Information Security Event definition

Information Security Event means an identified occurrence of a system, service or network state indicating a possible breach of the information security policy or failure of information security controls, or a previously unknown situation that can be relevant for information security;
Information Security Event is defined as any situation where it is suspected or confirmed that Confidential Information is lost; is subject to unauthorized or inappropriate access, use, or misuse; the security, confidentiality, or integrity of the information is compromised; or the availability of Supplier Information Processing Systems is compromised by external attack.
Information Security Event means an identified occurrence of a system, service or network that is indicating a possible breach of information security policy prescription, or failure of safeguards, or a previously unknown situation that may be security relevant;

Examples of Information Security Event in a sentence

  • A single breach or a series of breaches of clause 21, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 22, any Separation Arrangements (in respect of Sensitive and Classified Information), any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 15, any Separation Arrangements, any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 18, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 19, any Separation Arrangements (in respect of Sensitive and Classified Information), any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 20, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 16, any Separation Arrangements, any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 14, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 15, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • Information Security Event Management aims to identify information security incidents based on the correlation and analysis of security events from by a wide variety of event and contextual data sources.


More Definitions of Information Security Event

Information Security Event means any breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, AXA XL Data, transmitted, stored, or otherwise processed.
Information Security Event means an identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of controls, or a previously unknown situation that can be security relevant.
Information Security Event means an identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be relevant to security. Information Security Governance (ISG) Team: means a group of employees in PMCL who are responsible for the establishment, implementation, operation, monitoring, review, maintenance and improvement of the ISMS for the defined scope and boundaries.
Information Security Event is defined as any situation where ADT Data may be known or suspected to be lost by Xxxxx.xxx or its Providers; is subject to unauthorized or inappropriate access, use, or misuse; or the security, confidentiality, integrity, or availability of the information or Xxxxx.xxx Information Processing Systems is compromised by attack.
Information Security Event means any actual or potential incident involving any Information System or equipment owned or controlled by Seller that may involve Buyers Sensitive Information, or any actual or potential unauthorized access to use or disclosure of Buyers Sensitive Information.
Information Security Event means: (i) any circumstance pursuant to which Applicable Data Protection Law requires notification to be given to affected parties, interested parties (including Governmental Authorities, or officials), or other activity in response to such circumstance; (ii) any actual, threatened, or reasonably suspected or foreseeable circumstance that compromises, or could reasonably be expected to compromise, Information Assets in a fashion that either does or could reasonably be expected to permit unauthorized Processing of any Protected Information; (iii) any act or attempt, successful or unsuccessful, to Process or prevent Processing of Information Assets that is, in whole or in part, illegal or not authorized by Regions; (iv) any ransomware (e.g., encrypting or crypto-ransomware, locker ransomware, Master Boot Record (“MBR”) malicious code, mobile device ransomware, IoT ransomware, or a similar type of application, code or software) attack on Information Assets; or (v) any event meeting the definition of a “Notification Incident”, as stated in 12 C.F.R. Part 53. Notwithstanding the foregoing, an “Information Security Event” shall not include

Related to Information Security Event

  • Security Event means an immediately reportable subset of security incidents which incident would include: a. A suspected penetration of Contractor’s information system of which the Contractor becomes aware of but for which it is not able to verify immediately upon becoming aware of the suspected incident that PHI was not accessed, stolen, used, disclosed, modified, or destroyed; b. Any indication, evidence, or other security documentation that the Contractor’s network resources, including, but not limited to, software, network routers, firewalls, database and application servers, intrusion detection systems or other security appliances, may have been damaged, modified, taken over by proxy, or otherwise compromised, for which Contractor cannot refute the indication of the time the Contractor became aware of such indication; c. A breach of the security of the Contractor’s information system(s) by unauthorized acquisition, including, but not limited to, access to or use, disclosure, modification or destruction, of unencrypted computerized data and which incident materially compromises the security, confidentiality, or integrity of the PHI; and or, d. The unauthorized acquisition, including but not limited to access to or use, disclosure, modification or destruction, of unencrypted PHI or other confidential information of the County by an employee or authorized user of Contractor’s system(s) which materially compromises the security, confidentiality, or integrity of PHI or other confidential information of the County. If data acquired (including but not limited to access to or use, disclosure, modification or destruction of such data) is in encrypted format but the decryption key which would allow the decoding of the data is also taken, the parties shall treat the acquisition as a breach for purposes of determining appropriate response.

  • Cybersecurity Event means any act or attempt, successful or, to the extent known by Provider, unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or Nonpublic Information stored on such Information System. The ongoing existence and occurrence of attempted but Unsuccessful Security Incidents shall not constitute a Cybersecurity Event under this definition. “Unsuccessful Security Incidents” are activities such as pings and other broadcast attacks on Provider’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of Molina Nonpublic Information or sustained interruption of service obligations to Molina.

  • Acquisition Event means a merger or consolidation in which the Company is not the surviving entity, any transaction that results in the acquisition of all or substantially all of the Company’s outstanding Common Stock by a single person or entity or by a group of persons and/or entities acting in concert, or the sale or transfer of all or substantially all of the Company’s assets.

  • Disposition Event means any merger, consolidation or other business combination of the Corporation, whether effectuated through one transaction or series of related transactions (including a tender offer followed by a merger in which holders of Class A Common Stock receive the same consideration per share paid in the tender offer), unless, following such transaction, all or substantially all of the holders of the voting power of all outstanding classes of Common Stock and series of Preferred Stock that are generally entitled to vote in the election of Directors prior to such transaction or series of transactions, continue to hold a majority of the voting power of the surviving entity (or its parent) resulting from such transaction or series of transactions in substantially the same proportions as immediately prior to such transaction or series of transactions.

  • Realization Event means (i) the consummation of a Sale of the Company; or (ii) any transaction or series of related transactions in which the Investor sells at least 50% of the Shares directly or indirectly acquired by it (from the Company or otherwise) and at least 50% of the aggregate of all Investor Investments.

  • Collateral Event means that no Relevant Entity has credit ratings at least equal to the Approved Ratings Threshold.

  • Specified Asset Sale has the meaning specified in Section 2.05(b)(vi).

  • Warranty Event As to any Asset, the discovery that as of the related Cut-Off Date or Funding Date there had existed a breach of any representation or warranty relating to such Asset and the continuance of such breach through any applicable determination date or beyond any applicable cure period.

  • Liquidity Event of Default with respect to any Liquidity Facility, has the meaning assigned to such term in such Liquidity Facility.

  • Underwritten Net Cash Flow means, as of any date of determination, the excess of: (i) for the twelve (12) month period ending on such date, the sum of (A) the lesser of (1) GPR multiplied by 94.0%, and (2) Actual Rent Collections, and (B) Other Receipts; over (ii) for the twelve (12) month period ending on such date, the sum of (A) Operating Expenses, adjusted to reflect exclusion of amounts representing non-recurring expenses, (B) Underwritten Capital Expenditures and (C)

  • Disposition Date shall have the meaning ascribed thereto in Subsection 5.1(d);

  • Equity Event is the receipt by Borrower on or after the Effective Date of unrestricted net cash proceeds of not less than Forty Million Dollars ($40,000,000.00) from the issuance and sale by Borrower of its equity securities, on or before March 31, 2016 and the receipt of evidence thereof by Collateral Agent on or before such date, which evidence must be reasonably acceptable to Collateral Agent.

  • Put Event means the occurrence of:

  • Original Collateral Sale Date means 8 December 2020.

  • Fall Away Event means such time as the Notes shall have an Investment Grade Rating and the Company shall have delivered to the Trustee an Officers’ Certificate certifying that the foregoing condition has been satisfied.

  • Public Equity Offering means an underwritten primary public offering of common stock of the Company pursuant to an effective registration statement under the Securities Act.

  • Capital Event means and includes: (i) any transaction involving the sale, exchange or other disposition of the Project or the Company (but excluding any incidental sales or exchanges of tangible personal property and fixtures), (ii) any financing, refinancing or borrowing secured by the Project or the Company, and (iii) any condemnation or recovery of damage awards and property insurance proceeds (excluding proceeds from any rent or business interruption insurance).

  • Exclusion Event means an event or related events resulting in the exclusion of the Borrower or any Subsidiary from participation in any Medical Reimbursement Programs.

  • Collateral Event of Default has the meaning set forth in Section 13.01(b).

  • Qualified IPO means the issuance by Holdings or any direct or indirect parent of Holdings of its common Equity Interests in an underwritten primary public offering (other than a public offering pursuant to a registration statement on Form S-8) pursuant to an effective registration statement filed with the U.S. Securities and Exchange Commission in accordance with the Securities Act (whether alone or in connection with a secondary public offering).

  • Application Event means the occurrence of (a) a failure by Borrowers to repay all of the Obligations in full on the Maturity Date, or (b) an Event of Default and the election by Agent or the Required Lenders to require that payments and proceeds of Collateral be applied pursuant to Section 2.4(b)(iii) of this Agreement.

  • Registration Event means the occurrence of any of the following events:

  • First Priority Collateral means all assets, whether now owned or hereafter acquired by the Borrower or any other Loan Party, in which a Lien is granted or purported to be granted to any First Priority Secured Party as security for any First Priority Obligation.

  • Public event means any event that can be attended by the

  • Environmental Event shall have the meaning set forth in Section 12.2.1.

  • Data Loss Event means any event that results, or may result, in unauthorised access to Personal Data held by the Contractor under this Agreement, and/or actual or potential loss and/or destruction of Personal Data in breach of this Agreement, including any Personal Data Breach.