Security Incident Management & Breach Notification Sample Clauses

Security Incident Management & Breach Notification. Custodian will notify a Fund, as promptly as reasonably possible under the circumstances, upon learning of a Security Incident (as defined below) involving a Fund’s Confidential Information. Security Incidents are defined as (1) the actual unauthorized access to or use of a Fund’s Confidential Information, or (2) the unauthorized disclosure, loss, theft or manipulation of a Fund’s Confidential Information that has the potential to cause harm to a Fund’s systems, employees, customers, information or brand name. Notification shall take the form of a phone call to the designated Fund contact(s) and shall include at a minimum, (a) problem statement or description, (b) expected resolution time (if known), and (c) the name and phone number of the Custodian representative that the Fund may contact to obtain updates. Custodian agrees to keep the Fund informed of progress and actions taken to resolve the incident and cooperate with the Fund in any litigation or investigation arising from said incident. Unless such disclosure is mandated by law, the Fund in its sole discretion will determine whether to provide explicit notification to the Fund’s shareholders, customers or employees concerning incidents involving a Fund’s personally identifiable information relating to such persons. 1 Transport Layer Security (or TLS) is a cryptographic protocol that provides secure (encrypted) communication for e-mail exchanged over the Internet between two organizations.
AutoNDA by SimpleDocs
Security Incident Management & Breach Notification. The Custodian will notify the Client, as promptly as reasonably possible under the circumstances, upon learning of a Security Incident (as defined below) involving a Portfolio’s Confidential Information or Personal Information. Security Incidents are defined as (1) the actual unauthorized access to or use of a Portfolio’s Confidential Information, or Personal Information; (2) the unauthorized disclosure, loss, theft or manipulation of a Portfolio’s Confidential Information or Personal Information that has the potential to cause harm to a Portfolio’s systems, employees, customers, information or brand name; or (3) the confidentiality of Disclosing Party Personal Data (as defined in the Confidentiality and 1 Transport Layer Security (or TLS) is a cryptographic protocol that provides secure (encrypted) communication for e-mail exchanged over the Internet between two organizations. Data Privacy Conditions Annex) within the Receiving Party’s possession, custody or control has been materially compromised in violation of such Conditions or the Agreement so as to pose a reasonable likelihood of harm to the Data Subjects (as defined in the Confidentiality and Data Privacy Conditions Annex) involved. Notification shall take the form of a phone call to the designated Client contact(s) and shall include at a minimum, (a) problem statement or description, (b) expected resolution time (if known), and (c) the name and phone number of the Custodian representative that the Client may contact to obtain updates. The Custodian agrees to keep the Client informed of progress and actions taken to resolve the incident and cooperate with the Client in any litigation or investigation arising from said incident. Unless such disclosure is mandated by law, the Client in its sole discretion will determine whether to provide explicit notification to a Portfolio’s shareholders, customers or employees concerning incidents involving a Portfolio’s personally identifiable information relating to such persons. In the event of a Security Incident the Custodian acknowledges that Client may suffer irreparable harm and that monetary damages may not be an adequate remedy. Therefore, the Custodian consents to Client obtaining an injunction or other equitable relief enforcing the obligations under the Agreement with respect to a Security Incident.
Security Incident Management & Breach Notification. The Custodian will notify the Fund, as promptly as reasonably possible under the circumstances, upon learning of a Security Incident (as defined below) involving a Portfolio’s Confidential Information. “Security Incidents” are defined as (1) the actual unauthorized use of a Portfolio’s Confidential Information; or (2) the unauthorized access to or disclosure, loss, theft or manipulation of a Portfolio’s Confidential Information that has the potential to cause harm to a Portfolio’s systems, employees, shareholders, information or brand name. Notification shall take the form of a phone call to the designated Fund contact(s) and shall include at a minimum, (3) problem statement or description, (4) expected resolution time (if known), and (5) the name and phone number of the relationship manager for the Fund that the Fund may contact to obtain updates. The Custodian agrees to keep the Fund informed of progress and actions taken to resolve the incident and cooperate with the Fund in any litigation or investigation arising from said incident. Unless such disclosure is mandated by law, the Fund in its sole discretion will determine whether to provide explicit notification to a Portfolio’s shareholders or employees concerning incidents involving a Portfolio’s personally identifiable information relating to such persons. In the event of a Security Incident, the Custodian acknowledges that Client may suffer irreparable harm and that monetary damages may not be an adequate remedy. Therefore, the Custodian consents to the Fund seeking an injunction or other equitable relief enforcing the obligations under the Agreement with respect to a Security Incident.

Related to Security Incident Management & Breach Notification

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include: a. A list of the students whose Student Data was involved in or is reasonably believed to have been involved in the breach, if known; and b. The name and contact information for an employee of the Provider whom parents may contact to inquire about the breach.

  • Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Personal Data Breach Notification SAP will notify Customer without undue delay after becoming aware of any Personal Data Breach and provide reasonable information in its possession to assist Customer to meet Customer’s obligations to report a Personal Data Breach as required under Data Protection Law. SAP may provide such information in phases as it becomes available. Such notification shall not be interpreted or construed as an admission of fault or liability by SAP.

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request.

  • Breach Notification a. In the event of a Breach of unsecured PHI or disclosure that compromises the privacy or security of PHI obtained from DSHS or involving DSHS clients, Business Associate will take all measures required by state or federal law. b. Business Associate will notify DSHS within one (1) business day by telephone and in writing of any acquisition, access, Use or disclosure of PHI not allowed by the provisions of this Contract or not authorized by HIPAA Rules or required by law of which it becomes aware which potentially compromises the security or privacy of the Protected Health Information as defined in 45 CFR 164.402 (Definitions). c. Business Associate will notify the DSHS Contact shown on the cover page of this Contract within one (1) business day by telephone or e-mail of any potential Breach of security or privacy of PHI by the Business Associate or its Subcontractors or agents. Business Associate will follow telephone or e-mail notification with a faxed or other written explanation of the Breach, to include the following: date and time of the Breach, date Breach was discovered, location and nature of the PHI, type of Breach, origination and destination of PHI, Business Associate unit and personnel associated with the Breach, detailed description of the Breach, anticipated mitigation steps, and the name, address, telephone number, fax number, and e-mail of the individual who is responsible as the primary point of contact. Business Associate will address communications to the DSHS Contact. Business Associate will coordinate and cooperate with DSHS to provide a copy of its investigation and other information requested by DSHS, including advance copies of any notifications required for DSHS review before disseminating and verification of the dates notifications were sent. d. If DSHS determines that Business Associate or its Subcontractor(s) or agent(s) is responsible for a Breach of unsecured PHI: (1) requiring notification of Individuals under 45 CFR § 164.404 (Notification to Individuals), Business Associate bears the responsibility and costs for notifying the affected Individuals and receiving and responding to those Individuals’ questions or requests for additional information; (2) requiring notification of the media under 45 CFR § 164.406 (Notification to the media), Business Associate bears the responsibility and costs for notifying the media and receiving and responding to media questions or requests for additional information; (3) requiring notification of the U.S. Department of Health and Human Services Secretary under 45 CFR § 164.408 (Notification to the Secretary), Business Associate bears the responsibility and costs for notifying the Secretary and receiving and responding to the Secretary’s questions or requests for additional information; and (4) DSHS will take appropriate remedial measures up to termination of this Contract.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Security Breaches In order to protect your security, it is your sole responsibility to ensure that all usernames and passwords used to access the Website are kept secure and confidential. You must immediately notify us of any unauthorized use of your account, including the unauthorized use of your password, or any other breach of security. We will investigate any breach of security on the Website that we determine in our sole discretion to be serious in nature, but we will not be held responsible or liable in any manner for breaches of security or any unauthorized access to your account however arising.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!