Incident Detection Clause Samples

The Incident Detection clause outlines the procedures and responsibilities for identifying and reporting security incidents or breaches within an organization. It typically requires parties to implement monitoring systems, promptly notify relevant stakeholders upon detection of an incident, and maintain records of such events. This clause ensures that potential threats are recognized and addressed quickly, minimizing damage and supporting compliance with regulatory obligations.
Incident Detection. General Each incident logged by GGO or by Licensor will be allocated an appropriate severity level to it by Licensor, acting reasonably, such that the incident is categorised in terms of the Severity Model described in paragraph 3.1. Priority 1 and Priority 2 Upon detection of any Priority 1 or Priority 2 incident in the Game Platform by either party, the relevant party shall contact the other by the communication format referred to in paragraph 3.5 of this SLA within 30 minutes. All other incidents For all other incidents, each party shall log such incident in accordance with paragraph 3.5 of this SLA.
Incident Detection. Any HCPH staff who become aware of an incident requiring or potentially requiring activation of the ERP are to immediately notify their supervisor. Incidents that meet one or more of the following criteria may potentially lead to activation of the ERP: • Anticipated impact on or involvement of divisions beyond the currently involved division(s), with an expectation for significant, interdivision coordination; • Potential for escalation of either the scope or impact of the incident; • Novel, epidemic or otherwise unique situation that likely requires a greater-than-normal response from HCPH; • Need for resources or support from outside HCPH; • Significant or potentially significant mortality or morbidity; • The incident has required response from other agencies, and it is likely to or has already required response from the local jurisdiction’s health department.
Incident Detection. NTICO has established and maintains a clearly documented operational incident detection capability and incident response program to respond to suspected or known security incidents or system breaches. Incident response plans include methods to protect evidence of activity from alteration or alteration, and to enable the establishment of a chain of custody of evidence.
Incident Detection. Provider must establish and maintain an operational incident detection capability for responding to suspected or known Security Incidents or system breaches, and will develop a clearly documented incident response program, within six (6) months of the date of last signature to this Exhibit B, into its security governance program, which will incorporate a Security Incident response plan including methods to protect evidence of activity from modification or tampering, and to properly allow for the establishment of a chain of custody for evidence.

Related to Incident Detection

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.

  • Evacuation (1) If the Combatant Commander orders a mandatory evacuation of some or all personnel, the Government will provide assistance, to the extent available, to United States and third country national Contractor personnel. (2) In the event of a non-mandatory evacuation order, unless authorized in writing by the Contracting Officer, the Contractor shall maintain personnel on location sufficient to meet obligations under this contract.

  • Monitoring In each case in which the Foreign Custody Manager maintains Foreign Assets with an Eligible Foreign Custodian selected by the Foreign Custody Manager, the Foreign Custody Manager shall establish a system to monitor (i) the appropriateness of maintaining the Foreign Assets with such Eligible Foreign Custodian and (ii) the contract governing the custody arrangements established by the Foreign Custody Manager with the Eligible Foreign Custodian. In the event the Foreign Custody Manager determines that the custody arrangements with an Eligible Foreign Custodian it has selected are no longer appropriate, the Foreign Custody Manager shall notify the Board in accordance with Section 3.2.5 hereunder.