Spillage and Information Security Incidents Sample Clauses

Spillage and Information Security Incidents. Upon written notification by the Government of a spillage or information security incident involving classified information, or the Contractor’s discovery of a spillage or security incident involving classified information, the Contractor shall immediately (within 30 minutes) notify XXX-XXXXXXXX@xxxxx.xxx and the Office of Security at XXXxxxxxxxxxxxxxxxxxxx@xxxxx.xxx to correct the spillage or information security incident in compliance with agency-specific instructions. The Contractor will also notify the Contracting Officer or Contracting Officer’s Representative and the Contractor Facilities Security Officer. The Contractor will abide by USAID instructions on correcting such a spill or information security incident. For all spills and information security incidents involving unclassified and/or SBU information, the protocols outlined above in section (g) and (h) below shall apply.
AutoNDA by SimpleDocs
Spillage and Information Security Incidents. Upon written notification by the Government of a spillage or information security incident involving classified information, or the Contractor’s discovery of a spillage or security incident involving classified information, the Contractor must immediately (within 30 minutes) notify CIO- XXXXXXXX@xxxxx.xxx and the Office of Security at XXXxxxxxxxxxxxxxxxxxxx@xxxxx.xxx to correct the spillage or security incident in compliance with agency-specific instructions. The Contractor will abide by USAID instructions on correcting such a spill or security incident. Contractor employees are strictly prohibited from including any Sensitive Information in the subject or body of any e-mail concerning information security incident reports. To transmit Sensitive Information, Contractor employees must use FIPS 140-2 compliant encryption methods to protect Sensitive Information in attachments to email. Passwords must not be communicated in the same email as the attachment.

Related to Spillage and Information Security Incidents

  • Accident and Incident Investigations An accident, injury, critical injury, or hazardous situation will be investigated in accordance with the CJHSC’s investigation protocol.

  • Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.

  • Personal Information security breach Supplier/Service Provider’s Obligations

  • Reporting Unsuccessful Security Incidents Business Associate shall provide Covered Entity upon written request a Report that: (a) identifies the categories of Unsuccessful Security Incidents; (b) indicates whether Business Associate believes its current defensive security measures are adequate to address all Unsuccessful Security Incidents, given the scope and nature of such attempts; and (c) if the security measures are not adequate, the measures Business Associate will implement to address the security inadequacies.

  • Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.

  • COMPLAINTS AND INVESTIGATIONS 1. This article applies to complaints or allegations made externally and not from normal supervisory activities.

  • Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.

  • Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.

  • Reporting Security Incidents The Business Associate will report to the County any Incident of which the Business Associate becomes aware that is:

  • Adverse Events Subsequent to the date hereof, there shall not have occurred any of the following: (i) a suspension or material limitation in trading in securities generally on the New York Stock Exchange, the NASDAQ National Market or the NASDAQ Global Market, (ii) a general moratorium on commercial banking activities in the People’s Republic of China or New York, (iii) the outbreak or escalation of hostilities involving the United States or the People’s Republic of China or the declaration by the United States or the People’s Republic of China of a national emergency or war if the effect of any such event specified in this clause (iii) in your reasonable judgment makes it impracticable or inadvisable to proceed with the public offering or the delivery of the Shares on the terms and in the manner contemplated in the Prospectus, or (iv) such a material adverse change in general economic, political, financial or international conditions affecting financial markets in the United States or the People’s Republic of China having a material adverse impact on trading prices of securities in general, as, in your reasonable judgment, makes it impracticable or inadvisable to proceed with the public offering of the Shares or the delivery of the Shares on the terms and in the manner contemplated in the Prospectus.

Time is Money Join Law Insider Premium to draft better contracts faster.