Notification of Unauthorized Access Clause Samples

The Notification of Unauthorized Access clause requires a party to promptly inform the other party if there is any unauthorized access to data or systems covered by the agreement. Typically, this clause outlines the timeframe for notification, the information that must be included in the notice, and the method of communication. Its core function is to ensure that all parties are made aware of potential security breaches quickly, enabling them to take appropriate action to mitigate risks and comply with legal or regulatory obligations.
POPULAR SAMPLE Copied 13 times
Notification of Unauthorized Access. If the Subscriber becomes aware of a security risk or other vulnerability in which data may be accessed by an unauthorized third party, regardless of whether the data belongs to the Subscriber’s SORACOM Account, the Subscriber will notify us as promptly as reasonably possible but in no event later than within forty-eight (48) hours from the time the Subscriber is first made aware of such vulnerability.
Notification of Unauthorized Access. School District shall notify Vendor promptly of any known unauthorized access to the Student Data. School District will assist Vendor in any efforts by Vendor to investigate and respond to any unauthorized access.
Notification of Unauthorized Access. Each Party agrees to notify the other Party as soon as practicable after the discovery of any unauthorized use or disclosure of PII and/or school student records. To the greatest extent possible, the notification shall include information concerning: the PII and/or school student records used or disclosed without authorization; the nature of the unauthorized use or disclosure; the identity of the individual or entity to which any unauthorized disclosure was made; any mitigation efforts by the Party to remedy the unauthorized use or disclosure; and other relevant information as reasonably requested by the other Party.
Notification of Unauthorized Access. The Receiving Party shall (i) promptly notify the Disclosing Party upon its becoming aware of any unauthorized possession, use, or knowledge of any Confidential Information by any person, any attempt by any person to gain possession of Confidential Information without authorization, or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, “Unauthorized Access”) and (ii) cooperate with the Disclosing Party, and accept and implement the Disclosing Party’s reasonable recommendations, in any investigation, litigation and prevention of reoccurrences of any Unauthorized Access.
Notification of Unauthorized Access. You agree to and shall notify us immediately if you become aware of any suspicious or unauthorized conduct concerning your Account, TBT Bank Account(s), other third-party bank accounts, usernames, logins, passwords, or security questions and answers, and the like, including your personally-identifiable, non-public personal information and sensitive information (collectively, your “Private Information”). .
Notification of Unauthorized Access. To the extent Evolent knows, or reasonably suspects, that Source Code or trade secrets provided by UPMC to Evolent as part of the Licensed IP hereunder have been subject to unauthorized access or possession, or an attempt at unauthorized access or possession, Evolent shall immediately notify UPMC and use commercially reasonable efforts to cooperate with UPMC in securing such materials and/or obtaining the return of such materials from third parties. To the extent UPMC knows, or reasonably suspects, that Source Code or trade secrets provided by Evolent to UPMC as part of the Evolent Improvements licensed hereunder have been subject to unauthorized access or possession, or an attempt at unauthorized access or possession, UPMC shall immediately notify Evolent and use commercially reasonable efforts to cooperate with Evolent in securing such materials and/or obtaining the return of such materials from third parties.
Notification of Unauthorized Access. Each Party will promptly notify the other upon learning of unauthorized access to or use of Customer’s Data, unless such notification is prohibited by Law. If applicable Laws require notice to public authorities or individuals about an incident, Customer shall give such required notices (with Company’s cooperation) at Customer’s expense, except to the extent that: (a) Customer can demonstrate that the incident occurred because of Company’s failure to perform its express obligations under the Agreement; and (b) Company approves arrangements for notice and related remedial measures, if any.
Notification of Unauthorized Access. The MAP shall, as soon as reasonably practicable, notify the Distribution Company of any unauthorized access or tampering of the meter and/or other accessories of which it is or becomes aware, including any material breach or potential material breach of security on a system or network which contains, processes or transmits Confidential Information.
Notification of Unauthorized Access. Each Party shall, as soon as reasonably practicable, notify the other Party of any unauthorized possession, disclosure, use or knowledge, or attempt thereof, of the other Party’s Confidential Information of which it is or becomes aware, including any material breach or potential material breach of security on a system or network which contains, processes or transmits Confidential Information.

Related to Notification of Unauthorized Access

  • Unauthorized Access Notification ▇▇▇ shall notify Provider promptly of any known unauthorized access. ▇▇▇ will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. §§ 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.

  • Notification of ▇▇▇▇▇▇ and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release. (b) Vendor will provide such notification to the District by contacting ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇, Director for Data Privacy & Professional Learning directly by email at ▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇.▇▇▇ or by calling ▇▇▇-▇▇▇-▇▇▇▇. (c) Vendor will cooperate with the District and provide as much information as possible directly to ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇ or his/her designee about the incident, including but not limited to: a description of the incident, the date of the incident, the date Vendor discovered or was informed of the incident, a description of the types of Protected Data involved, an estimate of the number of records affected, the schools within the District affected, what the Vendor has done or plans to do to investigate the incident, stop the breach and mitigate any further unauthorized access or release of Protected Data, and contact information for Vendor representatives who can assist affected individuals that may have additional questions. (d) Vendor acknowledges that upon initial notification from Vendor, the District, as the educational agency with which Vendor contracts, has an obligation under Section 2-d to in turn notify the Chief Privacy Officer in the New York State Education Department (“CPO”). Vendor agrees not to provide this notification to the CPO directly unless requested by the District or otherwise required by law. In the event the CPO contacts Vendor directly or requests more information from Vendor regarding the incident after having been initially informed of the incident by the District, Vendor will promptly inform ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇ or his/her designee.