigation of the circumstances of the Security Breach. c. Use commercially reasonable efforts to remediate the Security Breach. d. Use commercially reasonable efforts to communicate and cooperate with Customer concerning its response to the Security Breach.
AutoNDA by SimpleDocs
Security Breach Response. A. In the event of a breach of Section 5 [Sprint Provided Content Protection and Security] above with respect to Service Provider’s physical facilities or infrastructure, which breach affects any item of Content (a “Security Breach”), Service Provider agrees to notify Sprint of such Security Breach within twenty-four (24) hours of detection, if reasonably practicable, and follow such notification with a preliminary written assessment of the severity of the breach or failure within an additional forty-eight (48) hours, with proposed ways of redressing the problem(s) identified. For a Security Breach of any DRM Requirement involving any of the software and/or devices then in use by Users, Service Provider agrees to notify Sprint of the Security Breach within twenty-four (24) hours from the time Service Provider learns of the Security Breach, and follow such notification with a preliminary assessment of the severity of the Security Breach within an additional seventy-two (72) hours, with proposed ways of redressing the problem identified. Additionally, Sprint reserves the right, with written notice to Service Provider, to pull the Sprint Provided Content in whole or in part from Service Provider’s service within twenty-four (24) hours of Security Breach discovery. B. Service Provider shall promptly initiate action to correct each Security Breach, including but not limited to taking such steps as Service Provider may deem necessary by actions at law or otherwise to prevent and prosecute such Security Breach. C. Upon request by either party, the other party must supply to the other’s primary technical contact the name and contact information for such party’s primary person responsible for communicating, at any given time in a full twenty-four (24) hour, three hundred sixty-five (365) day schedule for the duration of the Term, regarding Security Breaches and the status of Service Provider’s response to them, including breaches in security at Service Provider’s facilities and known breaches related to content piracy in the consumer space. The primary technical of the other party’s contact person must be notified within 24 hours when there is a change in this contact information. Sprint/MobiTV Confidential Version Final 08/24/07 Page 49 of 60 * Certain information on this page has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment has been requested with respect to the omitted portions. * Certain information on th...
Security Breach Response. Upon becoming aware of a confirmed Security Breach, Campaign Monitor will notify Customer without undue delay after becoming aware of a confirmed Security Breach and will provide all assistance and information relating to the Security Breach as it becomes known or as is reasonably requested by Customer. Campaign Monitor will use reasonable endeavors to mitigate and, where possible, to remedy the effect of, any Security Breach in accordance with the Security Measures. Where required by applicable Data Protection Laws, Campaign Monitor shall document the Security Breach and the facts surrounding it, the effects and any remedial action taken.
Security Breach Response. Immediately upon becoming aware of a Security Breach of Moderate or High information, or of circumstances that could have resulted in unauthorized access to or disclosure or use of University Data, Supplier will notify University, fully investigate the incident. Supplier will cooperate fully with the University’s investigation of and response to the incident, including providing University or its agents, or both, with access (physical and logical) to Supplier’s related documents and facilities. Except as otherwise required by law, Supplier will not provide notice of the incident directly to individuals whose Personal Information was involved, regulatory agencies, or other entities, without University’s prior written permission.
Security Breach Response. Upon becoming aware of a Security Breach, Tines shall without undue delay, notify Customer (at the Customer-designated email address that Customer has provided via this link: xxxxx://xx.xxxxx.xx/pages/legal-emails/) of the discovery of the confirmed Security Breach. Such notification shall include, to the extent known: (i) a description of the likely consequences of the Security Breach, (ii) measures to mitigate its possible adverse effects; (iii) types of information affected by the Security Breach; and (iv) date and time of the Security Breach. Where required , Tines shall provide reasonable assistance to Customer to the extent required for Customer to comply with its obligations under Applicable Data Protection Laws.
Security Breach Response. Manager shall document responsive actions taken in connection with any incident involving a breach of security, and mandatory post-incident review of events and actions taken, if any, to make changes in business practices relating to protection of Owner Data.
Security Breach Response. (a) Upon becoming aware of any unauthorized or accidental access to or use or disclosure of any In-Scope Personal Data which is in the Service Provider’s custody or control, or the Service Provider having reasonable belief that any such access, use or disclosure has occurred or is at risk of occurring (which shall include, without limitation, the loss of or the inability to locate definitively any media, device or equipment on which In-Scope Personal Data is or may be stored), the Service Provider shall: (i) notify Xxxxxx without delay, and in any event within twenty-four (24) hours, providing reasonable detail of the impact on Xxxxxx of the access, use or disclosure and the corrective action taken and to be taken by the Service Provider; (ii) subject to Clause 34.11, promptly take all necessary and appropriate corrective action to mitigate and to remedy the underlying causes of the access, use or disclosure; (iii) take any action pertaining to the access, use or disclosure required by Applicable Law including, without limitation, at the request of Xxxxxx, providing notices to data subjects whose Personal Data may have been affected, whether or not such notice is required by Applicable Law; and (iv) if the access, use or disclosure would permit access to a data subject’s financial information or lead to a reasonable risk of identity theft or fraud, the Service Provider shall provide, for a reasonable period of time of not less than one (1) year, credit monitoring services for any such data subjects. (b) Except where the Service Provider is not responsible for the actions of the applicable Third Party as set out in Clause 24.7, the Service Provider shall be responsible for all of the following costs and expenses resulting from any unauthorized or accidental access to or use or disclosure of any In-Scope Personal Data which is in the Service Provider’s custody or control, regardless of whether such costs and expenses are incurred by or on behalf of the Service Provider or by or on behalf of Xxxxxx: (i) the cost of providing notice of the event to affected individuals; (ii) the cost of providing required notice to government agencies, credit bureaus, media and/or other required entities; (iii) the cost of providing individuals affected by the event with credit monitoring (including identity theft insurance) and credit protection services designed to prevent fraud associated with identity theft crimes for a specific period not to exceed twelve (12) months, exc...
AutoNDA by SimpleDocs
Security Breach Response. Client agrees and acknowledges that Company's notification of or response to a Security Breach will not be construed as an acknowledgment by Company of any fault or liability with respect to the Security Incident.
Security Breach Response 

Related to Security Breach Response

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include: a. A list of the students whose Student Data was involved in or is reasonably believed to have been involved in the breach, if known; and b. The name and contact information for an employee of the Provider whom parents may contact to inquire about the breach.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Emergency Response Partners must develop, maintain, and carry out a response plan for public water system emergencies, including disease outbreaks, spills, operational failures, and water system contamination. Partners must notify DWS in a timely manner of emergencies that may affect drinking water supplies.

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request.

  • Incident Response Operator shall have a written incident response plan that reflects best practices and is consistent with industry standards and federal and state law for responding to a data breach, breach of security, privacy incident or unauthorized acquisition or use of any portion of Data, including PII, and agrees to provide LEA, upon request, an executive summary of the written incident response plan.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

  • BREACH DISCOVERY AND NOTIFICATION 17 1. Following the discovery of a Breach of Unsecured PHI, CONTRACTOR shall notify 18 COUNTY of such Breach, however both parties agree to a delay in the notification if so advised by a 19 law enforcement official pursuant to 45 CFR § 164.412. 20 a. A Breach shall be treated as discovered by CONTRACTOR as of the first day on which 21 such Breach is known to CONTRACTOR or, by exercising reasonable diligence, would have been 22 known to CONTRACTOR. 23 b. CONTRACTOR shall be deemed to have knowledge of a Breach, if the Breach is 24 known, or by exercising reasonable diligence would have known, to any person who is an employee, 25 officer, or other agent of CONTRACTOR, as determined by federal common law of agency. 26 2. CONTRACTOR shall provide the notification of the Breach immediately to the COUNTY 27 Privacy Officer. CONTRACTOR’s notification may be oral, but shall be followed by written 28 notification within twenty four (24) hours of the oral notification. 29 3. CONTRACTOR’s notification shall include, to the extent possible: 30 a. The identification of each Individual whose Unsecured PHI has been, or is reasonably 31 believed by CONTRACTOR to have been, accessed, acquired, used, or disclosed during the Breach; 32 b. Any other information that COUNTY is required to include in the notification to 33 Individual under 45 CFR §164.404 (c) at the time CONTRACTOR is required to notify COUNTY or 34 promptly thereafter as this information becomes available, even after the regulatory sixty (60) day 35 period set forth in 45 CFR § 164.410 (b) has elapsed, including: 36 1) A brief description of what happened, including the date of the Breach and the date 37 of the discovery of the Breach, if known; 1 2) A description of the types of Unsecured PHI that were involved in the Breach (such 2 as whether full name, social security number, date of birth, home address, account number, diagnosis, 3 disability code, or other types of information were involved); 4 3) Any steps Individuals should take to protect themselves from potential harm 5 resulting from the Breach; 6 4) A brief description of what CONTRACTOR is doing to investigate the Breach, to 7 mitigate harm to Individuals, and to protect against any future Breaches; and 8 5) Contact procedures for Individuals to ask questions or learn additional information, 9 which shall include a toll-free telephone number, an e-mail address, Web site, or postal address. 10 4. COUNTY may require CONTRACTOR to provide notice to the Individual as required in 11 45 CFR § 164.404, if it is reasonable to do so under the circumstances, at the sole discretion of the 12 COUNTY. 13 5. In the event that CONTRACTOR is responsible for a Breach of Unsecured PHI in violation 14 of the HIPAA Privacy Rule, CONTRACTOR shall have the burden of demonstrating that 15 CONTRACTOR made all notifications to COUNTY consistent with this Subparagraph F and as 16 required by the Breach notification regulations, or, in the alternative, that the acquisition, access, use, or 17 disclosure of PHI did not constitute a Breach. 18 6. CONTRACTOR shall maintain documentation of all required notifications of a Breach or 19 its risk assessment under 45 CFR § 164.402 to demonstrate that a Breach did not occur. 20 7. CONTRACTOR shall provide to COUNTY all specific and pertinent information about the 21 Breach, including the information listed in Section E.3.b.(1)-(5) above, if not yet provided, to permit 22 COUNTY to meet its notification obligations under Subpart D of 45 CFR Part 164 as soon as 23 practicable, but in no event later than fifteen (15) calendar days after CONTRACTOR’s initial report of 24 the Breach to COUNTY pursuant to Subparagraph F.2. above. 25 8. CONTRACTOR shall continue to provide all additional pertinent information about the

  • Contingent Emergency Response 1. In order to ensure the proper implementation of contingent emergency response activities under Part 4 of the Project (“Contingent Emergency Response Part”), the Recipient shall ensure that: (a) a manual (“CERC Manual”) is prepared and adopted in form and substance acceptable to the Association, which shall set forth detailed implementation arrangements for the Contingent Emergency Response Part, including: (i) any structures or institutional arrangements for coordinating and implementing the Contingent Emergency Response Part;

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!