Security Incident Evaluation Sample Clauses

Security Incident Evaluation. In the event of an Incident, Contractor shall follow industry best practices to fully investigate and resolve the Incident, and take steps to prevent developments that may result in the Incident becoming a Security Breach at Contractor’s expense in accordance with applicable privacy laws.
AutoNDA by SimpleDocs
Security Incident Evaluation. In the event of an Incident, Infinite Campus shall follow industry best practices to fully investigate and resolve the Incident and take steps to prevent developments that may result in the Incident becoming a Security Breach at Infinite Campus’ expense in accordance with applicable privacy laws.
Security Incident Evaluation. In the event of an Incident, Partner shall follow industry best practices to fully investigate and resolve the Incident, and take steps to prevent developments that may result in the Incident becoming a Security Breach at Partner’s expense in accordance with applicable privacy laws.
Security Incident Evaluation. In the event of an Incident, Concord University shall follow industry practices to fully investigate and resolve the Incident and take steps to prevent developments that may result in the Incident becoming a Security Breach at Concord University’s expense in accordance with applicable privacy laws.

Related to Security Incident Evaluation

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Data Incidents If Apple becomes aware that Personal Data has been altered, deleted, or lost as a result of any unauthorized access to the Service (a “Data Incident”), Apple will notify Institution without undue delay if required by law, and Apple will take reasonable steps to minimize harm and secure the data. Notification of, or response to, a Data Incident by Apple will not be construed as an acknowledgment by Apple of any responsibility or liability with respect to a Data Incident. Institution is responsible for complying with applicable incident notification laws and fulfilling any third-party obligations related to Data Incident(s). Apple will not access the contents of Personal Data in order to identify information subject to any specific legal requirements.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

Time is Money Join Law Insider Premium to draft better contracts faster.