Security Breaches Sample Clauses

Security Breaches. In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.
AutoNDA by SimpleDocs
Security Breaches. In the event of a security breach that relates to the IT Services, the Parties shall, subject to any applicable Law, cooperate with each other in good faith regarding the timing and manner of (a) notification to their respective customers, potential customers, employees and/or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Entities.
Security Breaches. If any Party discovers (a) any material breach of the Security Regulations or of the systems used to provide the Services or (b) any breach or threatened breach of the Security Regulations that involves or may reasonably be expected to involve unauthorized access, disclosure or use of the other Party’s or its Affiliates’ Confidential Information (each of (a) and (b), a “Security Incident”), such Party shall, at the cost of the Party responsible for the Security Incident, (i) promptly (both orally, if practicable, and in any event in writing) notify the other Party of the Security Incident and (ii) reasonably cooperate with the other Party (1) to take commercially reasonable measures necessary to control and contain the security of such Confidential Information, (2) to remedy any such Security Incident, including using commercially reasonable efforts to identify and address any root causes for such Security Incident, (3) to furnish full details of the Security Incident to the other Party and keep such other Party advised of all material measures taken and other developments with respect to such Security Incident, (4) in any litigation or formal action with third parties or in connection with any regulatory, investigatory or other action of any Governmental Authority and (5) in notifying the other Party’s or its Affiliates’ customers and Personnel and other persons of the Security Incident to the extent reasonably requested by the other Party.
Security Breaches. In addition, the Client acknowledges and assumes the following, namely;
Security Breaches. Without limiting any provisions regarding Security Breaches set forth in the Agreement, for the purposes of this Exhibit E a Security Breach shall include any alleged or actual compromise, unauthorized access, disclosure, theft, or unauthorized use of a Card or Cardholder information or User credentials, regardless of cause, including, without limitation, a breach of or intrusion into any system, or failure, malfunction, inadequacy, or error affecting any server, wherever located, or hardware or software of any system, through which User credentials or Card or Cardholder information resides, passes through, and/or could have been compromised. User shall notify Autobooks immediately if User becomes aware of or suspects a Security Breach (including at a User service provider). User will fully cooperate with Autobooks, Bank, and any Card Brand with respect to any investigation and/or additional requirements related to any actual or suspected Security Breach. User will preserve and provide to Autobooks or its designated agents or representatives copies of all records in connection with any Security Breach, and will fully cooperate with any forensic investigators or other third parties engaged in connection with the identification and remediation of such Security Breach. This section shall survive termination of this Exhibit E
Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify Xxxxx of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to Xxxxx required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to Xxxxx during regular business hours as a contact regarding such Information Party’s obligations under this Section. (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to Xxxxx in investigating, remedying and taking any other reasonable action Xxxxx deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) provide Xxxxx with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at Xxxxx or the transactions contemplated hereunder) also notify Xxxxx of any third-party legal process relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).
Security Breaches. In the event of a security breach that relates to the Transition Services, the Parties shall, subject to any applicable Law, cooperate with each other in good faith regarding the timing and manner of (a) notification to their respective customers, potential customers, employees and/or agents concerning a breach or potential breach of security and (b) disclosures to appropriate Governmental Entities.
AutoNDA by SimpleDocs
Security Breaches. Broadridge and Ridge shall promptly provide Xxxxxx or Client, as applicable, with notice of any breach of data security involving Xxxxxx or Client files or Information, as applicable, in the possession of Broadridge or Ridge or any of their Affiliates or subcontractors and shall at its cost and expense (1) investigate and respond to, and remediate the effects of, the security breach in accordance with applicable Laws and Broadridge’s and Ridge’s policies and procedures, and using commercially reasonable efforts, (2) provide Xxxxxx and Client with assurance reasonably satisfactory to such other party that such breach or intrusion shall not recur, (3) promptly furnish to Xxxxxx and Client full details that Broadridge or Ridge has or may obtain regarding such unauthorized access and use reasonable efforts to assist Xxxxxx and Client in investigating or preventing the reoccurrence of any such access and (4) cooperate with Xxxxxx and Client in any litigation and investigation against third parties deemed reasonably necessary by Xxxxxx and Client to protect its rights.
Security Breaches. Notwithstanding the Operator’s other rights under this Tariff, Operator, at its sole discretion, may deny access to any User, its employees, agents, contractors, guests or invitees upon breaches any of the security rules and regulations which apply to the Berth Corridor.
Security Breaches. ACS shall indemnify, defend and hold harmless the Symetra Indemnitees from and against, and shall pay any and all Losses sustained or incurred by any of the Symetra Indemnitees, based upon or relating to any claim, suit or proceeding brought by any Third Party against any of the Symetra Indemnitees as a result of any failure by ACS, its employees, agents and/or Subcontractors to comply with the security obligations set forth in this Agreement relating to protection against fraudulent or other inappropriate or unauthorized use of or access to the systems and/or networks described herein.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!