Security incident and Personal Data Breach Sample Clauses

Security incident and Personal Data Breach. 3.1 Reasonable and appropriate remedial actions. If at any time the AGENT becomes aware of, or has reasonable grounds to suspect, the occurrence of any security incident or Personal Data Breach that may jeopardise the safety and security (including the integrity, confidentiality, availability and continuity) of the Website(s), any Confidential Information, Personal Data, Content and SafeTravelPass Material, as well as any material stored, transmitted or otherwise processed in the context of the Agreement, then the AGENT shall:
AutoNDA by SimpleDocs
Security incident and Personal Data Breach. Notification Yes No Comments I can confirm that I will inform PHSO of personal / sensitive data security breaches affecting the PHSO’s data processed by me, within 24 hours. PHSO contact details: xxxxxxxxxxxxxxxxxxxxx@xxxxxxxxx.xxx.xx Cooperation Yes No Comments I can confirm that I will cooperate with PHSO in order to ensure GDPR compliance with including but not limited to enable the PHSO to effectively guarantee the exercise of data subjects’ rights (right of access, correction, erasure, blocking, opposition), and to manage incidents including forensic analysis in case of security breach. I can confirm that I will make the appropriate information available to demonstrate compliance to the PHSO and supervisory authorities. Confidentiality Yes No Comments I can confirm that any use of laptop containing stored sensitive data and confidential files will be locked away when not in use. I have procedures in place to ensure that family members or others who come into my home do not have access to confidential information which includes but not limited to not being overheard while on the phone or access to written or electronic information. I can confirm Passwords and PIN numbers will be kept secure and not divulged to anyone. I can confirm that I will not transport any confidential data on an unauthorised and/or non-encrypted storage devices (Cloud Storage, PC Hard Drives, Memory sticks or CDs) I can confirm that confidential data used during the period of the contract will not be retained (in any format) beyond termination or reused for any other purpose. Any other comments you have regarding your ability to meet these requirements, please list below Signature:…………………………………………………………….. Title and Name:……………………………………………………………… Date:……………………………………………………………………

Related to Security incident and Personal Data Breach

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Personal Data Breach 7.1 Processor shall notify Company without undue delay upon Processor becoming aware of a Personal Data Breach affecting Company Personal Data, providing Company with sufficient information to allow the Company to meet any obligations to report or inform Data Subjects of the Personal Data Breach under the Data Protection Laws.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Personal Data Breaches 5.7.1 The Data Processor shall give immediate notice to the Data Controller if a breach occurs, that can lead to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of or access to, personal data transmitted, stored or otherwise processed re the Personal Data processed on behalf of the Data Controller (a “Personal Data Breach”).

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

Time is Money Join Law Insider Premium to draft better contracts faster.