Security Compromise Sample Clauses

Security Compromise. During the term of this Agreement, and for a period of [**] years thereafter (or if earlier, until [**] years after End of Life with respect to any particular model of the Equipment), if, while the affected Equipment is within the Initial Warranty Period or the affected Software is under Support Services and Purchaser is using a supported version of Software, a Security Compromise occurs that permits the unauthorized access to a Purchaser’s System, then the Parties jointly shall develop a counter-measures program to remedy such Security Compromise, which program shall be implemented at Seller’s sole expense. Notwithstanding the foregoing, to the extent a Security Compromise arises out of the acts or omissions of a Purchaser or any of Purchaser’s employees, consultants, agents and/or subcontractors or any Purchaser’s failure to implement any security patch available from Seller, the above-referenced counter-measure program shall be implemented at Purchaser’s sole expense, and further, Seller shall be reasonably compensated on a time and materials basis for its services in developing the counter-measures program.
AutoNDA by SimpleDocs
Security Compromise as soon as reasonably practicable but by no later than 72 (seventy-two) hours after becoming aware of any suspected or confirmed Personal Information Breach of any Personal Information in its possession or control, inform the other Party in writing thereof. Furthermore, a Party shall also inform the other Party in writing of the third party(ies) which may have been affected, the nature and extent of the Personal Information Breach and the identity of the unauthorized person/s who may have accessed or acquired the Personal Information. The Party, whose actions and/or omissions resulted in the Personal Information Breach, shall also take necessary remedial steps in order to mitigate the extent of the loss or compromise of such Personal Information, and prevent it from recurring. Such written notification however shall not be interpreted or construed as an admission of fault or liability by the other Party. Where the Party whose actions and/or omissions resulted in the Personal Information Breach, is deemed to be a Responsible Party/Controller, then it will be accountable to the Information Regulator and all affected Data Subjects, and will accordingly be required to carry out any required regulatory notifications of the Personal Information Breach in accordance with Applicable Data Protection Legislation.
Security Compromise. 1. In case of actual or suspected Security Compromise, the National Security Authority of the Party where it has occurred shall, without delay, inform the National Security Authority of the Originating Party and, in accordance with national laws and regulations, initiate appropriate proceedings, in order to determine the circumstances of the compromise. The results of the proceedings shall be forwarded to the National Security Authority of the Originating Party. 2. When the Security Compromise has occurred in a third state, the National Security Authority of the sending Party shall take the actions referred to in paragraph 1 of this Article without delay.
Security Compromise. If at any time the Client believes that the security of communications between the Client and BMO has been compromised or is in any way insecure, the Client will immediately notify BMO and provide all reasonable assistance BMO requires to investigate and correct the problem.
Security Compromise. In the event of a suspected or actual compromise of security of any kind – destruction, misappropriation, theft, unauthorized reproduction, disclosure or actual or suspected loss of transmitted or exchanged classified information and material, or any violation of national regulations on the protection of classified information transmitted under this Agreement – the competent security authorities of the other Party shall be informed immediately in writing. The notification shall be sufficiently detailed to enable the originating Party to conduct a thorough evaluation of the consequences. The recipient Party shall conduct an investigation (with the assistance of the other Party, if necessary) and take all appropriate measures, in accordance with its national laws and regulations, to mitigate the consequences and prevent any further such occurrences. The recipient Party shall inform the originating Party of the results of the investigation and of the measures taken to prevent the recurrence of such incidents.
Security Compromise. Where Protected Data has been acquired by any unauthorised person on systems managed by or otherwise controlled by IRONTREE INTERNET SERVICES, excluding unsuccessful attempts or activities that do not compromise the security of the Protected Data.

Related to Security Compromise

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Safeguards Contractor shall maintain a comprehensive security program that is reasonably designed to protect the security, privacy, confidentiality, and integrity of District Data. Contractor shall store and process District Data in accordance with industry standards and best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in CIS Critical Security Controls (CIS Controls), as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation the Act, as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended, or such other standard as the District’s Chief Privacy Officer or designee may agree to in writing. Contractor shall also encrypt any backup, backup media, removable media, tape, or other copies. In addition, Contractor shall fully encrypt disks and storage for all laptops and mobile devices.

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.

  • Security Agreements On the Closing Date, (x) Holdings and the Borrower shall have duly authorized, executed and delivered the Security Agreement substantially in the form of Exhibit E (as amended, modified, restated and/or supplemented from time to time, the “Security Agreement”) covering all of Holdings’ and the Borrower’s present and future Collateral referred to therein (including, as applicable, by reference to the Perfection Certificate) (the “Security Agreement Collateral”) and (y) Borrower and Holdings shall have duly authorized, executed and delivered the Perfection Certificate and shall have delivered the following: (i) proper financing statements (Form UCC-1 or the equivalent) authorized for filing under the UCC or other appropriate filing offices of each jurisdiction and, in the case of the Borrower, filings with the United States Patent and Trademark Office and United States Copyright Office, in each case, as may be reasonably necessary or desirable to perfect the security interests purported to be created by the Security Agreement and as set forth on Schedule 6 to the Perfection Certificate; (ii) all stock certificates or Instruments (as defined in the Security Agreement), if any, representing or evidencing the Security Agreement Collateral (to the extent required by the Security Agreement) accompanied by instruments of transfer and stock powers undated and endorsed in blank; and (iii) certified copies, each of a recent date, of (x) requests for information or copies (Form UCC-1), or equivalent reports as of a recent date, listing all effective financing statements that name Holdings or the Borrower as debtor and that are filed in the jurisdictions referred to in clause (i) above, together with copies of such other financing statements that name Holdings or the Borrower as debtor (none of which shall cover any of the Collateral except to the extent evidencing Permitted Liens or to the extent such financing statements will be terminated as contemplated by Section 6.05), (y) United States Patent and Trademark Office and United States Copyright Office searches reasonably requested by the Administrative Agent and (z) reports as of a recent date listing all effective tax and judgment liens with respect to Holdings or the Borrower in each jurisdiction as the Administrative Agent may reasonably require.

  • Security Clearance 6.7.1 Where specified by the Authority or the Contract user, the Supplier shall be responsible for ensuring that all Staff are security cleared to the level required by the Security Requirements not less than 5 Working Days before such person begins to perform the Services. If the Authority is responsible for applying for security clearance for Staff pursuant to this Clause 6.7.1, the Supplier shall provide a completed security clearance application form for such members of Staff to the Authority not less than 30 days before such members of Staff begin to perform the Services. 6.7.2 The Authority shall issue a pass for all Staff who are security cleared to an appropriate level for the Premises in accordance with Clause 6.7.1 on or before the date when such member of Staff is required to enter onto the Premises in Order to perform the Services. Passes shall remain the property of the Authority and shall be surrendered on demand or on termination or expiry of this Contract. 6.7.3 A member of Staff not in possession of a pass who is required by the Supplier or any Sub-contractor to provide the services urgently shall be allowed temporary access to the Premises on condition that the Supplier ensures, or procures that any Sub- contractor shall ensure, that such individual is accompanied at all times while on the Premises by a member of Staff who has been issued with a pass in accordance with Clause 6.7.1. 6.7.4 Without prejudice to the provisions of Clauses 6.7.1 to 6.7.3 inclusive, the Authority may refuse any member of Staff Admission to the Premises or require the removal of any member of Staff from the Premises in accordance with Clause 3.3 if such member of Staff is not in possession of a pass pursuant to Clause 6.7.2 or accompanied in accordance with Clause 6.7.3.

  • Security Clearances A. The General Contractor is to supply the Court with names, dates of birth, and social security numbers of all employees who will be on site. This information must be submitted one (1) week prior to access to the site. The Court has final word on who will or who will not be allowed on the project premises.

  • Security Interests Absolute All rights of the Secured Parties and all obligations of the Debtors hereunder, shall be absolute and unconditional, irrespective of: (a) any lack of validity or enforceability of this Agreement, the Debentures or any agreement entered into in connection with the foregoing, or any portion hereof or thereof; (b) any change in the time, manner or place of payment or performance of, or in any other term of, all or any of the Obligations, or any other amendment or waiver of or any consent to any departure from the Debentures or any other agreement entered into in connection with the foregoing; (c) any exchange, release or nonperfection of any of the Collateral, or any release or amendment or waiver of or consent to departure from any other collateral for, or any guarantee, or any other security, for all or any of the Obligations; (d) any action by the Secured Parties to obtain, adjust, settle and cancel in its sole discretion any insurance claims or matters made or arising in connection with the Collateral; or (e) any other circumstance which might otherwise constitute any legal or equitable defense available to a Debtor, or a discharge of all or any part of the Security Interests granted hereby. Until the Obligations shall have been paid and performed in full, the rights of the Secured Parties shall continue even if the Obligations are barred for any reason, including, without limitation, the running of the statute of limitations or bankruptcy. Each Debtor expressly waives presentment, protest, notice of protest, demand, notice of nonpayment and demand for performance. In the event that at any time any transfer of any Collateral or any payment received by the Secured Parties hereunder shall be deemed by final order of a court of competent jurisdiction to have been a voidable preference or fraudulent conveyance under the bankruptcy or insolvency laws of the United States, or shall be deemed to be otherwise due to any party other than the Secured Parties, then, in any such event, each Debtor’s obligations hereunder shall survive cancellation of this Agreement, and shall not be discharged or satisfied by any prior payment thereof and/or cancellation of this Agreement, but shall remain a valid and binding obligation enforceable in accordance with the terms and provisions hereof. Each Debtor waives all right to require the Secured Parties to proceed against any other person or entity or to apply any Collateral which the Secured Parties may hold at any time, or to marshal assets, or to pursue any other remedy. Each Debtor waives any defense arising by reason of the application of the statute of limitations to any obligation secured hereby.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!