Security Incident Reporting Sample Clauses

Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Security Incident Reporting. 9.17.13.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at xxxx://xxxxx.xx.xxx/Programsproviders/Information_ Security_and_Privacy.
Security Incident Reporting. 9.18.13.1 A security incident occurs when County Information Assets are accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc.
Security Incident Reporting. Each Party agrees to notify the other Party promptly, but in no event later than ten (10) business days after becoming aware of the occurrence of: (i) a potential security breach involving Licensed Data; (ii) re-identification of any of the Licensed Data; (iii) a complaint related to a request for access to the Licensed Data; or (iv) any inquiry, investigation, audit, or government enforcement action related to the Licensed Data. If Client or any of Client’s Affiliates becomes legally compelled to disclose any Licensed Data, then to the extent permitted by applicable law, Client will notify Tempus as soon as practical, but in any event within ten (10) business days of learning of such requirement, so that Tempus may seek a protective order or other appropriate remedy. If any of the events set out in this Section occurs, Client agrees to cooperate and cause Client’s Affiliates to cooperate with Tempus and take any actions reasonably requested by Tempus to minimize the re-identification risk and potential damage resulting from the event.
Security Incident Reporting. The Sheriff shall report all breaches of security, criminal acts, or threats to the Court or court personnel to the Local Security Coordinator. Such incidents include, but are not limited to: threats, suspicious incidents, vandalism, theft/burglary/robbery, medical assists and assaults. The Sheriff further agrees to provide a written report of the incident to the Local Security Coordinator on the Sheriff’s standard departmental report form or on a Court Security Incident form provided by the local Security Coordinator. This will be completed as soon as is reasonably possible after the incident.
Security Incident Reporting. If We become aware of any accidental, unauthorised or unlawful destruction, loss, alteration, or disclosure of, or access to personal data You have provided (a Security Incident), We will notify You promptly and provide You promptly with a detailed description of the Security Incident and the identity of each affected data subject, with periodic updates, and any other information You may reasonably request in relation to such Security Incident.
Security Incident Reporting. If 2Ring becomes aware of a Security Incident, 2Ring will notify Subscriber without undue delay, and in any case, where feasible, within forty-eight (48) hours after becoming aware. 2Ring will promptly take reasonable steps to contain, investigate, and mitigate any Security Incident.
Security Incident Reporting. A security incident occurs when CDA information assets are accessed without proper identification, modified, destroyed, disclosed, lost, or stolen. Contractors must report all security incidents to the AAA Program Manager immediately upon occurrence or detection. A Security Incident Report form (CDA 1025) must be submitted to the CDA Information Security Officer within five (5) business days of the date the incident occurred or was detected. Contractor, subcontractors, and their employees should be aware that security incidents and failure to report these incidents may lead to administrative sanctions (e.g., contraction termination, personnel action), criminal prosecution, or civil liability.
Security Incident Reporting. If Snowflake becomes aware of a Security Incident, Snowflake shall notify Customer without undue delay, and in any case, where feasible, notify Customer within seventy-two (72) hours after becoming aware. Snowflake shall promptly take reasonable steps to contain, investigate, and mitigate any Security Incident.
Security Incident Reporting. PacketFabric will report to Customer any actual or suspected Security Incident or a suspected event that is believed to be sufficiently plausible to warrant further investigation. “Security Incident” means any actual or suspected unauthorized access to or use of any Customer’s property or Confidential Information. Upon request from Customer, PacketFabric will reasonably cooperate in the investigation of any Security Incident and will produce logs and other documentation from the device(s) which are, or may be, related to a Security Incident. Except as required by Applicable Law, PacketFabric will not disclose to third parties any actual or suspected Security Incident without Customer’s prior written approval.