Security Breach. A Party will notify the other Party, as promptly as possible under the circumstances and without unreasonable delay, of any Security Breach involving any Protected Data (as defined on Schedule G hereof). As used herein, “Security Breach” is defined as any event involving a known, actual, or suspected compromise of the security, confidentiality or integrity of (i) the Protected Data (as defined on Schedule G hereof) of more than 5,000 customers of a Party or (ii) the video of the premises of one or more customers of a Party, including but not limited to any unauthorized access or use of such video, except where such Security Breach is due to the sole fault of a customer. The Party undergoing a Security Breach will use commercially reasonable efforts to contain such a breach and provide the other Party with a detailed description of the Security Breach, the type of data that was the subject of the Security Breach and the identity of each affected business (or person, to the extent permitted by Law), promptly after such information can be collected or otherwise becomes available. The Party undergoing the Security Breach agrees to take action immediately, at its own expense, to investigate the Security Breach, to take all commercially reasonable actions to identify, prevent, and mitigate the effects of any such Security Breach, and to carry out any recovery or other action (e.g., mailing statutory notices, providing credit monitoring services) necessary to remedy the Security Breach. The Party undergoing the Security Breach shall make commercially reasonable efforts to give the other Party a reasonable opportunity to consult in advance on any filings, communications, notices, press releases or reports related to any Security Breach, but the final decision on their contents shall belong to the Party undergoing the Security Breach. The Parties agree that any Person (to the extent engaging in a subscriber business) or subscriber business purchased or acquired by a Party via equity or asset sale or otherwise shall (x) comply with the standards set forth in Schedule G within one (1) year from such purchase or acquisition and (y) to the extent such Person does not offer services related to video surveillance that involves storing such video on such Person’s servers or other systems directly or through a vendor (“Hosted Video”) as of the date of such purchase or acquisition, not offer Hosted Video in any subscriber business until such time as such Person complies with the standards set forth on Schedule G.
Appears in 9 contracts
Samples: Trademark Agreement, Trademark Agreement, Trademark Agreement