Security Breach and Response Sample Clauses

The Security Breach and Response clause outlines the obligations and procedures that must be followed in the event of a data or information security breach. Typically, this clause requires the party experiencing the breach to promptly notify the other party, investigate the incident, and take corrective actions to mitigate any harm. For example, it may specify timelines for notification, detail the type of information that must be provided, and require cooperation with investigations. Its core practical function is to ensure a coordinated and timely response to security incidents, thereby minimizing potential damage and maintaining trust between the parties.
Security Breach and Response. 8.1 Supplier shall promptly notify VWGoA without undue delay and no later than 24 hours upon Supplier becoming aware of an actual or potential Security Breach. Supplier should notify VWGoA by telephone to Supplier’s primary business contact and via email at both ▇▇▇▇▇▇▇@▇▇.▇▇▇ and ▇▇▇▇▇▇▇▇▇▇▇▇▇@▇▇.▇▇▇ if it has knowledge that there is, or reasonably believes that there has been, an actual or potential Security Breach. Notice must include the following: • the nature of the Security Breach, • the categories and numbers of data subjects concerned, and the categories and numbers of records concerned; • the name and contact details of the Supplier contact from whom more information may be obtained; • describe the likely consequences of the Security Breach; and • describe the measures taken or proposed to be taken to address the Security Breach. • Other information as VWGoA may reasonably request 8.2 Supplier shall (i) cooperate with VWGoA in the manner reasonably requested by VWGoA and in accordance with law to investigate and resolve the Security Breach, and mitigate any harmful effects of the Security Breach; (ii) promptly implement any necessary remedial measures to ensure the protection of VWGoA Data or VWGoA Systems; and (iii) properly document responsive actions taken related to any Security Breach, including, without limitation, post-incident review of events and actions taken to make changes in business practices to ensure the protection of VWGoA Data or VWGoA Systems. 8.3 Except as required by Applicable Law or regulation, Supplier agrees that: (i) it shall not inform any third party of any Security Breach without first obtaining VWGoA' prior written consent, other than to inform a complainant that VWGoA shall be/has been informed of the Security Breach; and (ii) VWGoA shall have the right, but not the obligation, to determine whether notice of the Security Breach is to be provided to any individuals, authorities, regulators, law enforcement agencies, consumer reporting agencies, or others and the contents of any such notice. 8.4 If the Security Breach was a result of Supplier's or Authorized Persons’ negligence or breach of the requirements of this DPSA, Supplier shall bear all costs associated with (i) any investigations and resolution of the Security Breach, including, but not limited to, internal investigations as well as investigations by regulators or other authorities; (ii) notifications to individuals, authorities, regulators, or others; (iii) ...
Security Breach and Response 

Related to Security Breach and Response

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request.

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include: a. A list of the students whose Student Data was involved in or is reasonably believed to have been involved in the breach, if known; and b. The name and contact information for an employee of the Provider whom parents may contact to inquire about the breach.

  • Timely and Sustained Response Interconnection Customer shall ensure that the Small Generating Facility’s real power response to sustained frequency deviations outside of the deadband setting is automatically provided and shall begin immediately after frequency deviates outside of the deadband, and to the extent the Small Generating Facility has operating capability in the direction needed to correct the frequency deviation. Interconnection Customer shall not block or otherwise inhibit the ability of the governor or equivalent controls to respond and shall ensure that the response is not inhibited, except under certain operational constraints including, but not limited to, ambient temperature limitations, physical energy limitations, outages of mechanical equipment, or regulatory requirements. The Small Generating Facility shall sustain the real power response at least until system frequency returns to a value within the deadband setting of the governor or equivalent controls. An Applicable Reliability Standard with equivalent or more stringent requirements shall supersede the above requirements.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.