Security Incident Reporting. A security incident occurs when CDA information assets are or reasonably believed to have been accessed, modified, destroyed, or disclosed without proper authorization, or are lost, or stolen. Subrecipient must comply with CDA’s security incident reporting procedures located at xxxxx://xxx.xxxxx.xx.xxx/ProgramsProviders/#Resources.
Security Incident Reporting. 9.17.13.1 A security incident occurs when County Information Assets are or reasonably believed to have been accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc. Subrecipient and its Lower Tier Subrecipient must comply with California Department of Aging's security incident reporting procedure which is available online at xxxx://xxxxx.xx.xxx/Programsproviders/Information_ Security_and_Privacy.
Security Incident Reporting. 9.18.13.1 A security incident occurs when County Information Assets are accessed, modified, destroyed or disclosed without proper authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Subrecipient employees access systems in excess of their user rights or use the systems inappropriately, data is breached, etc.
Security Incident Reporting. Each Party agrees to notify the other Party promptly, but in no event later than ten (10) business days after becoming aware of the occurrence of: (i) a potential security breach involving Licensed Data; (ii) re-identification of any of the Licensed Data; (iii) a complaint related to a request for access to the Licensed Data; or (iv) any inquiry, investigation, audit, or government enforcement action related to the Licensed Data. If Client or any of Client’s Affiliates becomes legally compelled to disclose any Licensed Data, then to the extent permitted by applicable law, Client will notify Tempus as soon as practical, but in any event within ten (10) business days of learning of such requirement, so that Tempus may seek a protective order or other appropriate remedy. If any of the events set out in this Section occurs, Client agrees to cooperate and cause Client’s Affiliates to cooperate with Tempus and take any actions reasonably requested by Tempus to minimize the re-identification risk and potential damage resulting from the event.
Security Incident Reporting. The Sheriff shall report all breaches of security, criminal acts, or threats to the Court or court personnel to the Local Security Coordinator. Such incidents include, but are not limited to: threats, suspicious incidents, vandalism, theft/burglary/robbery, medical assists and assaults. The Sheriff further agrees to provide a written report of the incident to the Local Security Coordinator on the Sheriff’s standard departmental report form or on a Court Security Incident form provided by the local Security Coordinator. This will be completed as soon as is reasonably possible after the incident.
Security Incident Reporting. If We become aware of any accidental, unauthorised or unlawful destruction, loss, alteration, or disclosure of, or access to personal data You have provided (a Security Incident), We will notify You promptly and provide You promptly with a detailed description of the Security Incident and the identity of each affected data subject, with periodic updates, and any other information You may reasonably request in relation to such Security Incident.
Security Incident Reporting. If 2Ring becomes aware of a Security Incident, 2Ring will notify Subscriber without undue delay, and in any case, where feasible, within forty-eight (48) hours after becoming aware. 2Ring will promptly take reasonable steps to contain, investigate, and mitigate any Security Incident.
Security Incident Reporting. If Snowflake becomes aware of a Security Incident, Snowflake shall notify Customer without undue delay, and in any case, where feasible, notify Customer within seventy-two (72) hours after becoming aware. Snowflake shall promptly take reasonable steps to contain, investigate, and mitigate any Security Incident.
Security Incident Reporting. PacketFabric will report to Customer any actual or suspected Security Incident or a suspected event that is believed to be sufficiently plausible to warrant further investigation. “Security Incident” means any actual or suspected unauthorized access to or use of any Customer’s property or Confidential Information. Upon request from Customer, PacketFabric will reasonably cooperate in the investigation of any Security Incident and will produce logs and other documentation from the device(s) which are, or may be, related to a Security Incident. Except as required by Applicable Law, PacketFabric will not disclose to third parties any actual or suspected Security Incident without Customer’s prior written approval.
Security Incident Reporting. 9.23.3.4.1 A security incident occurs when Information Assets are accessed, modified, destroyed, or disclosed without proper authorization, or are lost or stolen. Contractor must report all security incidents to County's Project Manager within two (2) business days of detection.