Security Incident Clause Samples

A Security Incident clause defines the obligations and procedures that must be followed in the event of a breach or compromise of information security. Typically, this clause requires the affected party to promptly notify the other party of any unauthorized access, disclosure, or loss of sensitive data, and may outline steps for investigation, mitigation, and cooperation with authorities. Its core practical function is to ensure a coordinated and timely response to security threats, minimizing potential harm and clarifying responsibilities in the event of a data breach.
POPULAR SAMPLE Copied 62 times
Security Incident. “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.
Security Incident. “Security Incident” shall mean the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with systems operations in an information system, but does not include minor incidents that occur on a daily basis, such as scans, “pings”, or unsuccessful random attempts to penetrate computer networks or servers maintained by Business Associate i. Security Rule. “Security Rule” shall mean the Standards for the Protection of Electronic Protected Health Information at 45 CFR Part 160 and Part 164, Subparts A and C.
Security Incident. “Security Incident” shall have the same meaning as the term “security incident” in 45 CFR §164.304.
Security Incident. The act of violating an explicit or implied security policy, which includes attempts (either failed or successful) to gain unauthorized access to a system or its data, unwanted disruption or denial of service, the unauthorized use of a system for the processing or storage of data; and changes to system hardware, firmware, or software characteristics without the owner's knowledge, instruction, or consent. Incidents include the loss of data through theft or device misplacement, loss or misplacement of hardcopy documents, and misrouting of mail, all of which may have the potential to put the data at risk of unauthorized access, use, disclosure, modification, or destruction. Adverse events such as floods, fires, electrical outages, and excessive heat are not considered incidents. (Computer Matching Agreement, Agreement No. 2013-11, p.5.)
Security Incident or Incident shall mean the attempted or successful unauthorized access, use, disclosure, modification, or destruction of PHI or PII contained in any form or interference with system operations in an information system that contains PHI or PII.
Security Incident. If a claim of infringement is made, Supplier will, at its own expense, exercise the first of the following remedies that is practicable: (i) obtain for Buyer the rights granted under this PO; (ii) modify the product so it is non-infringing and in compliance with this PO; (iii) replace the product with non-infringing ones that comply with this PO; or (iv) accept the return or cancellation of the infringing product and refund any amount paid. Limitation of liability: To the extent permitted by local law, in no event will Buyer or its affiliates be liable for any lost revenues, lost profits, incidental, indirect, consequential, special or punitive damages. In no event shall Buyer’s liability to Supplier exceed the total amount of fees actually paid by ▇▇▇▇▇ to Supplier hereunder.
Security Incident. AWS will (a) notify Customer of a Security Incident without undue delay after becoming aware of the Security Incident, and b) take reasonable steps to mitigate the effects and to minimise any damage resulting from the Security Incident.
Security Incident. For purposes of this Attachment, security incident shall mean any event resulting in computer systems, networks, or data being viewed, manipulated, damaged, destroyed or made inaccessible by an unauthorized activity. See National Institute of Standards and Technology (NIST) Special Publication 800-61, "Computer Security Incident Handling Guide,” for more information.
Security Incident. If a claim of infringement is made, Supplier will, at its own expense, exercise the first of the following remedies that is practicable: (i) obtain for Buyer the rights granted under this PO; (ii) modify the product so it is non-infringing and in compliance with this PO; (iii) replace the product with non-infringing ones that comply with this PO; or
Security Incident. If SurveyMonkey becomes aware of any unauthorized or unlawful access to, or acquisition, alteration, use, disclosure, or destruction of, Personal Data (“Security Incident”), SurveyMonkey will promptly, and in any event, as soon as reasonably practicable, notify Customer without undue delay. SurveyMonkey will also reasonably cooperate with Customer with respect to any investigations relating to a Security Incident with preparing any required notices, and provide any information reasonably requested by Customer in relation to any Security Incident.