Security Incident Procedure. Ironclad will deploy and follow policies and procedures to detect, respond to, and otherwise address Security Incidents including procedures to (i) identify and respond to reasonably suspected or known Security Incidents, mitigate harmful effects of Security Incidents, document Security Incidents and their outcomes, and (ii) restore the availability or access to Customer Personal Data in a timely manner.
Security Incident Procedure. APTTUS will deploy and follow policies and procedures to detect, respond to, and otherwise address Security Incidents including procedures to (i) identify and respond to reasonably suspected or known Security Incidents, mitigate harmful effects of Security Incidents, document Security Incidents and their outcomes, and (ii) restore the availability or access to Customer Personal Data in a timely manner.
Security Incident Procedure. Futurae will deploy and follow policies and procedures to detect, respond to, and otherwise address Security Incidents including procedures to (i) identify and respond to reasonably suspected or known Security Incidents, mitigate harmful effects of Security Incidents, document Security Incidents and their outcomes, and (ii) restore the availability or access to Customer Personal Data in a timely manner.
Security Incident Procedure. Outreach will deploy and follow policies and procedures to detect, respond to, and otherwise address Security Incidents including procedures to (i) identify and respond to suspected or known Security Incidents, mitigate harmful effects of Security Incidents, document Security Incidents and their outcomes, and (ii) restore the availability or access to Customer Personal Data in a timely manner.
Security Incident Procedure. Planful will deploy and follow policies and procedures to detect, respond to, and otherwise address Security Incidents including procedures to (i) identify and respond to reasonably suspected or known Security Incidents, mitigate harmful effects of Security Incidents, document Security Incidents and their outcomes, and (ii) restore the availability or access to Client Personal Data in a timely manner.
Security Incident Procedure. Company will deploy and follow policies and procedures to detect, respond to, and otherwise address Security Incidents including procedures to (i) identify and respond to reasonably suspected or known Security Incidents, mitigate harmful effects of Security Incidents, document Security Incidents and their outcomes, and (ii) restore the availability or access to Customer Personal Data in a timely manner.
Security Incident Procedure. Alteryx will implement and maintain policies and procedures to detect, respond to, and otherwise address Security Incidents including procedures to (i) identify and respond to suspected or known Security Incidents, mitigate harmful effects of Security Incidents, document Security Incidents and their outcomes, and (ii) restore the availability or access to Licensee Content in a timely manner.
Security Incident Procedure. Service Provider will deploy and follow policies and procedures to detect, respond to, and otherwise address Security Incidents including procedures to
(i) identify and respond to reasonably suspected or known Security Incidents, mitigate harmful effects of Security Incidents, document Security Incidents and their outcomes, and (ii) restore the availability or access to Company Personal Data in a timely manner.
Security Incident Procedure. 12.1 Interactive will notify the Customer as soon as reasonably possible and, in any case, no later than 3 Business Days, after confirming that a Security Incident occurred that materially affected the Customer.
12.2 If Interactive suspects or knows of a Security Incident, which results in unauthorised destruction, loss, alteration, disclosure or access of or to (for example, the Customer’s own customers or employees), Interactive will undertake the following:
(a) remain in compliance with the Privacy Act at all times;
(b) seek to contain and remedy the Security Incident to prevent any serious harm occurring to an individual;
(c) if there are reasonable grounds to suspect that the Security Incident is an Eligible Data Breach (as defined in the Privacy Act), Interactive will conduct an assessment in accordance with the Privacy Act;
(d) if Interactive believes it cannot remedy the Security Incident before any serious harm may occur to an individual, Interactive will contact the Customer to discuss the Security Incident and come to an agreement about how to notify affected individuals and the Australian Information Commissioner (“Commissioner”), and which party will notify them;
(e) provide all reasonable co-operation to the Customer, the Commissioner and affected individuals in relation to the Eligible Data Breach; and
(f) if Interactive believes the Customer and Interactive will not come to an agreement about how to notify affected individuals or the Commissioner, or who will notify them, Interactive will seek direction from the Commissioner about how to proceed and, in those circumstances, will comply with the Commissioner’s directions.
12.3 If the Customer suspects or knows of a data breach where the Personal Information that is the subject of the breach relates to the Customer’s customers or employees and is connected with, or may impact on, an agreement the Customer has with Interactive (for example, if the Customer’s data that Interactive hosts is accessed without authorisation), the Customer will undertake the following:
(a) remain in compliance with the Privacy Act at all times;
(b) seek to contain and remedy the data breach to prevent any serious harm occurring to an individual;
(c) if there are reasonable grounds to suspect that the data breach is an Eligible Data Breach (as defined in the Privacy Act), the Customer will conduct an assessment in accordance with the Privacy Act;
(d) if the Customer believes it cannot remedy the data breach before an...
Security Incident Procedure. Branch will deploy and follow policies and procedures to detect, respond to, and otherwise address Security Incidents including procedures to (i) identify and respond to suspected or known Security Incidents, mitigate harmful effects of Security Incidents, document Security Incidents and their outcomes, and (ii) restore the availability or access to Customer Personal Data in a timely manner.