Access Attempts definition

Access Attempts means the frequent probes, scans, “pings,” and other information system interactions that may or may not indicate threats, whose sources may be difficult or impossible to identify, and whose motives are unknown, and which do not result in access or risk to any information system or PHI.

Examples of Access Attempts in a sentence

  • Access Attempts are not categorically considered unauthorized Use or Disclosure, but Access Attempts do fall under the definition of Security Incident and Business Associate is required to report them to HCA.

  • This provision shall serve as Business Associate’s notice to HCA that Access Attempts will occur and are anticipated to continue occurring with respect to Business Associate’s information systems.

  • HCA acknowledges this notification, and Business Associate is not required to provide further notification of Access Attempts unless they are successful as described in this Section 2 in which case Business Associate will report them in accordance with this Section 2.

  • Access Attempts shall be recorded in Business Associate’s system logs.

  • HCA acknowledges this notification, and Business Associate is not required to provide further notification of Access Attempts unless they are successful as described in Section 2.3.2. above, in which case Business Associate will report them in accordance with Section 2.3.1 or Section 2.4.

  • Client acknowledges this notification, and that Wildcard Dental shall not be required to provide further notification of Access Attempts unless they constitute Security Incidents.

  • Unauthorized Access Attempts: Subscriber shall not attempt to gain unauthorized access to any of Sepia’s data centers, systems, or networks.

  • HCA acknowledges this notification, and Business Associate is not required to provide further notification of Access Attempts unless they are successful as described in Section 2.3.2. above, in which case Business Associate will report them in accordance with subsection 2.3.1 or Section 2.4, Breach Notification.

  • HCA acknowledges this notification, and Business Associate is not required to provide further notification of Access Attempts unless they are successful as described in subsection 2.3.2. above, in which case Business Associate will report them in accordance with subsection 2.3.1 or Section 2.4.

  • Access Attempts are recorded in various system logs and fall under the definition of “Security Incident” in the Security Rule.

Related to Access Attempts

  • Access Agreement means a landlord consent, bailee letter or warehouseman’s letter, in form and substance reasonably satisfactory to Agent, in favor of Agent executed by such landlord, bailee or warehouseman, as applicable, for any third party location.

  • Restricted Access Area means a building, room, or other contiguous area on the premises where plant material is grown, cultivated, harvested, stored, packaged, or processed for sale under control of the manufacturer, and where no person under the age of 18 is permitted.

  • Access Tandem Switch is a Switch used to connect End Office Switches to interexchange Carrier Switches. Qwest's Access Tandem Switches are also used to connect and switch traffic between and among Central Office Switches within the same LATA and may be used for the exchange of local traffic.

  • Access Application means an application for Access Rights as described in section 3.7;

  • Access Rights means licences and user rights to foreground or background;