Security, Data Incidents Sample Clauses

Security, Data Incidents. Merchant will be solely responsible for the security, quality, accuracy, and adequacy of all transactions and information supplied hereunder, and will establish and maintain adequate audit controls to monitor the security, quality, maintenance, and delivery of such data. Without limiting the generality of the foregoing, Merchant represents and warrants to Processor that it has implemented and will maintain secure systems for maintaining and processing information and for transmitting information to Processor. Processor shall have no liability whatsoever for the security or availability of any communications connection used in connection with the Services provided hereunder. Merchant acknowledges that Processor is responsible only for the security of its own proprietary systems, and not for the systems of any third party, including without limitation any Merchant Supplier of Merchant. Merchant shall notify Processor immediately if Merchant becomes aware of or suspects a Data Incident. The parties agree to fully cooperate with each other and any Association with respect to any investigation and/or additional requirements related to a suspected Data Incident. The Data Security Addendum attached hereto is hereby incorporated in its entirety.
AutoNDA by SimpleDocs
Security, Data Incidents. Merchant acknowledges the importance of compliance with Bank and Card Networks’ security requirements and obligations to protect Transactions and information whether during transmission, while in storage and from disclosure. Merchant will be solely responsible for the security, quality, accuracy, and adequacy of all Transactions and information supplied hereunder, and will establish and maintain adequate audit controls to monitor the security, quality, maintenance, and delivery of such data. Without limiting the generality of the foregoing, Merchant warrants to Bank that it has implemented and will maintain secure systems for maintaining and processing Transaction and information and for transmitting Transactions and information to Bank. Bank shall have no liability whatsoever for the security or availability of any communications connection used in connection with the Services provided hereunder. Merchant acknowledges that Bank is responsible only for the security of its own proprietary systems, and not for the systems of any third party, including without limitation any Merchant Service Provider of Merchant. Merchant shall notify Bank immediately if Merchant becomes aware of or suspects a Data Incident. Merchant agrees to fully cooperate with Bank and any Card Network with respect to any investigation and/or additional requirements related to a suspected Data Incident until the investigation is complete.
Security, Data Incidents. 5.1. We have installed and will maintain industry-standard security measures for our information systems and reasonable security procedures appropriate to the nature of the information, to protect all your Confidential Information and Customer Personal Information against Data Incidents. Such procedures and practices shall be as set out in Schedule 5. 5.2. In the event that a Data Incident occurs involving Customer Personal Information, we will inform you without undue delay after our discovery of the Data Incident, including known information about the Data Incident. 5.3. We shall investigate, remedy and take any other action reasonably necessary in response to such Data Incident, and shall provide reasonable assistance to you (and any supervisory authority involved) in connection with it, including in relation to any notifications to be made to any third party. The decision over whether and how such notifications are to be made in relation to Customer Personal Information shall be made solely by you.
Security, Data Incidents. 5.1. SocialEdge has installed and shall maintain industry-standard security measures for SocialEdge’s information systems and reasonable security procedures appropriate to the nature of the information, to protect all Confidential Information, Covered Customer Data, Covered Company Data and personal data obtained hereunder against Data Incidents. Such procedures and practices shall be as set forth in Schedule 5. 5.2. In the event that a Data Incident occurs involving Covered Customer Data, SocialEdge shall within forty- eight (48) hours after SocialEdge's discovery of the Data Incident provide notice to Customer including known information about the Data Incident. 5.3. SocialEdge shall provide reasonable assistance to Customer (and any supervisory authority involved) in investigating, remedying and taking any other action reasonably necessary in response to such Data Incident, including in relation to any notifications to be made to any third party. The decision over whether and how such notifications are to be made shall be solely for Customer.
Security, Data Incidents. Each party will implement reasonable administrative, technical and physical safeguards to: (i) ensure the security and confidentiality of the other party’s Confidential Information;
Security, Data Incidents. 11.1 Sub-merchant will be solely responsible for the security, quality, accuracy, and adequacy of all transactions and information supplied hereunder, and will establish and maintain adequate audit controls to monitor the security, quality, maintenance, and delivery of such data. Without limiting the generality of the foregoing, Sub-merchant represents and warrants to Provider that it has implemented and will maintain secure systems for maintaining and processing information and for transmitting information via Provider to Processor. Neither Provider, Processor or Member Bank shall have any liability whatsoever for the security or availability of any communications connection used in connection with the Services provided hereunder. Sub-merchant acknowledges that Provider and Processor are responsible, respectively, only for the security of their own proprietary systems, and not for the systems of any third party, including without limitation any Rev. 11/07/2021 pg. 10

Related to Security, Data Incidents

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Reporting Incidents The Interconnection Parties shall report to each other in writing as soon as practical all accidents or occurrences resulting in injuries to any person, including death, and any property damage arising out of the Interconnection Service Agreement.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Error Incident An Error Incident is a single or series of NAV Errors that results from the same act, omission, or use of incorrect data. NAV Errors will be corrected as follows: · If an NAV Error is less than ½ of 1% of NAV and results in a Net Benefit, the fund will retain the benefit. · If an NAV Error is less than ½ of 1% of NAV and results in a Net Loss, the Net Loss will be paid to the fund by the party responsible for causing the NAV Error. · In the case of a Material NAV Error, shareholder transactions/accounts will be corrected/ reprocessed at the corrected (restated) NAV, subject to a $10 per-account correction minimum threshold; any residual Net Benefit after correction of shareholder accounts will be retained by the fund and any residual Net Loss (resulting from uncorrected accounts below the $10 minimum threshold) will be paid to the fund by the party responsible for causing the error. If an NAV error is not caused by either the fund accounting agent or TRP, both TRP and the fund accounting agent will provide all reasonable assistance to the fund in its attempt to recover all costs from the responsible third party. · Notwithstanding any contractual provisions to the contrary, to the extent a NAV Error was caused by the actions or omissions of the fund’s accounting agent, any Net Loss or residual Net Loss equal to $5,000 or less that results from the same Error Incident will be paid by the accounting agent. TRP will be responsible for summarizing and reporting to the funds’ Audit Committee or Trust Company’s Board (or designated committee), as applicable, all NAV Errors related to the funds/trusts in conjunction with other relevant error statistics on a quarterly basis. The report will include corrected NAV Errors as well as the aggregate effect of any uncorrected NAV Errors. The report will also include information about shareholder accounts that were corrected in the discretion of TRP in the case of an NAV Error that is not a Material NAV Error. The funds’ Audit Committee and the Trust Company’s Board shall have the authority to adjust these procedures with respect to the funds and trusts, respectively, to the extent necessary or desirable to address NAV Errors by providing notice thereof to TRP and the fund’s accounting agent.

  • Appropriation of Performance Security (i) Upon occurrence of a Contractor’s Default, the Authority shall, without prejudice to its other rights and remedies hereunder or in law, be entitled to encash and appropriate the relevant amounts from the Performance Security as Damages for such Contractor’s Default. (ii) Upon such encashment and appropriation from the Performance Security, the Contractor shall, within 30 (thirty) days thereof, replenish, in case of partial appropriation, to its original level the Performance Security, and in case of appropriation of the entire Performance Security provide a fresh Performance Security, as the case may be, and the Contractor shall, within the time so granted, replenish or furnish fresh Performance Security as aforesaid failing which the Authority shall be entitled to terminate the Agreement in accordance with Article 23. Upon replenishment or furnishing of a fresh Performance Security, as the case may be, as aforesaid, the Contractor shall be entitled to an additional Cure Period of 30 (thirty) days for remedying the Contractor’s Default, and in the event of the Contractor not curing its default within such Cure Period, the Authority shall be entitled to encash and appropriate such Performance Security as Damages, and to terminate this Agreement in accordance with Article 23.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!