Cyber Security Incidents definition

Cyber Security Incidents has the meaning ascribed thereto in Schedule C(hh);
Cyber Security Incidents means events caused by human error, external attack, Defects in Software or hardware, breakdown of network or information system, natural disaster, etc., in which Cyber Security is either violated, attempts of violation have occurred or in which such violation is reasonably suspected, including but not limited to the discovery of security gaps, Vulnerabilities, falsification, loss, or damage of Data, cyberattacks, illegal occupation and control of network resources, Malware infections, misuse of Data, illegal access, Data leaks and/or unauthorized access of third parties to systems, Data, Software or any Deliverable. Data Shall mean any data in any digital format, including but not limited to all training data, parameters and hyperparameters of artificial intelligence networks, validation data, scenario, tag database. Data Controller Shall mean any Party or its Affiliates/other Bosch Group Companies (if applicable) which alone or jointly with others determines the purposes and means of the processing of personal Data under Applicable Data Protection Laws. Data Processor Shall mean any Party or its Affiliates/other Bosch Group Companies (if applicable) which processes personal Data on behalf of Data Controller under Applicable Data Protection Laws. Defect Shall mean any fault, imperfection or shortcoming in the quality, quantity, potency, purity, Vulnerabilities or standard which leads to unreasonable danger in the products where such danger threatens personal safety or the safety of third party property, or where a product is governed by national or industry standards for protection of health or personal safety or the safety of property, non-compliance of the product with such standards. Deliverables Shall mean Wave 3.2 Deliverables and Wave 3.3 Deliverables (including all applicable documentation, Data, services, reporting, Software or other work results), as required under this Agreement and its appendixes and schedules. Delivery Note Shall mean a note in the form and substance as set out in Appendix 21 (Delivery Note Format), which contains, including but not limited to, the content of the Deliverables and corresponding SHA-256 hash(es) generated in order to verify the origin of any or all of the Deliverables. Designated Vehicle Shall mean each vehicle of the same Designated Vehicle Model.

Examples of Cyber Security Incidents in a sentence

  • The Service Provider shall comply with, implement and maintain all security measures (including Cyber Security Requirements): as may be required under applicable laws (including the Network and Information Systems Regulations 2018); to enable it to discharge its obligations under this Schedule 13; and to ensure there are no Breaches of Security including Cyber Security Incidents; in all cases to the Purchaser’s reasonable satisfaction and in accordance with Good Industry Practice.

  • Proposed Requirement R1 requires responsible entities to report Cyber Security Incidents within 1 hour of recognition.

  • This typically isn’t a viable low-risk exfiltration option for a targeted cyber intrusion where adversaries are in a physically distant location such as a foreign country.threats‌The complementary Strategies to Mitigate Cyber Security Incidents publication doesn’t explicitly provide mitigation guidance for the threat of ‘business email compromise’ or threats to industrial control systems.

  • The Cyber Security Incident Response plan shall address, at a minimum, the following:R1.1. Procedures to characterize and classify events as reportable Cyber Security Incidents.R1.2. Response actions, including roles and responsibilities of incident response teams, incident handling procedures, and communication plans.R1.3. Process for reporting Cyber Security Incidents to the Electricity Sector Information Sharing and Analysis Center (ES ISAC).

  • Cyber Security Incident Response Plan — The Responsible Entity shall develop and maintain a Cyber Security Incident response plan and implement the plan in response to Cyber Security Incidents.

  • As a result, under the proposed Reliability Standard CIP-008-6, Responsible Entities are required to report more Cyber Security Incidents than only those that meet the definition of Reportable Cyber Security Incident.

  • The System Owner shall develop and maintain a Cyber Security Incident response plan and implement the plan in response to Cyber Security Incidents.

  • This finding inspired us to continue this research also in laboratory conditions (Sokáč and Velísková, 2020).

  • This service is available in 982 pairs of trains.Scope of ‘Clean My Coach’ has been extended to provide ‘Coach Mitra’ service in about 1050 pairs of trains till March 2019 for providing single window assistance to train passengers regarding cleanliness, linen, disinfestation, watering and petty repair.

  • Initial reports for Reportable Cyber Security Incidents must occur within one hour of its determination.

Related to Cyber Security Incidents

  • Cyber Security Incident means any malicious or suspicious event that disrupts, or was an attempt to disrupt, the operation of those programmable electronic devices and communications networks including hardware, software and data that are essential to the Reliable Operation of the Bulk Power System.++

  • Security Incident means any known successful or unsuccessful attempt by an authorized or unauthorized individual to inappropriately use, disclose, modify, access, or destroy any information or interference with system operations in an information system.

  • Cybersecurity Incident means an event occurring on or conducted through a computer network that actually or imminently jeopardizes the integrity, confidentiality, or availability of computers, information or communications systems or networks, physical or virtual infrastructure controlled by computers or information systems, or information resident on any of these. Cybersecurity incident includes, but is not limited to, the existence of a vulnerability in an information system, system security procedures, internal controls, or implementation that is subject to exploitation.

  • Successful Security Incident means a Security Incident that results in the unauthorized Access, Use, Disclosure, modification, or destruction of information or interference with system operations in an Information System.

  • Data Security Incident means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Agreement Personal Data transmitted, stored or otherwise Processed;

  • Unsuccessful Security Incident means a Security Incident such as routine occurrences that do not result in unauthorized Access, Use, Disclosure, modification, or destruction of information or interference with system operations in an Information System, such as: (i) unsuccessful attempts to penetrate computer networks or services maintained by Business Associate; and (ii) immaterial incidents such as pings and other broadcast attacks on Business Associate's firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above with respect to Business Associate’s Information System.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Targeted Unsuccessful Security Incident means an Unsuccessful Security Incident that appears to be an attempt to obtain unauthorized Access, Use, Disclosure, modification or destruction of the Covered Entity’s Electronic PHI.

  • Data Incident means a breach of Google’s security leading to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to, Customer Data on systems managed by or otherwise controlled by Google.

  • Privacy Incident means violation of the Minnesota Government Data Practices Act (Minnesota Statutes chapter 13); violation of federal data disclosure or privacy requirements in federal laws, rules and regulations; and/or breach of a contractual obligation to protect State data. This includes, but is not limited to, improper or unauthorized access to, viewing of, obtaining of, acquisition of, use of, disclosure of, damage to, loss of, modification of, alteration to or destruction of State data protected by such State or federal laws or by contract.

  • Cyber Security means the condition in which road vehicles and their functions are protected from cyber threats to electrical or electronic components.

  • serious incident means any incident that directly or indirectly led, might have led or might lead to any of the following:

  • Cyber incident means actions taken through the use of computer networks that result in a compromise or an actual or potentially adverse effect on an information system and/or the information residing therein.

  • Terrorist Incident means an act of violence by any person acting on behalf of or in connection with any organization which is generally recognized as having the intent to overthrow or influence the control of any government, that is deemed terrorism by the United States Government other than civil disorder or riot, that is not an act of war, declared or undeclared, that results in Loss of life or major damage to property.

  • Critical incident means an occurrence or set of events inconsistent with the routine operation of the facility, or the routine care of a consumer. Critical incidents specifically include but are not necessarily limited to the following: adverse drug events; self-destructive behavior; deaths and injuries to consumers, staff and visitors; medication errors; consumers that are absent without leave (AWOL); neglect or abuse of a consumer; fire; unauthorized disclosure of information; damage to or theft of property belonging to a consumers or the facility; other unexpected occurrences; or events potentially subject to litigation. A critical incident may involve multiple individuals or results.

  • Unusual Incident means those incidents involving serious illness or accidents, death of an individual, injury or illness of an individual requiring inpatient or emergency hospitalization, suicide attempts, a fire requiring the services of a fire department, or any incident requiring abuse investigation.

  • Security Breach means (i) any act or omission that materially compromises either the security, confidentiality or integrity of Named Entity Protected Data, or the physical, technical, administrative or organizational safeguards put in place by Vendor or any Authorized Persons that relate to the protection of the security, confidentiality or integrity of Named Entity Protected Data, (ii) receipt of a complaint in relation to the privacy practices of Vendor or any Authorized Persons or a breach or alleged breach of this Contract relating to such privacy practices.

  • Pollution Incident means an occurrence or series of occurrences having the same origin, which results or may result in a discharge of oil and/or hazardous and noxious substances and which poses or may pose a threat to the marine environment, or to the coastline or related interests of one or more States, and which requires emergency action or other immediate response;

  • Data Security Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored, or otherwise processed.

  • Hearing impairment means an impairment in hearing, whether permanent or fluctuating, that adversely affects the child's educational performance but that is not included under the definition of deafness in this section.

  • Prior Security Interest means a valid and enforceable perfected first-priority security interest in and to the Collateral that is subject only to Permitted Liens which have first-priority by operation of applicable Law.

  • Environmental Incident means, in relation to each Ship:

  • Minor incident means an occurrence involving a consumer during service provision that is not a major incident and that:

  • Cybersecurity Event means any act or attempt, successful or, to the extent known by Provider, unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or Nonpublic Information stored on such Information System. The ongoing existence and occurrence of attempted but Unsuccessful Security Incidents shall not constitute a Cybersecurity Event under this definition. “Unsuccessful Security Incidents” are activities such as pings and other broadcast attacks on Provider’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of Molina Nonpublic Information or sustained interruption of service obligations to Molina.

  • Other health impairment means having limited strength, vitality, or alertness, including a heightened alertness to environmental stimuli, that results in limited alertness with respect to the educational environment, that:

  • Security Event means an immediately reportable subset of security incidents which incident would include: a. A suspected penetration of Contractor’s information system of which the Contractor becomes aware of but for which it is not able to verify immediately upon becoming aware of the suspected incident that PHI was not accessed, stolen, used, disclosed, modified, or destroyed; b. Any indication, evidence, or other security documentation that the Contractor’s network resources, including, but not limited to, software, network routers, firewalls, database and application servers, intrusion detection systems or other security appliances, may have been damaged, modified, taken over by proxy, or otherwise compromised, for which Contractor cannot refute the indication of the time the Contractor became aware of such indication; c. A breach of the security of the Contractor’s information system(s) by unauthorized acquisition, including, but not limited to, access to or use, disclosure, modification or destruction, of unencrypted computerized data and which incident materially compromises the security, confidentiality, or integrity of the PHI; and or, d. The unauthorized acquisition, including but not limited to access to or use, disclosure, modification or destruction, of unencrypted PHI or other confidential information of the County by an employee or authorized user of Contractor’s system(s) which materially compromises the security, confidentiality, or integrity of PHI or other confidential information of the County. If data acquired (including but not limited to access to or use, disclosure, modification or destruction of such data) is in encrypted format but the decryption key which would allow the decoding of the data is also taken, the parties shall treat the acquisition as a breach for purposes of determining appropriate response.