Detection and Response Clause Samples

The Detection and Response clause outlines the obligations and procedures for identifying and addressing security incidents or breaches. Typically, it requires parties to implement monitoring systems to detect unauthorized access or threats and to follow specific steps for investigation, notification, and remediation if an incident occurs. This clause ensures that both parties are prepared to respond swiftly and effectively to security issues, minimizing potential damage and maintaining trust.
Detection and Response. The Solution shall have the ability to detect and respond to a wide range of security threats, including malware, phishing, insider threats, and zero-day attacks.
Detection and Response. Supplier shall monitor its system for security breaches, violations and suspicious external activity or unauthorized internal system activity. Supplier shall notify Bank of America (promptly within twenty-four (24) hours or as soon thereafter as practicable) through the defined security escalation channel of Bank of America, the Bank of America Computing Incident Response Team (“BACIRT”), in the event of a breach of security or the detection of suspicious activity. Such notification to Bank of America shall precede notifications to any other Party. Supplier shall cooperate fully with all Bank of America security investigation activities and abide by the BACIRT guidelines for escalation and control of significantly security incidents. Bank of America will provide a copy of the guidelines to Supplier, and such guidelines shall be treated as the Confidential Information of Bank of America. Supplier shall maintain for a mutually agreed-upon length of time, and afford Bank of America reasonable access to, all records and logs of that portion of Supplier’s network that stores or processes Confidential Information. Bank of America may review and inspect any record of system activity or Confidential Information handling upon reasonable prior notice. Supplier acknowledges and agrees that records of system activity and of Confidential Information handling may be evidence (subject to appropriate chain of custody procedures) in the event of a security breach or other inappropriate activity. Upon the request of Bank of America, Supplier shall deliver the original copies of such records to Bank of America for use in any legal, investigatory or regulatory proceeding. Supplier shall monitor industry-standard information channels (bugtraq, CERT, OEMs, etc.) for newly identified system vulnerabilities regarding the technologies and services provided to Bank of America and fix or patch any identified security problem in an adequate and timely manner. Unless otherwise expressly agreed in writing, “timely” shall mean that Supplier shall introduce such fix or patch as soon as commercially reasonable after Supplier becomes aware of the security problem. This obligation extends to all devices that comprise Supplier’s system, e.g., application software, databases, servers, firewalls, routers and switches, hubs, etc., and to all of Supplier’s other Confidential Information handling practices. Bank of America may perform vulnerability testing of Supplier’s system to test the remedia...
Detection and Response. 3.1 Tech shall monitor [**]. Tech shall notify Bank [**], in the event of a [**]. Per Section IV of the Supplier Security Requirements, [**] shall be contacted by calling [**] retains the right to make appropriate notifications to [**] shall make no notice to [**] without the written permission, and at the written direction, of [**] shall cooperate fully with all [**]. 3.2 Tech shall maintain for a mutually agreed-upon length of time, [**] PayMode Data. Bank may [**] upon reasonable prior notice. Tech acknowledges and agrees that [**] PayMode Data [**] in the event of a [**]. Upon the request of Bank, Tech shall [**]. Nothing in this Section 3.2 shall give [**]. 3.3 Tech shall monitor [**] in an adequate and timely manner. Unless otherwise expressly agreed in writing, [**]. This obligation [**]. 3.4 Tech will perform [**]. Tech will promptly provide the results to Bank.
Detection and Response. ‌ Chronicle Sec Ops threat detection and response capabilities automatically find threats at unparalleled speed and scale in real-time utilizing Google-Core infrastructure, curated and/or custom detection techniques, and telemetry from security and environment IT telemetry. The Chronicle Sec Ops rules engine used in the threat detection process includes predefined rules mapped to specific threats, suspicious activity, and security frameworks like MITRE ATT&CK. The rules engine syntax is built using the widely adopted YARA detection language (▇▇▇▇▇://▇▇▇▇▇.▇▇▇▇▇▇.▇▇▇/chronicle/docs/detection/yara-l-2-0-syntax) allowing organizations to easily adjust or extend rules to meet their enterprise’s specific needs. Chronicle Sec Ops allows you to interrogate all your security telemetry in one place so that you can accurately identify threats and reach decisions faster than ever. The solution includes 500+ YARA-L based SOC Prime rules (▇▇▇▇▇://▇▇▇▇▇▇.▇▇▇/chronicle/detection-rules) and a Sigma to YARA-L converter so organizations can easily port or migrate existing rules from legacy systems to Chronicle. Once Chronicle Sec Ops detects a threat within the environment, organizations can leverage our purpose-built integrations with Chronicle SOAR, (or any of the leading SOAR vendors), allowing organizations flexibility to combine the real-time threat detection and investigation The State of Florida Department of Management Services May 2023 capabilities of Chronicle Sec Ops with your SOAR playbooks as they simplify and mature their detection and response efforts. Lastly, Chronicle leverages IOC matching (both in-line and retrospectively as soon as the threat intel is ingested and parsed by the Chronicle ingestion api). Chronicle ingests threat intel sources from Mandiant Advantage Threat Intel (MATI), VirusTotal (VT), and other sources of threat intel from providers ranging from TIP (Threat Intelligence Platforms), other premium 3rd party TI, ISAC TI, open-source TI and more.‌
Detection and Response. Implement AI-driven threat detection systems to identify and respond to potential security breaches in real-time. Integrate robust identity verification mechanisms to ensure secure access control and prevent unauthorized access, both internally and externally. Define incident response protocols, incorporating identity-related breach scenarios, and ensure they are regularly tested and updated to adapt to evolving security threats.

Related to Detection and Response

  • Workplace Violence Prevention and Crisis Response (applicable to any Party and any subcontractors and sub-grantees whose employees or other service providers deliver social or mental health services directly to individual recipients of such services): Party shall establish a written workplace violence prevention and crisis response policy meeting the requirements of Act 109 (2016), 33 VSA §8201(b), for the benefit of employees delivering direct social or mental health services. Party shall, in preparing its policy, consult with the guidelines promulgated by the U.S. Occupational Safety and Health Administration for Preventing Workplace Violence for Healthcare and Social Services Workers, as those guidelines may from time to time be amended. Party, through its violence protection and crisis response committee, shall evaluate the efficacy of its policy, and update the policy as appropriate, at least annually. The policy and any written evaluations thereof shall be provided to employees delivering direct social or mental health services. Party will ensure that any subcontractor and sub-grantee who hires employees (or contracts with service providers) who deliver social or mental health services directly to individual recipients of such services, complies with all requirements of this Section.

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇▇▇.▇▇.▇▇/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline ▇-▇▇▇-▇▇▇-▇▇▇▇ ● OIG Website: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ ● Internal Affairs Email: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇.▇▇.▇▇ ● OIG Hotline Email: ▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇@▇▇▇▇.▇▇▇▇▇.▇▇.▇▇. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Outpatient Dental Anesthesia Services This plan covers anesthesia services received in connection with a dental service when provided in a hospital or freestanding ambulatory surgical center and: • the use of this is medically necessary; and • the setting in which the service is received is determined to be appropriate. This plan also covers facility fees associated with these services. This plan covers dental care for members until the last day of the month in which they turn nineteen (19). This plan covers services only if they meet all of the following requirements: • listed as a covered dental care service in this section. The fact that a provider has prescribed or recommended a service, or that it is the only available treatment for an illness or injury does not mean it is a covered dental care service under this plan. • dentally necessary, consistent with our dental policies and related guidelines at the time the services are provided. • not listed in Exclusions section. • received while a member is enrolled in the plan. • consistent with applicable state or federal law. • services are provided by a network provider.