Security Incidents and Breaches of the Agreement Sample Clauses

Security Incidents and Breaches of the Agreement. 2.8.1 Security breaches, including misuse of MPS information, must be reported to the relevant Single Point of Contact (SPOC), Caldicott Guardian or Data Protection Officer (DPO) without undue delay of occurring/or no later than 24 hours after becoming aware of it. This is to allow the MPS to risk assess the security incident or breach of the Agreement, in circumstances where the security breach concerns MPS INFORMATION. A list of contacts can be found in Appendix G. It is still the responsibility of All Signatory Organisations to comply with the obligations laid out under Section 67 and 68 of the DPA 2018.
AutoNDA by SimpleDocs
Security Incidents and Breaches of the Agreement. Security breaches (including misuse of police information) must be reported to the police SPOC (job title) within 24 hours of occurring / being detected. Detail the process by which this will occur; who is responsible for notification (job title) and by what means? The nominated police individual must immediately inform the relevant Force Information Management / Security team of any security incident or breach of this agreement, including unauthorised disclosure or loss of information It is confirmed that security breaches (including misuse or unauthorised disclosure) are covered by the partner’s internal disciplinary procedures. If misuse is found there should be a mechanism to facilitate an investigation, including initiating criminal proceedings where necessary.
Security Incidents and Breaches of the Agreement. 2.8.1 Security breaches, including misuse of MPS information, must be reported to the relevant Single Point of Contact (SPOC), Caldicott Guardian or Data Protection Officer (DPO) without undue delay of occurring/or no later than 24 hours after becoming aware of it. This is to allow the MPS to risk assess the security incident or breach of the Agreement, in circumstances where the security breach concerns MPS INFORMATION. A list of contacts can be found in Appendix G. It is still the responsibility of All Signatory Organisations to comply with the obligations laid out under Section 67 and 68 of the DPA 2018. 2xxxxx://xxxxxx.xxxxxxxxxx.xxxxxxx.xxx.xx/government/uploads/system/uploads/attachment_data/file/715778/May- 2018_Government-Security-Classifications-2.pdf 3 Secure email options are CJSM, pnn, xxx.xxx, gsi and Egress.
Security Incidents and Breaches of the Agreement. 2.10.1 Security breaches must be reported to the relevant Caldicott Guardian or Data Protection Officer within 24 hours of occurring / being detected. A list of contacts can be found in Appendix G.
Security Incidents and Breaches of the Agreement. 2.8.1 Security breaches, including misuse of MPS information, must be reported to the relevant Single Point of Contact (SPOC), Caldicott Guardian or Data Protection Officer (DPO) 2xxxxx://xxxxxx.xxxxxxxxxx.xxxxxxx.xxx.xx/government/uploads/system/uploads/attachment_data/file/715778/M ay-2018_Government-Security-Classifications-2.pdf 3 Secure email options are CJSM, pnn, xxx.xxx, gsi and Egress. without undue delay of occurring/or no later than 24 hours after becoming aware of it. This is to allow the MPS to risk assess the security incident or breach of the Agreement, in circumstances where the security breach concerns MPS INFORMATION. A list of contacts can be found in Appendix G. It is still the responsibility of All Signatory Organisations to comply with the obligations laid out under Section 67 and 68 of the DPA 2018.
Security Incidents and Breaches of the Agreement. Non-compliance and/or breaches of security arrangements will be reported to The Partnership Organisation Business Crime Partnership manager and dealt with in accordance with their existing code of conduct between The Company and the stores within The Partnership. It is confirmed that security breaches (including misuse or unauthorised disclosure) are covered by the members of The Partnership’s internal disciplinary procedures. If misuse is found, there should be a mechanism to facilitate an investigation into initiating criminal proceedings. The Partnership Organisation management agree to fully support this investigation. Additionally, any security incidents, breaches, or newly identified vulnerabilities will be reported to the Data Protection Officer (DPO) for the police force and the signatory of this agreement. The signatories will ensure that the DPO is informed of any security incident(s) or breach(es) to this agreement, including unauthorised disclosure or loss of information, through The Police Force [include the internal and external contact details of the DPO and all relevant security departments]. All parties to this agreement are aware that non-compliance with the terms of this agreement may result in the agreement being suspended or terminated and the breach will be reported to the Information Commissioners Office who may carry out an investigation and proceed to take enforcement action including the imposition of administrative fines.

Related to Security Incidents and Breaches of the Agreement

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Breach of the Agreement The Beneficiary commits a material breach of its obligations under this Agreement;

  • Enforcement of the Agreement The parties hereto agree that irreparable damage would occur if any of the provisions of this Agreement were not performed in accordance with their specific terms or were otherwise breached. It is accordingly agreed that the parties shall be entitled to an injunction or injunctions to prevent breaches of this Agreement and to enforce specifically the terms and provisions hereto, this being in addition to any other remedy to which they are entitled at law or in equity.

  • Our Liability for Failure to Complete Transactions If we do not properly complete a transaction from your Card on time or in the correct amount according to our Agreement with you, we will be liable for your losses or damages. However, there are some exceptions. We will not be liable, for instance:

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Assignment of the Agreement This Agreement and the rights hereunder may be assigned by FirstLink to any majority-owned subsidiary of FirstLink or to an affiliate or party acquiring all or substantially all of the assets of FirstLink upon prior written consent of Owner. Such consent shall not be unreasonably withheld. Alternatively, the Agreement may be assigned by FirstLink to any FirstLink subsidiary so long as FirstLink agrees in writing that it shall remain liable for all obligations arising under this Agreement. FirstLink may also assign this Agreement to any party providing financing to FirstLink; provided that such assignment shall not relieve FirstLink from its obligations hereunder. In connection with a sale or disposition of the Properties, Owner shall request FirstLink's written consent to assign this Agreement and shall require any subsequent owner of the Properties to assume this Agreement and the rights and obligations hereunder. Subject to the foregoing, this Agreement shall be binding upon and shall inure to the benefit of the successors and assigns of the respective parties to this Agreement.

  • Default Events and Termination 18.1 Each of the following circumstances shall constitute a General Default:

  • Amendment of the Agreement The Agreement is hereby amended as follows:

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

Time is Money Join Law Insider Premium to draft better contracts faster.