Security Incident Management Sample Clauses

Security Incident Management. Trane shall notify Customer after the confirmation of a Security Incident that affects Customer Confidential Information, Customer systems and Customer property. The written notice shall summarize the nature and scope of the Security Incident and the corrective action already taken or planned.
AutoNDA by SimpleDocs
Security Incident Management. Unless otherwise prohibited by law, Mark43 will notify Subscriber promptly (and in any event within 72 hours) in the event Mark43 reasonably believes that there has been any unauthorized access, acquisition, disclosure, use, modification, loss or destruction of Subscriber Data (“Security Incident”). Mark43 will promptly investigate the Security Incident, will take necessary steps to eliminate or contain the exposure of Subscriber Data, and will keep Subscriber informed of the status of the Security Incident. Mark43 will provide reasonable assistance and cooperation requested by Subscriber or Subscriber’s designated representatives to correct, remediate, or investigate the Security Incident or to mitigate potential damage resulting from it, including any notification that Subscriber may determine appropriate to send to affected individuals, regulators or third parties.
Security Incident Management. 5.1 PUBG Partner shall promptly notify Xxxxxxx without undue delay of becoming aware of any Security Incident.
Security Incident Management. Criteo will maintain 24x7x365 security detection and response capabilities to assure appropriate detection and response to actual and potential data security risks to Criteo data assets. These security incident management controls will be operated and maintain by a dedicated Security Team.
Security Incident Management. 8.1 Any event that affects or has the potential to affect the confidentiality, integrity or availability of Registrant Data is to be classified as an information security incident.
Security Incident Management. Cvent shall maintain processes to identify, respond to, contain and minimize the impact of Information Security incidents to Customer Data. A “Security Incident” shall be defined as an event that results in the unauthorized disclosure of any personally identifiable or confidential Customer Data. In the event of a Security Incident of Customer Data while maintained in Cvent systems, Cvent shall notify Customer no later than forty-eight (48) hours after the Breach has been confirmed. The notice shall include the approximate date and time of the Breach and a summary of relevant, then-known facts, including a description of measures being taken to further investigate and address the Breach.
Security Incident Management. HERE has developed and implemented effective issue and incident response procedures and has clearly identified individuals and their respon- sibilities to ensure that HERE is able to react quickly to resolve potential vulnerabilities and incidents, and minimize potential damage by security or privacy threat actors. HERE notifies and escalates events related to unauthorized disclosure, modification, or misuse of your Personal Data. HERE shall use agreed incident communications channels in communicating the incident(s) in a timely fashion. HERE shall attempt to mitigate the incident, related to your Personal Data, already at the time of noticing and shall report to you only such incidents which cannot be excluded from being identified as false alerts. HERE shall have competent people to conduct investigations.
AutoNDA by SimpleDocs
Security Incident Management. 19.1 NTT has policies, processes and procedures for identifying, detecting, responding, recovering and notifying appropriate stakeholders in the event of an information security incident, including Personal Data breaches. This includes mechanisms for performing a root cause analysis and undertaking corrective actions.
Security Incident Management. TRUCE shall maintain security incident management policies and procedures as required by Data Protection Laws.
Security Incident Management. ADE and its agents shall use a communication and escalation procedure approved by the State’s designated Information Security and Privacy Officers to notify appropriate State personnel of an information security or data privacy related incident, including a breach of confidential information. ADE and its agents shall cooperate and collaborate with appropriate LEA personnel to identify and respond to an information security or data privacy incident, including a data breach, as required by State policy and state and federal law.
Time is Money Join Law Insider Premium to draft better contracts faster.