Security Incidents and Violations Sample Clauses

Security Incidents and Violations. The Seller shall immediately notify the Buyer and Cognizant Security Office of any actual security violation, security incident, or of any indication of a potential unauthorized disclosure or compromise of classified or sensitive but unclassified information.
AutoNDA by SimpleDocs
Security Incidents and Violations. The PAH shall immediately notify the AOR and Cognizant Security Office of any actual security violation, security incident, or of any indication of a potential unauthorized disclosure or compromise of classified or sensitive but unclassified information.
Security Incidents and Violations. 25.8.1 The Board shall notify the Agency’s Chief Information Security Officer within twenty-four (24) hours if a security violation or breach is detected, or if the Board has any reason to suspect that the security or integrity of the Agency’s data has been, or may be, compromised in any way. Notification shall be provided in the manner specified by Agency IT security guidelines. The Board shall comply with Agency directives in resolving any incidents.

Related to Security Incidents and Violations

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!