Security Incident Investigation Sample Clauses

Security Incident Investigation. DST shall reasonably cooperate with the Fundsinvestigation and response to each Security Incident. DST acknowledges and agrees that records of system activity and of Fund Confidential Information handling may be evidence (subject to appropriate chain of custody procedures) in the event of a security incident or breach of Fund Confidential Information. Upon Funds’ request, and at Funds’ expense, DST shall deliver copies of such records to Fund for use in any legal or regulatory proceeding or in any governmental investigation. Further, in the case of a security incident or breach of Fund Confidential Information, and at Funds’ request, DST shall hire an independent third party to (i) determine the scope of the incident or breach and impacted records; and (ii) suggest appropriate post incident changes to DST’s WISP and controls. The report from the independent third party will be provided to Fund promptly following deliver to DST.
AutoNDA by SimpleDocs
Security Incident Investigation. (SII) means a formal investigation that occurs when there is a known or suspected loss of national security information (NSI) or CUI. U.S. Government security personnel conduct SIIs to (1) determine the circumstances surrounding an actual or potential compromise of NSI or CUI; (2) ascertain individual responsibility; (3) notify outside stakeholders, when necessary; and (4) make recommendations to prevent similar occurrences in the future. ​ Virtual device means a device with no associated hardware. A virtual device mimics a physical hardware device when, in fact, it exists only in software form. Therefore, the device makes the system believe that a particular hardware exists when in reality it does not. Examples include, but are not limited to, a computer, tablet, or smartphone that is simulated in a computer. ​

Related to Security Incident Investigation

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Complaints Investigation The employee who complains of harassment under the provisions of the Human Rights Code must first comply with the Employer’s harassment policy procedures before filing a grievance or human rights complaint.

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Investigation of Accidents The Occupational Health and Safety Committees, as provided in Clause 22.2, shall be notified of each accident or injury and shall investigate and report to the Union and Employer on the nature and cause of the accident or injury. In the event of a fatality the Employer shall immediately notify the President of the nature and circumstances of the accident.

  • Independent Investigation Subscriber, in making the decision to purchase the Units, has relied upon an independent investigation of the Company and has not relied upon any information or representations made by any third parties or upon any oral or written representations or assurances from the Company, its officers, directors or employees or any other representatives or agents of the Company, other than as set forth in this Agreement. Subscriber is familiar with the business, operations and financial condition of the Company and has had an opportunity to ask questions of, and receive answers from the Company’s officers and directors concerning the Company and the terms and conditions of the offering of the Units and has had full access to such other information concerning the Company as Subscriber has requested. Subscriber confirms that all documents that it has requested have been made available and that Subscriber has been supplied with all of the additional information concerning this investment which Subscriber has requested.

  • Search, Enquiry, Investigation, Examination And Verification a. The Property is sold on an “as is where is basis” subject to all the necessary inspection, search (including but not limited to the status of title), enquiry (including but not limited to the terms of consent to transfer and/or assignment and outstanding charges), investigation, examination and verification of which the Purchaser is already advised to conduct prior to the auction and which the Purchaser warrants to the Assignee has been conducted by the Purchaser’s independent legal advisors at the time of execution of the Memorandum. b. The intending bidder or the Purchaser is responsible at own costs and expenses to make and shall be deemed to have carried out own search, enquiry, investigation, examination and verification on all liabilities and encumbrances affecting the Property, the title particulars as well as the accuracy and correctness of the particulars and information provided. c. The Purchaser shall be deemed to purchase the Property in all respects subject thereto and shall also be deemed to have full knowledge of the state and condition of the Property regardless of whether or not the said search, enquiry, investigation, examination and verification have been conducted. d. The Purchaser shall be deemed to have read, understood and accepted these Conditions of Sale prior to the auction and to have knowledge of all matters which would have been disclosed thereby and the Purchaser expressly warrants to the Assignee that the Purchaser has sought independent legal advice on all matters pertaining to this sale and has been advised by his/her/its independent legal advisor of the effect of all the Conditions of Sale. e. Neither the Assignee nor the Auctioneer shall be required or bound to inform the Purchaser of any such matters whether known to them or not and the Purchaser shall raise no enquiry, requisition or objection thereon or thereto.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!