Response to Unauthorized Access Clause Samples

The Response to Unauthorized Access clause outlines the procedures and responsibilities that parties must follow if there is a breach or unauthorized access to protected data or systems. Typically, this clause requires the affected party to promptly notify the other party, investigate the incident, and take remedial actions such as securing compromised systems or informing impacted individuals. Its core function is to ensure a coordinated and timely response to security incidents, thereby minimizing potential harm and fulfilling legal or contractual obligations related to data protection.
Response to Unauthorized Access. ▇▇▇▇▇▇▇▇ will notify Provider within twenty four (24) hours after it becomes aware of any actual or potential breach in security resulting in an unauthorized access to Cardholder Information. Merchant will provide any assistance that Provider, Card Issuer, regulators, governmental authority or any Card Network deems necessary to contain and control the incident to prevent further unauthorized access to or use of Cardholder Information. Such assistance may include, but not be limited to, preserving records and other evidence and compiling information to enable Provider and the issuing bank(s) or the Card Network to investigate the incident and provide assistance and cooperation to: (a) file suspicious activity reports (as applicable); (b) notify their regulators (as applicable); and (c) notify the affected Cardholder (as required). Unless the unauthorized access was due to Provider’s acts or omissions, Merchant will bear the cost of notifying affected Cardholder.
Response to Unauthorized Access. Merchant will immediately notify Peoples Trust of its knowledge or suspicion of any breach in security resulting in unauthorized access to Cardholder Information. Merchant will, provide any assistance that Peoples Trust, the issuing bank of any Cardholder, and their regulators and the Card Associations deem necessary to contain and control the incident to prevent further unauthorized access to or use of Cardholder Information. Such assistance may include, but not be limited to, preserving records and other evidence, compiling information to enable Peoples Trust and the issuing bank or the Card Associations to investigate the incident and providing assistance and cooperation to facilitate the ability of the issuing bank to: (a) file suspicious activity reports (as applicable); (b) notify their regulators (as applicable); and (c) notify the affected Cardholder (as required). Unless the unauthorized access was due to Peoples Trust’s acts or omissions, Merchant will bear all costs associated therewith, including but not limited to the cost of notifying the affected Cardholder(s).
Response to Unauthorized Access. Merchant will notify Provider within twenty-four (24) hours after it becomes aware of any actual or potential breach in security resulting in an unauthorized access to Cardholder Information. Merchant will provide any assistance that Provider, Card Issuer, regulators, governmental authority, or any Card Network deems necessary to contain and control the incident to prevent further unauthorized access to or use of Cardholder Information. Such assistance may include, but not be limited to, preserving records and other evidence, and compiling information to enable Provider and the issuing bank(s) or the Card Network to investigate the incident, and providing assistance and cooperation to: (a) file suspicious activity reports (as applicable); (b) notify their regulators (as applicable); and (c) notify the affected Cardholder (as required). Unless the unauthorized access was due to Provider’s acts or omissions, Merchant will bear the cost of notifying affected Cardholder. Without limiting Provider’s remedies in this Agreement, Merchant shall indemnify, defend, and hold Provider harmless for any claims, losses, injuries, damages, or causes of action arising out of or relating to Merchant’s failure to prevent unauthorized access to any Cardholder Information.
Response to Unauthorized Access. Merchant will notify MAS within 24 hours after it knows, or has reason to know, of any breach in security resulting in an unauthorized access to Cardholder Information. Merchant will provide any assistance that MAS, the issuing bank of any Cardholder, and their regulators and the Card Associations deem necessary to contain and control the incident to prevent further unauthorized access to or use of Cardholder Information. Such assistance may include, but not be limited to, preserving records and other evidence and compiling information to enable MAS and the issuing bank(s) or the Card Associations to investigate the incident and provide assistance and cooperation to: (i) file suspicious activity reports (as applicable); (ii) notify their regulators (as applicable); and (iii) notify the affected Cardholder (as required). Unless the unauthorized access was due to MAS’ acts or omissions, Merchant will bear the cost of notifying the affected Cardholder.
Response to Unauthorized Access. Merchant will immediately notify Paysafe of its knowledge or suspicion of any breach in security resulting in unauthorized access to Cardholder Information. Merchant will, provide any assistance that Paysafe, the issuing bank of any Cardholder, and their regulators and the Card Associations deem necessary to contain and control the incident to prevent further unauthorized access to or use of Cardholder Information. Such assistance may include, but not be limited to, preserving records and other evidence, compiling information to enable Paysafe and the issuing bank or the Card Associations to investigate the incident and providing assistance and cooperation to facilitate the ability of the issuing bank to: (a) file suspicious activity reports (as applicable); (b) notify their regulators (as applicable); and
Response to Unauthorized Access. The Parties agree to notify the other Party immediately after knowledge of any breach in security resulting in an unauthorized access to Cardholder Information. The Parties agree to provide any assistance that Client, RBS ▇▇▇▇, Bank, and their regulators and the Card Associations deem necessary to contain and control the incident to prevent further unauthorized access to or use of Cardholder Information. Such assistance shall include, but not be limited to, preserving records and other evidence and compiling information to enable the Parties to assist Bank, regulatory authorities and/or the Card Associations to investigate the incident and provide assistance and cooperation (i) to file Suspicious Activity Reports (as applicable); (ii) notify their regulators (as applicable); and (iii) notify the affected Customers (as required). Unless such unauthorized access was due to the acts or omissions of RBS ▇▇▇▇ or Bank, along with its data security programs, systems and software, Client shall bear the cost of providing notices to the affected Cardholders and any related investigation costs. Programs may be temporarily suspended (and may be terminated) in the event RBS ▇▇▇▇ or Bank determine that Client’s system is insecure or that Client is not in compliance with this Section 14.
Response to Unauthorized Access. You will immediately notify Us of any knowledge or suspicion of any breach in security resulting in unauthorized access to Cardholder Information. You will provide any assistance that We, Amex, the issuing bank of any Cardholder, and their regulators deem necessary to contain and control the incident to prevent further unauthorized access to or use of Cardholder Information. Such assistance may include, but not be limited to, preserving records and other evidence, compiling information to enable Us, Amex and the issuing bank to investigate the incident and providing assistance and cooperation to facilitate the ability of the issuing bank to: (i) file suspicious activity reports (as applicable); (ii) notify their regulators (as applicable); and (iii) notify the affected Cardholder (as required). Unless the unauthorized access was due to Us or Amex’s acts or omissions, You will bear all costs associated therewith, including but not limited to the cost of notifying the affected Cardholder(s).

Related to Response to Unauthorized Access

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Access Notification ▇▇▇ shall notify Provider promptly of any known unauthorized access. ▇▇▇ will assist Provider in any efforts by Provider to investigate and respond to any unauthorized access.

  • Authorized Access Transfer Agent shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Notification of ▇▇▇▇▇▇ and Unauthorized Release (a) Vendor will promptly notify the District of any breach or unauthorized release of Protected Data it has received from the District in the most expedient way possible and without unreasonable delay, but no more than seven (7) calendar days after Vendor has discovered or been informed of the breach or unauthorized release. (b) Vendor will provide such notification to the District by contacting ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇, Director for Data Privacy & Professional Learning directly by email at ▇▇▇▇▇▇▇▇▇▇-▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇.▇▇▇ or by calling ▇▇▇-▇▇▇-▇▇▇▇. (c) Vendor will cooperate with the District and provide as much information as possible directly to ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇ or his/her designee about the incident, including but not limited to: a description of the incident, the date of the incident, the date Vendor discovered or was informed of the incident, a description of the types of Protected Data involved, an estimate of the number of records affected, the schools within the District affected, what the Vendor has done or plans to do to investigate the incident, stop the breach and mitigate any further unauthorized access or release of Protected Data, and contact information for Vendor representatives who can assist affected individuals that may have additional questions. (d) Vendor acknowledges that upon initial notification from Vendor, the District, as the educational agency with which Vendor contracts, has an obligation under Section 2-d to in turn notify the Chief Privacy Officer in the New York State Education Department (“CPO”). Vendor agrees not to provide this notification to the CPO directly unless requested by the District or otherwise required by law. In the event the CPO contacts Vendor directly or requests more information from Vendor regarding the incident after having been initially informed of the incident by the District, Vendor will promptly inform ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇ or his/her designee.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. §§ 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.