Information Security Event definition

Information Security Event means an identified occurrence of a system, service or network state indicating a possible breach of the information security policy or failure of information security controls, or a previously unknown situation that can be relevant for information security;
Information Security Event is defined as any situation where it is suspected or confirmed that Confidential Information is lost; is subject to unauthorized or inappropriate access, use, or misuse; the security, confidentiality, or integrity of the information is compromised; or the availability of Supplier Information Processing Systems is compromised by external attack.
Information Security Event means an identified occurrence of a system, service or network that is indicating a possible breach of information security policy prescription, or failure of safeguards, or a previously unknown situation that may be security relevant;

Examples of Information Security Event in a sentence

  • A single breach or a series of breaches of clause 22, any Separation Arrangements (in respect of Sensitive and Classified Information), any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 15, any Separation Arrangements, any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 21, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 18, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 15, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 16, any Separation Arrangements, any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • A single breach or a series of breaches of clause 14, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • A single breach or a series of breaches of clause 19, any Separation Arrangements (in respect of Sensitive and Classified Information), any Cyber Security Event, any Cyber Security Incident or any other unwanted or unexpected Sensitive and Classified Information Security Event that has a significant probability of compromising Sensitive and Classified Information security procedures, processes and requirements and threatening security.

  • Confidential Information Incident A single breach or a series of breaches of clause 21, any Separation Arrangements or any other unwanted or unexpected Confidential Information Security Event that has a significant probability of compromising Commonwealth business and threatening Commonwealth information security.

  • Information Security Event Management aims to identify information security incidents based on the correlation and analysis of security events from by a wide variety of event and contextual data sources.


More Definitions of Information Security Event

Information Security Event means any breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, AXA XL Data, transmitted, stored, or otherwise processed.
Information Security Event means an identified occurrence of a system, ser- vice or network state indicating a possi- ble breach of information security policy or failure of safeguards, or a previously unknown situation that may be relevant to security.
Information Security Event means any actual or potential incident involving any Information System or equipment owned or controlled by Seller that may involve Buyers Sensitive Information, or any actual or potential unauthorized access to use or disclosure of Buyers Sensitive Information.
Information Security Event is defined as any situation where ADT Data may be known or suspected to be lost by Xxxxx.xxx or its Providers; is subject to unauthorized or inappropriate access, use, or misuse; or the security, confidentiality, integrity, or availability of the information or Xxxxx.xxx Information Processing Systems is compromised by attack.
Information Security Event means: (i) any circumstance pursuant to which Applicable Data Protection Law requires notification to be given to affected parties, interested parties (including Governmental Authorities, or officials), or other activity in response to such circumstance; (ii) any actual, threatened, or reasonably suspected or foreseeable circumstance that compromises, or could reasonably be expected to compromise, Information Assets in a fashion that either does or could reasonably be expected to permit unauthorized Processing of any Protected Information; (iii) any act or attempt, successful or unsuccessful, to Process or prevent Processing of Information Assets that is, in whole or in part, illegal or not authorized by Regions; (iv) any ransomware (e.g., encrypting or crypto-ransomware, locker ransomware, Master Boot Record (“MBR”) malicious code, mobile device ransomware, IoT ransomware, or a similar type of application, code or software) attack on Information Assets; or (v) any event meeting the definition of a “Notification Incident”, as stated in 12 C.F.R. Part 53. Notwithstanding the foregoing, an “Information Security Event” shall not include

Related to Information Security Event

  • Security Event means an immediately reportable subset of security incidents which incident would include:

  • Information Security shall have the same meanings as the terms “information technology” and “information security”, respectively, in §24-37.5-102, C.R.S. Capitalized terms used herein and not otherwise defined herein or in the HIPAA Rules shall have the meanings ascribed to them in the Contract.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Cybersecurity Event means any act or attempt, successful or, to the extent known by Provider, unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or Nonpublic Information stored on such Information System. The ongoing existence and occurrence of attempted but Unsuccessful Security Incidents shall not constitute a Cybersecurity Event under this definition. “Unsuccessful Security Incidents” are activities such as pings and other broadcast attacks on Provider’s firewall, port scans, unsuccessful log-on attempts, denials of service and any combination of the above, so long as no such incident results in unauthorized access, use or disclosure of Molina Nonpublic Information or sustained interruption of service obligations to Molina.

  • Transaction Security means the Security provided for the Secured Obligations pursuant to the Security Documents.

  • restricted security term means each of the terms “non-voting security”, “subordinate voting security”, and “restricted voting security”;

  • Green Tag Reporting Rights means the right of a purchaser of renewable energy to report ownership of accumulated “green tags” in compliance with and to the extent permitted by applicable Law and include, without limitation, rights under Section 1605(b) of the Energy Policy Act of 1992, and any present or future federal, state or local certification program or emissions trading program, including pursuant to the WREGIS Operating Rules.

  • Trade Secrets Collateral means all common law and statutory trade secrets and all other confidential or proprietary or useful information and all know-how obtained by or used in or contemplated at any time for use in the business of the Grantor (all of the foregoing being collectively called a "Trade Secret"), whether or not such Trade Secret has been reduced to a writing or other tangible form, including all documents and things embodying, incorporating or referring in any way to such Trade Secret, all Trade Secret licenses, including each Trade Secret license referred to in Schedule V attached hereto, and including the right to xxx for and to enjoin and to collect damages for the actual or threatened misappropriation of any Trade Secret and for the breach or enforcement of any such Trade Secret license.

  • Underwriter Information has the meaning provided in Section 3(c) hereof.

  • Specified Asset Sale has the meaning specified in Section 2.05(b)(vi).

  • Transaction Security Documents means each of the documents listed as being a Transaction Security Document in paragraph 2(e) of Part I of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement and any document required to be delivered to the Administrative Agent under paragraph 3(d) of Part II of Schedule 2 (Conditions Precedent) of the 2009 Financing Agreement together with any other document entered into by any Obligor creating or expressed to create any Security over all or any part of its assets in respect of the obligations of any of the Obligors under any of the Finance Documents (and any other Debt Documents).

  • Warranty Event As to any Asset, the discovery that as of the related Cut-Off Date or Funding Date there had existed a breach of any representation or warranty relating to such Asset and the continuance of such breach through any applicable determination date or beyond any applicable cure period.

  • Permitted Security Interest means any Security Interest:

  • Liquidity Event of Default with respect to any Liquidity Facility, has the meaning assigned to such term in such Liquidity Facility.

  • Holder Information shall have the meaning given in Section 4.1.2.