Security Breaches definition

Security Breaches means any compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Personal Data transmitted, stored or otherwise processed.
Security Breaches means any compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to Personal Data transmitted, stored or otherwise processed. For any question, contact Nathalie Laneret, Group Data Protection Officer at: nathalie.laneret@capgemini.comAnnex 2: DATA SUBJECT RIGHT REQUEST AND COMPLAINT PROCEDURE As one of the world’s foremost providers of consulting, technology and outsourcing services to a wide array of clients around the world and providing services in more than 40 countries, Capgemini (“We”) is committed to protecting privacy and the Personal Data entrusted to it, whether acting as a Data Controller or as a Data Processor (see Definitions at the end of document). The purpose of this Data Subject Right Request and Complaint Procedure (“Procedure”) is to describe the process by which a Data Subject (“You”), can submit a Data Subject Right Request concerning your Personal Data that is processed by Capgemini, or submit a Data Subject Complaint regarding the processing of your Personal Data. In any case you can also contact directly your local Data Protection Authority or a competent court.
Security Breaches means the accidental loss or destruction, unauthorized access, use or disclosure of Customer Personal Data.

Examples of Security Breaches in a sentence

  • The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request.

  • Licensee shall take such measures as are reasonably necessary to determine the existence of Security Breaches or Territorial Breaches and shall promptly notify Licensor if any such occurrences are discovered.

  • Each party shall indemnify the other from any damages, liabilities, or expenses of every kind, including but not limited to reasonable attorney’s fees, resulting from or arising out of their own Cyber Security Breaches, including wire fraud attempts directed to the other party resulting from such Cyber Security Breaches.

  • If Contractor requires the County to agree to terms and conditions in addition to those contained in this Agreement, any limitations on Contractor’s liability contained in such terms and conditions shall not apply to Security Breaches or the unauthorized release of County data.

  • The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below.


More Definitions of Security Breaches

Security Breaches shall have the meaning given to it in Section 4.13(f).
Security Breaches means any confirmed compromise of an information system, including accidental or unauthorized use, disclosure, destruction, loss, alteration, transmission, or access to Boeing Materials that are stored or otherwise processed by Spirit in relation to an Agreement.
Security Breaches. Although the Landlord may, through Landlord’s employees or through third party vendors, attempt to provide a degree of security for the Project, the Project Common Areas and the Building Common Areas, Landlord does not, either expressly or impliedly, warrant, guarantee or insure the safety or security of Tenants, their clients, customers, patients, employees, invitees or guests or their respective property and Tenant, on behalf of Tenant and Tenant’s clients, customers, patients, employees, invitees and guests, waives and releases all claims, actions and causes of action by them or any and each of them against Landlord, its employees, officers, directors, shareholders, agents and representatives, for death, personal injury, property damage or destruction or theft resulting from criminal acts of any and all persons occurring on, in or about the Project, the Tenant’s Building, the Building, the Project Common Areas and the Building Common Areas and Service Areas, except those of Landlord and its employees, and, agrees to indemnify and hold Landlord, its employees, officers, directors, shareholders, agents and representatives, and each of them, harmless from and against all such claims, actions and causes of action brought by Tenant and/or Tenant’s clients, customers, patients, employees, invitees or guests, against Landlord and/or its employees, officers, directors, shareholders, agents and/or representatives, singularly or jointly with others, for damages for death, personal injury, property damage or destruction or theft resulting from the criminal acts of any and all persons other than Landlord, its employees, officers, directors, shareholders, agents or authorized representatives and all damages, whether compensatory, punitive, exemplary, consequential or otherwise awarded and all judgments entered therein, and all costs and expenses, including reasonable attorney’s fees, expert witness fees, paid or incurred by Landlord in defending such claims, actions and/or causes of action.
Security Breaches. If SimpleKPI becomes aware of a Security Breach, SimpleKPI shall inform a Customer without undue delay and provide reasonable information so that a Customer can fulfil any data breach reporting obligations it may have under (and in accordance with the timescales required by) EU GDPR. SimpleKPI shall further take reasonably necessary measures and actions to remedy or mitigate the effects of the Security Breach and keep Customer informed of all material developments in connection with the Security Breach.
Security Breaches has the meaning given to it in Clause 4.1(i)(vii) of this Agreement;
Security Breaches. The requirement to report security breaches to the relevant DPA without undue delay and where feasible within 72 hours of becoming aware of the breach, other than where it is unlikely to result in a risk to individuals. Businesses must also report security breaches to affected individuals without undue delay unless, for example, the data is encrypted or subsequent measures have been taken to remove the risk to individuals. • Pseudonymous Data — A new definition for pseudonymization, which in turn enables certain uses of data, for example, in relation to scientific research, where a business implements appropriate technical and organizational measures to protect against re-identification. • Right to be Forgotten — A new right for individuals to have their personal data erased without undue delay where, for example, the data is no longer necessary for the purpose for which it was collected or the consent for the processing is withdrawn and there is no other legal basis for the processing. This right to be forgotten is subject to a limited number of exceptions including, for example, where the processing is necessary for scientific research or the defense of legal claims.
Security Breaches has the meaning set out in Schedule 3 (Data Sharing Agreement) Part I clause 2.1.5(e) of this Agreement;