Security Incident Procedures Clause Samples

The Security Incident Procedures clause outlines the steps and responsibilities for responding to security breaches or incidents involving sensitive data. It typically requires the affected party to promptly notify the other party of any unauthorized access, loss, or disclosure of information, and to cooperate in investigating and mitigating the incident. This clause ensures that both parties are prepared to handle security incidents efficiently, minimizing potential harm and fulfilling legal or contractual obligations regarding data protection.
Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any Security Breach. Such procedures include:
Security Incident Procedures policies and procedures to detect, respond to, and otherwise address security incidents, including procedures to monitor systems and to detect actual and attempted attacks on or intrusions into Confidential Information or Personal Data or information systems relating thereto, and procedures to identify and respond to suspected or known security incidents, mitigate harmful effects of security incidents, and document security incidents and their outcomes.
Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any Security Breach. Such procedures include: • Roles and responsibilities: formation of an internal incident response team with a response leader; • Investigation: assessing the risk the incident poses and determining who may be affected; • Communication: internal reporting as well as a notification process in the event of unauthorized disclosure of Customer Data; • Recordkeeping: keeping a record of what was done and by whom to help in later analysis and possible legal action; and • Audit: conducting and documenting root cause analysis and remediation plan.
Security Incident Procedures i. Illumina will notify Customer, in writing, of any verified Security Incident of which Illumina becomes aware as soon as practicable. ii. If a Security Incident caused by Illumina or its agents or subcontractors requires notification to an individual under any law or regulation, Customer will have sole control over the timing, content, and method of notification with respect to the Customer Data, and Illumina will promptly reimburse Customer for reasonable costs and expenses incurred as a result of the breach, subject to the limitations on liability in the Agreement. Illumina will mitigate, to the extent practicable, any harmful effect that is known to Illumina of an unauthorized use or disclosure of Customer Data by Illumina or its subcontractors in violation of the requirements of this TOMS, the Agreement, or applicable law.
Security Incident Procedures. GLMX represents and warrants that its security program contains a security incident response plan that includes procedures to be followed in the event of any Security Breach or any breach of any application or system directly associated with the accessing, processing, storage, communication or transmission of Confidential Information.
Security Incident Procedures policies and procedures to detect, respond to, and otherwise address security incidents, including procedures to monitor systems and to detect actual and attempted attacks on or intrusions into Personal Data or information systems relating thereto, and procedures to identify and respond to suspected or known security incidents, mitigate harmful effects of security incidents, and document security incidents and their outcomes. VMT shall also designate a security official responsible for the development, implementation and maintenance of all the safeguards in this Schedule.
Security Incident Procedures. A10 maintains policies and procedures to detect, respond to, and otherwise address security incidents, including procedures to monitor systems and to detect actual and attempted attacks on or intrusions into User Data or information systems relating thereto, and procedures to identify and respond to suspected or known security incidents, mitigate harmful effects of security incidents, and document security incidents and their outcomes. If A10 becomes aware of any security incident that leads to a data breach impacting User Data, A10 will: 4.1. notify customer without undue delay; 4.2. reasonably cooperate with the impacted User to investigate and remediate the breach and mitigate any further risk to User Data.
Security Incident Procedures. (a) Provider shall: (i) provide ▇▇▇▇ with the name and contact information for an employee of Provider who shall serve as ▇▇▇▇’▇ primary security contact and shall be available to assist ▇▇▇▇ twenty-four (24) hours per day, seven (7) days per week as a contact in resolving obligations associated with a Security Incident; (ii) notify ▇▇▇▇ of a Security Incident as soon as practicable, but no later than twenty-four (24) hours after Provider becomes aware of it; and (iii) notify ▇▇▇▇ of any Security Incident by emailing ▇▇▇▇ at ▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇, with a copy by email to Provider’s primary business contact within ▇▇▇▇. (b) Immediately following Provider’s notification to Customer of a Security Incident, the parties shall coordinate with each other to investigate the Security Incident. Provider agrees to fully cooperate with ▇▇▇▇ in ▇▇▇▇’▇ handling of the matter, including, without limitation: (i) assisting with any investigation; (ii) providing ▇▇▇▇ with physical access to the facilities and operations affected; (iii) facilitating interviews with Provider’s employees and others involved in the matter; and (iv) making available all relevant records, logs, files, data reporting, and other materials required to comply with applicable law, regulation, industry standards, or as otherwise required by ▇▇▇▇. (c) Provider shall at its own expense use best efforts to immediately contain and remedy any Security Incident and prevent any further Security Incident, including, but not limited to taking any and all action necessary to comply with applicable privacy rights, laws, regulations, and standards. Provider shall reimburse ▇▇▇▇ for all actual costs incurred by ▇▇▇▇ in responding to, and mitigating damages caused by, any Security Incident, including all costs of notice and/or remediation pursuant to Section 4(d). (d) Provider agrees that it shall not inform any third party of any Security Incident without first obtaining ▇▇▇▇’▇ prior written consent, other than to inform a complainant that the matter has been forwarded to ▇▇▇▇’▇ legal counsel. Further, Provider agrees that ▇▇▇▇ shall have the sole right to determine: (i) whether notice of the Security Incident is to be provided to any individuals, regulators, law enforcement agencies, consumer reporting agencies, or others as required by law or regulation, or otherwise in ▇▇▇▇’▇ discretion; and (ii) the contents of such notice, whether any type of remediation may be offered to affected persons, and the natur...
Security Incident Procedures. (a) Implement policies and procedures to address security incidents. (b) Identify and respond to security incidents, mitigate their harmful effects to the extent possible, and document the incidents and the outcome.
Security Incident Procedures. Accountis Europe Ltd maintains a security incident response plan that includes procedures to be followed in the event of any security breach of Customer Data. Such procedures include: 10.1. Roles and responsibilities: formation of an internal incident response team with a response leader;