Security Incident Handling Clause Samples

The Security Incident Handling clause outlines the procedures and responsibilities for responding to security breaches or incidents involving sensitive data or systems. Typically, it requires parties to promptly detect, report, and investigate any unauthorized access, data loss, or compromise, and may specify notification timelines and required cooperation between parties. This clause ensures that all parties are prepared to act quickly and effectively in the event of a security incident, minimizing potential damage and ensuring compliance with legal or contractual obligations.
Security Incident Handling. As part of the ISP, Consultant represents, acknowledges and agrees that Consultant has in place and will continue to maintain a documented security incident management process. The security incident management process shall: (i) provide for the timely detection of security incidents and responses thereto; and (ii) require the recordation of the applicable facts of each security incident and responses thereto, including the application or non-application of the security incident management process, escalation procedures and the responsibilities of each affected party.
Security Incident Handling. 1.13 Immediately report any security incident involving their systems, and/or SATS IT resources to SATS, and cooperate with the investigation as required. 1.14 Immediately report any security incident involving their systems, and/or SATS IT resources to SATS, and cooperate with the investigation as required. 1.15 Ensure availability of services is maintained and take responsibility for the security incident. 1.16 Provide logs in its native format without any alteration when requested.
Security Incident Handling. As part of the ISP, Contractor represents and agrees that Contractor has in place and will continue to maintain a documented security incident management process. The security incident management process shall: provide for the timely detection of security incidents and responses thereto; and
Security Incident Handling. As part of the ISP, ▇▇▇▇▇▇ represents, acknowledges and agrees that ▇▇▇▇▇▇ has in place and will continue to maintain a documented security incident management process. The security incident management process shall: (i) provide for the timely detection of security incidents and responses thereto; and (ii) require the recordation of the applicable facts of each security incident and responses thereto, including the application or non-application of the security incident management process, escalation procedures and the responsibilities of each affected party. .
Security Incident Handling. The Parole LEADS Security Administrator is authorized to respond to any security incidents associated with the operation of Parole LEADS. The Parole LEADS Security Administrator will review with the Information Security Office all security incidents at the next scheduled meeting for action or for permanent resolution of temporary actions taken by the Security Administrator.

Related to Security Incident Handling

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇.▇▇▇/ProgramsProviders/#Resources.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.