Security Breach Procedures Sample Clauses

POPULAR SAMPLE Copied 3 times
Security Breach Procedures. 4.1 Supplier shall notify Buyer as soon as practicable, and in any event within 24 hours, after Supplier becomes aware of any Security Incident or Security Breach. 4.2 Supplier shall, at its sole cost and expense, use best efforts to immediately remedy any Security Incident or Security Breach and prevent any further Security Incident or Security Breach. 4.3 Supplier shall, at its sole cost and expense: (a) promptly preserve all relevant records, logs, files, data reporting, and other materials relevant to any Security Incident or Security Breach, and shall provide the same to Buyer upon request; and (b) diligently investigate any Security Incident or Security Breach and shall fully cooperate with Buyer in its own investigation of and response to any such Security Incident or Security Breach. 4.4 If a Security Incident or Security Breach arises, in whole or in part, from an act or omission of Supplier, Supplier shall reimburse Buyer for all reasonable costs incurred by Buyer in responding to, and mitigating damages caused by, any such Security Incident or Security Breach, including, without limitation, all costs of notice and credit monitoring and identity theft protection services. 4.5 Unless otherwise required by law, Supplier agrees that it shall not inform any third party of any Security Incident or Security Breach without first obtaining Buyer’s prior written consent, other than to inform a complainant that the matter has been forwarded to ▇▇▇▇▇’s legal counsel. Further, Supplier agrees not to include ▇▇▇▇▇’s name, logo, or any other identifiable information about Buyer or its affiliates in any notice or public statement concerning any Security Incident or Security Breach without Buyer’s prior written approval.
Security Breach Procedures. For purposes of this section, the term
Security Breach Procedures. For purposes of this section, the term “Security Breach” shall mean (i) any act or omission that materially compromises either the security, confidentiality or integrity of personal information or the physical, technical, administrative or organizational safeguards put in place by Custodian (or any authorized persons) that relate to the protection of the security, confidentiality or integrity of personal information, or (ii) receipt of a complaint in relation to the privacy practices of Custodian (or any authorized persons) or a breach or alleged breach of this Agreement relating to such privacy practices. Custodian shall: (i) notify a Trust of a Security Breach as soon as practicable, but no later than twenty-four (24) hours after Custodian becomes aware of it; and (ii) notify a Trust of any Security Breaches by and with a copy by e-mail to Custodian’s primary business contact within the Trust. Immediately following Custodian’s notification to a Trust of a Security Breach, the parties shall coordinate with each other to investigate the Security Breach. Custodian agrees to cooperate with the Trust in the Trust’s handling of the matter, including, without limitation: (i) assisting with any investigation; (ii) providing the Trust with physical access to the facilities and operations affected; (iii) facilitating interviews with Custodian’s employees and others involved in the matter; and (iv) making available all relevant records, logs, files, data reporting and other materials required to comply with applicable law, regulation, industry standards or as otherwise reasonably required by the Trust. Custodian shall immediately remedy any Security Breach and prevent any further Security Breach at Custodian’s expense in accordance with applicable privacy rights, laws, regulations and standards. Custodian shall reimburse the Trust for actual costs incurred by the Trust in responding to, and mitigating damages caused by, any Security Breach, including all costs of notice and/or remediation pursuant to this paragraph.
Security Breach Procedures. (A) Immediately upon the Consultant’s awareness or reasonable belief of a Security Breach, the Consultant shall (i) notify the Manager of the Security Breach, such notice to be given first by telephone at the following telephone number, followed promptly by email at the following email address: (▇▇▇) ▇▇▇-▇▇▇▇ / SJVIA- ▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ (which telephone number and email address the SJVIA may update by providing notice to the Consultant), and (ii) preserve all relevant evidence (and cause any affected Authorized Person to preserve all relevant evidence) relating to the Security Breach. The notification shall include, to the extent reasonably possible, the identification of each type and the extent of Personal Information that has been, or is reasonably believed to have been, breached, including but not limited to, compromised, or subjected to unauthorized Use, Disclosure, or modification, or any loss or destruction, corruption, or damage. (B) Immediately following the Consultant’s notification to the SJVIA of a Security Breach, as provided pursuant to section 10.4(A) of this agreement, the parties shall coordinate with each other to investigate the Security Breach. The Consultant agrees to fully cooperate with the SJVIA, including, without limitation: (1) assisting the SJVIA in conducting any investigation; (2) providing the SJVIA with physical access to the facilities and operations affected; (3) facilitating interviews with Authorized Persons and any of the Consultant’s other employees knowledgeable of the matter; and (4) making available all relevant records, logs, files, data reporting and other materials required to comply with applicable law, regulation, industry standards, or as otherwise reasonably required by the SJVIA. To that end, the Consultant shall, with respect to a Security Breach, be solely responsible, at its cost, for all notifications required by law and regulation, or deemed reasonably necessary by the SJVIA, and the Consultant shall provide a written report of the investigation and reporting required to the Manager within 30 days after the Consultant’s discovery of the Security Breach. (C) The SJVIA shall promptly notify the Consultant of the Manager’s knowledge, or reasonable belief, of any Privacy Practices Complaint, and upon the Consultant’s receipt of notification thereof, the Consultant shall promptly address such Privacy Practices Complaint, including taking any corrective action under this Article 10, all at the Consultan...
Security Breach Procedures. For purposes of this Contract, “
Security Breach Procedures. (1) Promptly, and without undue delay, upon the Contractor’s confirmation of a Security Breach, the Contractor shall (a) notify the Director of the Security Breach, such notice to be given first by telephone at the following telephone number, followed promptly by email at the following email address: (▇▇▇) ▇▇▇-▇▇▇▇ / ▇▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ (which telephone number and email address the County may update by providing notice to the Contractor), and (b) preserve all relevant evidence (and cause any affected Authorized Person to preserve all relevant evidence) relating to the Security Breach. The notification shall include, to the extent reasonably possible, the identification of each type and the extent of Personal Information that has been, or is reasonably believed to have been, breached, including but not limited to, compromised, or subjected to unauthorized Use, Disclosure, or modification, or any loss or destruction, corruption, or damage. (2) Immediately following the Contractor’s notification to the County of a Security Breach, as provided pursuant to subsection D.(1) of this Exhibit E, the Parties shall coordinate with each other to investigate the Security Breach. The Contractor agrees to fully cooperate with the County, including, without limitation: (i) assisting the County in conducting any investigation; (ii) providing the County with physical access to the facilities and operations affected; (iii) facilitating interviews with Authorized Persons and any of the Contractor’s other employees knowledgeable of the matter; and (iv) making available all relevant records, logs, files, data reporting and other materials required to comply with applicable law, regulation, industry standards, or as otherwise reasonably required by the County. To that end, the Contractor shall, with respect to a Security Breach, be solely responsible, at its cost, for all notifications required by law and regulation, and the Contractor shall provide a written report of the investigation and reporting required to the Director within thirty (30) days after the Contractor’s discovery of the Security Breach. (3) The County shall promptly notify the Contractor of the Director’s knowledge, or reasonable belief, of any Privacy Practices Complaint, and upon the Contractor’s receipt of notification thereof, the Contractor shall promptly address such Privacy Practices Complaint, including taking any corrective action under this Exhibit E, all at the Contractor’s sole expense, in ...
Security Breach Procedures. In the event either party determines that there has been an unauthorized or improper disclosure of the information exchanged under this MSA, such party must promptly notify the other party, unless legally prohibited from doing so or specifically directed by law enforcement not to do so, within seventy two hours (or any shorter period as may be required by Law) after such party becomes aware of it. Such notification will include the nature of the incident, the other party's information that was compromised, and the action taken or to be taken. Additionally, each party will reasonably assist the other party in remediating and mitigating any potential damage. Each party shall bear the costs of such remediation or mitigation to the extent the breach or security incident was caused by its acts or omissions. If the Institution learns or has reason to believe that unauthorized access to a password protected area of the Clearinghouse website has occurred or is about to occur, the Institution shall notify the Clearinghouse promptly, and without unreasonable delay, and the Clearinghouse may suspend Institution’s access until the threat has been contained.
Security Breach Procedures a. Provider shall: i. provide Smart Start with the name and contact information for one or more employees of Provider who shall serve as Smart Start’s primary security contact and shall be available to assist Smart Start twenty-four
Security Breach Procedures. Galvanize maintains an Incident Response Plan managed by its Security Incident Response Team (SIRT). Galvanize will notify Customer without undue delay if Galvanize determines that the security of the Cloud Products’ systems has been breached and this results in Customer Data being accessed by or disclosed to an individual or entity who is not authorized to access or receive such information. Notice will include a brief description of the incident, including the nature of the breach, the date it occurred and, if known, the general type(s) of data involved. Galvanize will report to Customer on the corrective action being taken and will cooperate with Customer to mitigate the effects of any lost or compromised Customer Data. Galvanize will conduct a root cause analysis to determine the cause of the incident and to ensure corrective actions are focused on the true root cause of the incident. Customer will implement any corrective measures required by Galvanize.
Security Breach Procedures a) Each Party shall: i) provide the other Party with the name and contact information for one or more of the Party’s employees/security operations or other service desk who/which shall serve as the other Party’s primary security contact and shall be available to assist the other Party twenty- four (24) hours per day, seven (7) days per week as a contact in resolving obligations associated with a Security Breach; ii) notify the other Party of a Security Breach as soon as practicable, but no later than twenty- four (24) hours after the Party becomes aware of it; and iii) notify the other Party of any Security Breaches by emailing the other Party at an address provided by the other Party, with a copy by email to the Party’s primary business contact within the other Party. b) Immediately following notification of a Security Breach, the Parties shall coordinate with each other to investigate the Security Breach. The Parties agree to fully cooperate with each other in the handling of the matter, including, without limitation: (i) assisting with any investigation; (ii) providing physical access to the facilities and operations affected; (iii) facilitating interviews with employees and others involved in the matter; and (iv) making available all relevant records, logs, files, data reporting, and other materials required to comply with applicable law, regulation, industry standards, or as otherwise reasonably required by the other Party. c) The Party responsible for the Security Breach shall (i) at its own expense use best efforts to immediately contain and remedy any Security Breach and prevent any further Security Breach, including, but not limited to taking any and all action necessary to comply with applicable privacy rights, laws, regulations, and standards, and (ii) reimburse the other Party for all actual reasonable costs incurred by the other Party in responding to, and mitigating damages caused by, any Security Breach, including all costs of notice and/or remediation pursuant to Section 4(d). d) Each Party agrees that it shall not inform any third party of a Security Breach without first obtaining the other Party’s prior written consent, other than to inform a complainant that the matter has been forwarded to the Party’s legal counsel. Further, the Receiving Party agrees that the Disclosing Party shall have the sole right to determine: (i) whether notice of the Security Breach is to be provided to any individuals, regulators, law enforcement agencies, cons...