Information Security Event definition

Information Security Event means an identified occurrence of a system, service or network state indicating a possible breach of the information security policy or failure of information security controls, or a previously unknown situation that can be relevant for information security;
Information Security Event is defined as any situation where it is suspected or confirmed that Confidential Information is lost; is subject to unauthorized or inappropriate access, use, or misuse; the security, confidentiality, or integrity of the information is compromised; or the availability of Supplier Information Processing Systems is compromised by external attack.
Information Security Event means an identified occurrence of a system, service, or network state indicating a breach of information security policy, failure of safeguards, or a previously unknown situation that may be security-relevant;

Examples of Information Security Event in a sentence

  • A single breach or a series of breaches of clause 22, any Separation Arrangements (in respect of Sensitive and Classified Information), any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 15, any Separation Arrangements, any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 21, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 18, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 15, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 16, any Separation Arrangements, any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 14, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 19, any Separation Arrangements (in respect of Sensitive and Classified Information), any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • Confidential Information Incident A single breach or a series of breaches of clause 21, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • Information Security Event Management aims to identify information security incidents based on the correlation and analysis of security events from by a wide variety of event and contextual data sources.


More Definitions of Information Security Event

Information Security Event means any breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, AXA XL Data, transmitted, stored, or otherwise processed.
Information Security Event means an identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of controls, or a previously unknown situation that can be security relevant.
Information Security Event means an identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be relevant to security. Information Security Governance (ISG) Team: means a group of employees in PMCL who are responsible for the establishment, implementation, operation, monitoring, review, maintenance and improvement of the ISMS for the defined scope and boundaries.
Information Security Event is defined as any situation where ADT Data may be known or suspected to be lost by Xxxxx.xxx or its Providers; is subject to unauthorized or inappropriate access, use, or misuse; or the security, confidentiality, integrity, or availability of the information or Xxxxx.xxx Information Processing Systems is compromised by attack.
Information Security Event means any actual or potential incident involving any Information System or equipment owned or controlled by Seller that may involve Buyers Sensitive Information, or any actual or potential unauthorized access to use or disclosure of Buyers Sensitive Information.
Information Security Event means: (i) any circumstance pursuant to which Applicable Data Protection Law requires notification to be given to affected parties, interested parties (including Governmental Authorities, or officials), or other activity in response to such circumstance; (ii) any actual, threatened, or reasonably suspected or foreseeable circumstance that compromises, or could reasonably be expected to compromise, Information Assets in a fashion that either does or could reasonably be expected to permit unauthorized Processing of any Protected Information; (iii) any act or attempt, successful or unsuccessful, to Process or prevent Processing of Information Assets that is, in whole or in part, illegal or not authorized by Regions; (iv) any ransomware (e.g., encrypting or crypto-ransomware, locker ransomware, Master Boot Record (“MBR”) malicious code, mobile device ransomware, IoT ransomware, or a similar type of application, code or software) attack on Information Assets; or (v) any event meeting the definition of a “Notification Incident”, as stated in 12 C.F.R. Part 53. Notwithstanding the foregoing, an “Information Security Event” shall not include

Related to Information Security Event

  • Information Security shall have the same meanings as the terms “information technology” and “information security”, respectively, in §24-37.5-102, C.R.S. Capitalized terms used herein and not otherwise defined herein or in the HIPAA Rules shall have the meanings ascribed to them in the Contract.

  • Information Security Breach means the unauthorized acquisition, access, use, disclosure, transmittal, storage or transportation of Confidential Information which is not permitted by law or by the terms of this Amendment, including, but not limited to, a Security Incident.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Cybersecurity Event means any act or attempt, successful or, to the extent known by Provider, unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or Nonpublic Information stored on such Information System. The ongoing existence and occurrence of attempted but Unsuccessful Security Incidents shall not constitute a Cybersecurity Event under this definition. “Unsuccessful Security Incidents” are activities such as pings and other broadcast attacks on Provider’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of Molina Nonpublic Information or sustained interruption of service obligations to Molina.

  • Transaction Security means the Security provided for the Secured Obligations pursuant to the Security Documents.

  • Realization Event means (i) the consummation of a Sale of the Company; or (ii) any transaction or series of related transactions in which the Investor sells at least 50% of the Shares directly or indirectly acquired by it (from the Company or otherwise) and at least 50% of the aggregate of all Investor Investments.

  • Green Tag Reporting Rights means the exclusive right of a purchaser of Environmental Attributes to report ownership of Environmental Attributes in compliance with federal or state law, if applicable, and to federal or state agencies or other parties at such purchaser's discretion, and include reporting under Section 1605(b) of the Energy Policy Act of 1992, or under any present or future domestic, international, or foreign emissions trading program or renewable portfolio standard.

  • Confidential commercial or financial information means any business information (other than trade secrets) which is exempt from the mandatory disclosure requirement of the Freedom of Information Act, 5 U.S.C. 552. Exemptions from mandatory disclosure which may be applicable to business information contained in proposals include exemption (4), which covers “commercial and financial information obtained from a person and privileged or confidential,” and exemption (9), which covers “geological and geophysical information, including maps, concerning wells.”

  • Trade Secrets Collateral means all common law and statutory trade secrets and all other confidential or proprietary or useful information and all know-how obtained by or used in or contemplated at any time for use in the business of the Grantor (all of the foregoing being collectively called a "Trade Secret"), whether or not such Trade Secret has been reduced to a writing or other tangible form, including all documents and things embodying, incorporating or referring in any way to such Trade Secret, all Trade Secret licenses, including each Trade Secret license referred to in Schedule V attached hereto, and including the right to xxx for and to enjoin and to collect damages for the actual or threatened misappropriation of any Trade Secret and for the breach or enforcement of any such Trade Secret license.

  • Collateral Event means that no Relevant Entity has credit ratings at least equal to the Approved Ratings Threshold.

  • Specified Asset Sale has the meaning specified in Section 2.05(b)(vi).

  • Transaction Security Documents means each of the documents listed as being a Transaction Security Document in paragraph 2(e) of Part I of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement and any document required to be delivered to the Administrative Agent under paragraph 3(d) of Part II of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement together with any other document entered into by any Obligor creating or expressed to create any Security over all or any part of its assets in respect of the obligations of any of the Obligors under any of the Finance Documents (and any other Debt Documents).

  • Permitted Security Interest means any Security Interest:

  • Holder Information shall have the meaning given in Section 4.1.2.