Security Incident Reporting A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Security Incident Notification The Transfer Agent shall promptly notify the Trust but in no event later than 72 hours following discovery of any Security Incident(s). Such notification shall include the extent and nature of such intrusion, disclosure, or unauthorized access, the identity of the compromised Customer Confidential Information (to the extent it can be ascertained), how the Transfer Agent was affected by the Security Incident, and its response to such Security Incident. The Transfer Agent shall use continuous and diligent efforts to remedy the cause and the effects of such Security Incident in an expeditious manner and deliver to the Trust a root cause analysis and future incident Mitigation plan with regard to any such incident. The Transfer Agent shall reasonably cooperate with the Trust’s investigation and response to each Security Incident. If the Trust determines in its sole discretion that it may need or be required to notify any individual(s) as a result of a Security Incident, the Trust shall have the right to control all such notifications and the Transfer Agent shall bear all direct costs associated with the notification, to the extent the notification and corresponding actions are required by U.S. law, and subject to the limitation of liability set forth in the Agreement. Without limiting the foregoing, unless otherwise required by U.S. law, no such notifications shall be made by the Transfer Agent without the Trust’s prior written consent and the Trust shall, together with the Transfer Agent, determine the content and delivery of all such notifications. For the avoidance of doubt, the Transfer Agent shall be solely responsible for all costs and expenses, subject to the limitations of liability under the Agreement that the Trust and/or the Transfer Agent may incur to the extent that they are attributable to or arise from the Transfer Agent’s breach of its confidentiality obligations under the Agreement.
Security Incident “Security Incident” means the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system.
Breaches and Security Incidents During the term of the Agreement, CONTRACTOR 27 agrees to implement reasonable systems for the discovery of any Breach of unsecured DHCS PI and PII 28 or security incident. CONTRACTOR agrees to give notification of any beach of unsecured DHCS PI 29 and PII or security incident in accordance with subparagraph F, of the Business Associate Contract, 30 Exhibit B to the Agreement.
Security Incidents 11.1 Includes identification, managing and agreed reporting procedures for actual or suspected security breaches.
Adverse Event Reporting Both Parties acknowledge the obligation to comply with the Protocol and / or applicable regulations governing the collection and reporting of adverse events of which they may become aware during the course of the Clinical Trial. Both Parties agree to fulfil and ensure that their Agents fulfil regulatory requirements with respect to the reporting of adverse events.
Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.
Reporting Incidents The Interconnection Parties shall report to each other in writing as soon as practical all accidents or occurrences resulting in injuries to any person, including death, and any property damage arising out of the Interconnection Service Agreement.
Control of Litigation The Parties agree and acknowledge that ASCU shall be entitled at its option exclusively to control any Proceeding, including without limitation the Canyons Litigation, and each Party agrees (i) to promptly notify the other Party of the existence (or alleged existence) of the institution or commencement of any Proceeding instituted by any third party, and (ii) in the case of ASC, to cooperate fully with Indemnitors in connection therewith; provided, that Indemnitor’s right to control any Proceeding shall not be construed as including the right to enter into any settlement, consent judgment or decree or other order or judgment affecting Indemnitees and whether involving monetary or non-monetary relief without the prior written approval of Indemnitees, which approval shall not be unreasonably withheld, delayed or conditioned. Furthermore, Indemnitors agree to keep ASC and the Indemnitees reasonably informed of the status of each Proceeding, including providing ASC and the Indemnitees with copies of and access to ASCU’s, and any other Indemnitors’, legal counsel’s litigation files as well as providing Indemnitees with copies of all status reports or similar correspondence including, but not limited to, correspondence provided to any insurance carrier or bonding company with an interest in any such Proceeding or litigation. If ASCU fails to proceed promptly and diligently to respond to any such Proceeding as promptly as reasonably possible, including but not limited to failing to provide Indemnitees with notice of any proposed settlement prior to entering into such an agreement, and/or fails to keep Indemnitees reasonably informed of the status of any Proceeding, Indemnitees may send Notice of such failure to ASCU and if such failure is not corrected within 30 days after such Notice, Indemnitees may assume control of such Proceeding at Indemnitors’ sole expense. In the event of such an assumption of control of a Proceeding by Indemnitees, Indemnitees shall not enter into any settlement, consent decree or order without the prior written approval of ASCU, which approval shall not be unreasonably withheld, delayed or conditioned.
Incident Reporting Transfer Agent will use commercially reasonable efforts to promptly furnish to Fund information that Transfer Agent has regarding the general circumstances and extent of such unauthorized access to the Fund Data.