Common use of Security Breaches Clause in Contracts

Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify Xxxxx of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to Xxxxx required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to Xxxxx during regular business hours as a contact regarding such Information Party’s obligations under this Section. (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to Xxxxx in investigating, remedying and taking any other reasonable action Xxxxx deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) provide Xxxxx with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at Xxxxx or the transactions contemplated hereunder) also notify Xxxxx of any third-party legal process relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).

Appears in 2 contracts

Samples: Receivables Purchase and Administration Agreement (T-Mobile US, Inc.), Receivables Purchase and Administration Agreement (T-Mobile US, Inc.)

AutoNDA by SimpleDocs

Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify Xxxxx of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to Xxxxx required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to Xxxxx during regular business hours as a contact regarding such Information Party’s obligations under this Section. (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to Xxxxx in investigating, remedying and taking any other reasonable action Xxxxx deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) shall provide Xxxxx with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at Xxxxx or the transactions contemplated hereunder) also notify Xxxxx of any third-party legal process relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).

Appears in 2 contracts

Samples: Receivables Purchase and Administration Agreement (T-Mobile US, Inc.), Receivables Purchase and Administration Agreement (T-Mobile US, Inc.)

Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify Xxxxx of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to Xxxxx required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to Xxxxx during regular business hours as a contact regarding such Information Party’s obligations under this Section.. T-Mobile (EIP) Third A&R RPAA (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to Xxxxx in investigating, remedying and taking any other reasonable action Xxxxx deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) provide Xxxxx with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at Xxxxx or the transactions contemplated hereunder) also notify Xxxxx of any third-party legal process relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).

Appears in 1 contract

Samples: Receivables Purchase and Administration Agreement (T-Mobile US, Inc.)

Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify Xxxxx T-Mobile PCS Holdings of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to Xxxxx T-Mobile PCS Holdings required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to Xxxxx T-Mobile PCS Holdings during regular business hours as a contact regarding such Information Party’s obligations under this Section. (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to Xxxxx T-Mobile PCS Holdings in investigating, remedying and taking any other reasonable action Xxxxx T-Mobile PCS Holdings deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) provide Xxxxx T-Mobile PCS Holdings with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a 740293053.3 00000000 bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at Xxxxx T-Mobile PCS Holdings or the transactions contemplated hereunder) also notify Xxxxx T-Mobile PCS Holdings of any third-party legal process relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).

Appears in 1 contract

Samples: Master Receivables Purchase Agreement (T-Mobile US, Inc.)

AutoNDA by SimpleDocs

Security Breaches. (a) Each Information Party shall, promptly after confirmation thereof, notify Xxxxx of any actual, probable or reasonably suspected breach of any safeguards or of any other actual, probable or reasonably suspected unauthorized access to, or acquisition, use, loss, destruction, compromise or disclosure of, any Subscriber Information maintained on such Information Party’s systems (each, a “Security Breach”). In any notification to Xxxxx required under this Section 5, the Information Party shall designate a single individual employed by such Information Party who shall be reasonably available to Xxxxx during regular business hours as a contact regarding such Information Party’s obligations under this Section. (b) Each Information Party shall: (i) unless prohibited by applicable law, court order or similar legal process, provide reasonable assistance to Xxxxx in investigating, remedying and taking any other reasonable action Xxxxx deems necessary regarding any Security Breach and any dispute, inquiry or claim that concerns the Security Breach; and (ii) provide Xxxxx with assurance reasonably satisfactory to it that such Security Breach or potential Security Breach will not recur. Unless prohibited by an applicable law, court order or similar legal process, each Information Party shall (other than to a bank examiner or self-regulatory organization in each case upon their request therefor in the course of routine supervisory activities not directed specifically at Xxxxx or the transactions contemplated hereunder) also notify Xxxxx of any third-party legal process 736942168 19632398738387080 relating to any Security Breach, including, without limitation, any legal process initiated by any governmental entity (foreign or domestic).

Appears in 1 contract

Samples: Receivables Purchase and Administration Agreement (T-Mobile US, Inc.)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!