Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any Security Breach. Such procedures include:
Security Incident Procedures a Security Incident Response Plan, and policies and procedures to detect, respond to, and otherwise address security incidents, including procedures to monitor systems and to detect actual and attempted attacks on or intrusions into Personal Data or information systems relating thereto, and procedures to identify and respond to suspected or known security incidents, mitigate harmful effects of security incidents, and document security incidents and their outcomes.
Security Incident Procedures. GLMX represents and warrants that its security program contains a security incident response plan that includes procedures to be followed in the event of any Security Breach or any breach of any application or system directly associated with the accessing, processing, storage, communication or transmission of Confidential Information.
Security Incident Procedures policies and procedures to detect, respond to, and otherwise address security incidents, including procedures to monitor systems and to detect actual and attempted attacks on or intrusions into Personal Data or information systems relating thereto, and procedures to identify and respond to suspected or known security incidents, mitigate harmful effects of security incidents, and document security incidents and their outcomes. VMT shall also designate a security official responsible for the development, implementation and maintenance of all the safeguards in this Schedule.
Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any Security Breach. Such procedures include: ● Roles and responsibilities: formation of an internal incident response team with a response leader; ● Investigation: assessing the risk the incident poses and determining who may be affected; ● Communication: internal reporting as well as a notification process in the event of unauthorized disclosure of Customer Data; ● Recordkeeping: keeping a record of what was done and by whom to help in later analysis and possible legal action; and ● Audit: conducting and documenting root cause analysis and remediation plan.
Security Incident Procedures. (a) Implement policies and procedures to address security incidents.
(b) Identify and respond to security incidents, mitigate their harmful effects to the extent possible, and document the incidents and the outcome.
Security Incident Procedures. (a) Provider shall:
(i) provide XXXX with the name and contact information for an employee of Provider who shall serve as XXXX’x primary security contact and shall be available to assist XXXX twenty-four (24) hours per day, seven (7) days per week as a contact in resolving obligations associated with a Security Incident;
(ii) notify XXXX of a Security Incident as soon as practicable, but no later than twenty-four (24) hours after Provider becomes aware of it; and
(iii) notify XXXX of any Security Incident by emailing XXXX at xxxxxxx@xxxxxxxxxxxxxxxx.xxx, with a copy by email to Provider’s primary business contact within XXXX.
(b) Immediately following Provider’s notification to Customer of a Security Incident, the parties shall coordinate with each other to investigate the Security Incident. Provider agrees to fully cooperate with XXXX in XXXX’x handling of the matter, including, without limitation: (i) assisting with any investigation; (ii) providing XXXX with physical access to the facilities and operations affected; (iii) facilitating interviews with Provider’s employees and others involved in the matter; and (iv) making available all relevant records, logs, files, data reporting, and other materials required to comply with applicable law, regulation, industry standards, or as otherwise required by XXXX.
(c) Provider shall at its own expense use best efforts to immediately contain and remedy any Security Incident and prevent any further Security Incident, including, but not limited to taking any and all action necessary to comply with applicable privacy rights, laws, regulations, and standards. Provider shall reimburse XXXX for all actual costs incurred by XXXX in responding to, and mitigating damages caused by, any Security Incident, including all costs of notice and/or remediation pursuant to Section 4(d).
(d) Provider agrees that it shall not inform any third party of any Security Incident without first obtaining XXXX’x prior written consent, other than to inform a complainant that the matter has been forwarded to XXXX’x legal counsel. Further, Provider agrees that XXXX shall have the sole right to determine: (i) whether notice of the Security Incident is to be provided to any individuals, regulators, law enforcement agencies, consumer reporting agencies, or others as required by law or regulation, or otherwise in XXXX’x discretion; and (ii) the contents of such notice, whether any type of remediation may be offered to affected persons, and the natur...
Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any security breach of Customer Data or any security breach of any application or system directly associated with the accessing, processing, storage, communication or transmission of Customer Data. Such procedures include:
(a) Roles and responsibilities: formation of an internal incident response team with a response leader;
(b) Investigation: assessing the risk the incident poses and determining who may be affected;
(c) Communication: internal reporting as well as a notification process in the event of unauthorized disclosure of Customer Data in accordance with the Master Agreement;
(d) Recordkeeping: keeping a permanent record of what was done and by whom to help in later analysis and possible legal action; and
(e) Audit: conducting and documenting root cause analysis and remediation plan.
Security Incident Procedures. A security incident response plan that includes procedures to be followed in the event of any security breach of any application or system directly associated with the accessing, processing, storage, communication, or transmission of Media Cloud Content.
Security Incident Procedures. A10 maintains policies and procedures to detect, respond to, and otherwise address security incidents, including procedures to monitor systems and to detect actual and attempted attacks on or intrusions into User Data or information systems relating thereto, and procedures to identify and respond to suspected or known security incidents, mitigate harmful effects of security incidents, and document security incidents and their outcomes. If A10 becomes aware of any security incident that leads to a data breach impacting User Data, A10 will:
4.1. notify customer without undue delay;
4.2. reasonably cooperate with the impacted User to investigate and remediate the breach and mitigate any further risk to User Data.