Notification of Electronic Breach or Improper Disclosure Clause Samples

The Notification of Electronic Breach or Improper Disclosure clause requires a party to promptly inform the other party if there is a breach of electronic systems or an unauthorized disclosure of sensitive information. Typically, this clause outlines the timeframe for notification, the method of communication, and the types of incidents that must be reported, such as data leaks or hacking events. Its core function is to ensure transparency and enable swift action to mitigate potential harm, thereby protecting both parties from the risks associated with data breaches.
Notification of Electronic Breach or Improper Disclosure. During the term of this Agreement, Contractor shall notify County immediately upon discovery of any breach of PII or data, where the information or data are reasonably believed to have been acquired by an unauthorized person. Immediate notification shall be made to County Privacy Officer, within two business days of discovery, at (▇▇▇) ▇▇▇-▇▇▇▇. Contractor shall take prompt corrective action to cure any deficiencies and any action pertaining to such unauthorized disclosure required by applicable Federal and State laws and regulations. Contractor shall investigate such breach and provide a written report of the investigation to County Privacy Officer, postmarked within thirty (30) working days of the discovery of the breach.
Notification of Electronic Breach or Improper Disclosure. During the term of this Agreement, the County shall notify the State immediately upon discovery of any breach of Medi-Cal related and/or data, where the information data is reasonably believed to have been acquired by an unauthorized person. Immediate notification shall be made to the State Information Security Officer, within two business days of discovery, at (▇▇▇) ▇▇▇-▇▇▇▇. County shall take prompt corrective action to cure any deficiencies and any action pertaining to such unauthorized disclosure required by applicable Federal and State laws and regulations. County shall investigate such breach and provide a written report of the investigation to the State Information Security Officer, postmarked within thirty (30) working days of the discovery of the breach to the address below: Information Security Officer Office of HIPAA Compliance California Department of Mental Health 9th Street, Room Sacramento, CA 95814 Employee Training and Discipline. To train and use reasonable measures to ensure compliance the requirements of this Agreement by employees who assist in the performance of functions or activities under this Agreement and use or disclose IIHI; and discipline such employees who intentionally violate any provisions of this Agreement, including by termination of employment. ▇. ▇▇▇▇▇▇, Inspection and Enforcement. From time to time, Subcontractor may inspect the facilities, systems, books and records of the County to monitor compliance with this Agreement. The County shall promptly remedy any violation of any provision of this Agreement and shall certify the same to the Subcontractor Information Security Officer in writing The fact that Subcontractor inspects, or fails to inspect, or has the right to inspect, the County’s facilities, systems and procedures does not relieve the County of its responsibilities to comply with this Agreement. The State’s failure to detect or detection, but failure to notify the County or require the County’s remediation of any unsatisfactory practice, does not constitute acceptance of such practices or a waiver of the State’s enforcement rights under this Agreement.
Notification of Electronic Breach or Improper Disclosure. During the term of this Agreement, the County shall notify the State immediately upon discovery of any breach of Medi-Cal related and/or data, where the information and/or data is reasonably believed to have been acquired by an unauthorized person. Immediate notification shall be made to the State Information Security Officer, within two business days of discovery, at (▇▇▇) ▇▇▇-▇▇▇▇. County shall take prompt corrective action to cure any deficiencies and any action pertaining to such unauthorized disclosure required by applicable Federal and State laws and regulations. County shall investigate such breach and provide a written report of the investigation to the State Information Security Officer, postmarked within thirty (30) working days of the discovery of the breach to the address below: Information Security cer Office of HIPAA Compliance California Department of Mental Health 9th Street, Room Sacramento, CA 95814
Notification of Electronic Breach or Improper Disclosure. During the term of this ISA, Service Provider shall notify CCHCS within 24 hours upon discovery of any probable breach of sensitive or confidential information where (1) the information is reasonably believed to have been acquired by an unauthorized person and/or (2) reasonably believed to have an effect of more than 499 people/identities. Immediate notification shall be made to the CCHCS Chief Information Security Officer, Information Security Officer and/or their designee(s). Service Provider shall take prompt corrective action to cure any deficiencies and any action pertaining to such unauthorized disclosure required by applicable Federal and State laws and regulations while at the same time preserving evidence for investigation. Service Provider shall investigate such breach and provide a written report of the investigation to the CCHCS Information Security Officer, postmarked or emailed within eight (8) business days of the discovery of the breach. SAMPLE
Notification of Electronic Breach or Improper Disclosure. During the term of this Agreement, Contractor shall notify County immediately upon discovery of any breach of IIHI and/or data, where the information and/or data is reasonably believed to have been acquired by an unauthorized person. Immediate notification shall be made to the County BHRS Privacy Officer, within five (5) business days of discovery. Contractor shall take prompt corrective action to cure any deficiencies and any action pertaining to such unauthorized disclosure required by applicable Federal and State laws and regulations. Contractor shall investigate such breach and provide a written report of the results of the investigation, including any corrective actions taken, and copies of all Notifications made as a result of the breach, to the BHRS Officer, postmarked within thirty (30) calendar days of the discovery of the breach to the address below: MCHHSA Compliance Officer Behavioral Health and Recovery Services

Related to Notification of Electronic Breach or Improper Disclosure

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Destruction of Confidential Information Upon the Disclosing Party’s written request, at any time during or after the term of this Agreement, the Recipient and its Representatives shall promptly return all copies, in any form or media, of the Disclosing Party’s Confidential Information, or destroy such copies and certify in writing that the Confidential Information has been destroyed. Additionally, the Recipient shall destroy all copies of any Notes created by the Recipient or its Representatives and certify that such Notes have been destroyed. However, the following exceptions apply: The Recipient and its Representatives are not required to destroy electronic copies of Confidential Information created as part of standard backup and archival processes, provided that: personnel not primarily involved in information technology do not have access to such retained copies; and information technology personnel only access such copies as necessary to perform regular IT functions (e.g., system recovery). The Recipient and its Representatives may retain: one copy of the Confidential Information as necessary to defend or maintain any litigation related to this Agreement or the Confidential Information, or to comply with established document retention policies; and copies of the Confidential Information as required by applicable law, regulation, or rule, or as necessary to comply with any request or requirement of a legal, regulatory, governmental, or supervisory authority, provided that the Recipient and its Representatives remain bound by the terms of this Agreement concerning any retained Confidential Information.

  • Contractor Designation of Trade Secrets or Otherwise Confidential Information If the Contractor considers any portion of materials to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to Contract-related materials it has designated trade secret or otherwise confidential.

  • Breach by Authorized User An Authorized User’s breach shall not be deemed a breach of the Centralized Contract; rather, it shall be deemed a breach of the Authorized User’s performance under the terms and conditions of the Centralized Contract.