Security Violation Sample Clauses

Security Violation. An act from within an organization that bypasses or disobeys security policies, practices, or procedures. Sensitive data: Sensitive data is a special category of personally identifiable information (PII) that has the potential to cause great harm to an individual, government agency, or program if abused, misused, or breached. It is sensitive information protected against unwarranted disclosure and carries specific criminal and civil penalties for an individual convicted of unauthorized access, disclosure, or misuse. Protection of sensitive information usually involves specific classification or legal precedents that provide special protection for legal and ethical reasons. Security Information Management (SIM): SIM is software that automates the collection of event log data from security devices such as firewalls, proxy servers, intrusion detection systems and anti-virus software. The SIM translates the data into correlated and simplified formats. SMDS (Switched Multimegabit Data Service (SMDS): SMDS is a telecommunications service that provides connectionless, high- performance, packet- switched data transport. Although not a protocol, it supports standard protocols and communications interfaces using current technology. SSA-provided data/information: Synonymous with “SSA-supplied data/information‟, defines information under the control of SSA provided to an external entity under the terms of an information exchange agreement with SSA. The following are examples of SSA-provided data/information:  SSA’s response to a request from an EIEP for information from SSA (e.g., date of death)  SSA’s response to a query from an EIEP for verification of an SSN SSA data/information: This term, sometimes used interchangeably with “SSA-provided data/information,‟ denotes information under the control of SSA provided to an external entity under the terms of an information exchange agreement with SSA. However, “SSA data/information” also includes information provided to the EIEP by a source other than SSA, but which the EIEP attests to that SSA verified it, or the EIEP couples the information with data from SSA as to to certify the accuracy of the information. The following are examples of SSA information:  SSA’s response to a request from an EIEP for information from SSA (e.g., date of death)  SSA’s response to a query from an EIEP for verification of an SSN  Display by the EIEP of SSA’s response to a query for verification of an SSN and the associated SSN provided ...
AutoNDA by SimpleDocs
Security Violation. Recipient shall monitor access of Users and shall notify Agency within twenty-four (24) hours if a security violation of this Contract is detected, or if Recipient suspects that the security or integrity of TWC Information has or may have been compromised in any way.
Security Violation. Board and Board subcontractor shall monitor access of Users and shall notify Agency within twenty-four (24) hours if a security violation of this Agreement is detected, or if Board or Board subcontractor suspects that the security or integrity of TWC Information has or may have been compromised in any way. The time period for notifying TWC under this section is reduced to one (1) hour for suspected security violations that involve protected health information of a covered under 45 C.F.R. Parts 160, 162, and 164, such as Medicaid Information provided from, by or accessed through the Health and Human Services Commission systems as required by the Health Information and Portability and Accountability Act (HIPAA) and the Health Information Technology Act (HITECH).
Security Violation. If any activity violating the Platform's security or threatening the integrity of user data or Netzo is detected.
Security Violation. The Member is prohibited from violating or attempting to violate the security of the Site including, without limitation, accessing data not intended for them or logging into a server or account which they are not authorized to access, attempting to probe, scan or test the vulnerability of a system or network or attempting to breach security or authentication measures without proper authorization, attempting to interfere with service to any Member, host or network or sending unsolicited e-mail. Violation of the system or network security may result in civil or criminal liability.

Related to Security Violation

  • WAGE VIOLATIONS Contractor represents and warrants that, during the term of this Master Contract and the three (3) year period immediately preceding the award of the Master Contract, it is not determined, by a final and binding citation and notice of assessment issued by the Washington Department of Labor and Industries or through a civil judgment entered by a court of limited or general jurisdiction, to be in willful violation of any provision of Washington state wage laws set forth in RCW chapters 49.46, 49.48, or 49.52.

  • AIR OR WATER POLLUTION VIOLATION Under the State laws, the Contractor shall not be: (1) in violation of any order or resolution not subject to review promulgated by the State Air Resources Board or an air pollution control district; (2) subject to cease and desist order not subject to review issued pursuant to Section 13301 of the Water Code for violation of waste discharge requirements or discharge prohibitions; or (3) finally determined to be in violation of provisions of federal law relating to air or water pollution.

  • Reporting Violations a) When appropriate, faculty members will submit timely written communication to their immediate supervisor any condition that comes to their attention that may, in their judgment, pose a threat to the health or safety of any person associated with the District.

  • Violation The Asset Representations Reviewer agrees that a violation of this Agreement may cause irreparable injury to the Issuer and the Servicer and the Issuer and the Servicer may seek injunctive relief in addition to legal remedies. If an action is initiated by the Issuer or the Servicer to enforce this Section 4.08, the prevailing party will be reimbursed for its fees and expenses, including reasonable attorney’s fees, incurred for the enforcement.

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include:

Time is Money Join Law Insider Premium to draft better contracts faster.