Security Breach Response Clause Samples

Security Breach Response. In the event CrowdStrike discovers a Security Breach, CrowdStrike shall: a. Without undue delay but no later than 72 hours of becoming aware, notify Customer of the discovery of the Security Breach. Such notice shall summarize the known circumstances of the Security Breach and the corrective action taken or to be taken by CrowdStrike. b. Conduct an investigation of the circumstances of the Security Breach. c. Use commercially reasonable efforts to remediate the Security Breach. d. Use commercially reasonable efforts to communicate and cooperate with Customer concerning its response to the Security Breach.
Security Breach Response. A. In the event of a breach of Section 5 [Sprint Provided Content Protection and Security] above with respect to Service Provider’s physical facilities or infrastructure, which breach affects any item of Content (a “Security Breach”), Service Provider agrees to notify Sprint of such Security Breach within twenty-four (24) hours of detection, if reasonably practicable, and follow such notification with a preliminary written assessment of the severity of the breach or failure within an additional forty-eight (48) hours, with proposed ways of redressing the problem(s) identified. For a Security Breach of any DRM Requirement involving any of the software and/or devices then in use by Users, Service Provider agrees to notify Sprint of the Security Breach within twenty-four (24) hours from the time Service Provider learns of the Security Breach, and follow such notification with a preliminary assessment of the severity of the Security Breach within an additional seventy-two (72) hours, with proposed ways of redressing the problem identified. Additionally, Sprint reserves the right, with written notice to Service Provider, to pull the Sprint Provided Content in whole or in part from Service Provider’s service within twenty-four (24) hours of Security Breach discovery. B. Service Provider shall promptly initiate action to correct each Security Breach, including but not limited to taking such steps as Service Provider may deem necessary by actions at law or otherwise to prevent and prosecute such Security Breach. C. Upon request by either party, the other party must supply to the other’s primary technical contact the name and contact information for such party’s primary person responsible for communicating, at any given time in a full twenty-four (24) hour, three hundred sixty-five (365) day schedule for the duration of the Term, regarding Security Breaches and the status of Service Provider’s response to them, including breaches in security at Service Provider’s facilities and known breaches related to content piracy in the consumer space. The primary technical of the other party’s contact person must be notified within 24 hours when there is a change in this contact information. Sprint/MobiTV Confidential Version Final 08/24/07 Page 49 of 60 * Certain information on this page has been omitted and filed separately with the Securities and Exchange Commission. Confidential treatment has been requested with respect to the omitted portions. * Certain information on th...
Security Breach Response. Upon becoming aware of a confirmed Security Breach, Campaign Monitor will notify Customer without undue delay after becoming aware of a confirmed Security Breach and will provide all assistance and information relating to the Security Breach as it becomes known or as is reasonably requested by Customer. Campaign Monitor will use reasonable endeavors to mitigate and, where possible, to remedy the effect of, any Security Breach in accordance with the Security Measures. Where required by applicable Data Protection Laws, Campaign Monitor shall document the Security Breach and the facts surrounding it, the effects and any remedial action taken.
Security Breach Response. Immediately upon becoming aware of a Security Breach of Moderate or High information, or of circumstances that could have resulted in unauthorized access to or disclosure or use of University Data, Supplier will notify University, fully investigate the incident. Supplier will cooperate fully with the University’s investigation of and response to the incident, including providing University or its agents, or both, with access (physical and logical) to Supplier’s related documents and facilities. Except as otherwise required by law, Supplier will not provide notice of the incident directly to individuals whose Personal Information was involved, regulatory agencies, or other entities, without University’s prior written permission.
Security Breach Response. Upon becoming aware of a Security Breach, Tines shall without undue delay, notify Customer (at the Customer-designated email address that Customer has provided via this link: ▇▇▇▇▇://▇▇.▇▇▇▇▇.▇▇/pages/legal-emails/) of the discovery of the confirmed Security Breach. Such notification shall include, to the extent known: (i) a description of the likely consequences of the Security Breach, (ii) measures to mitigate its possible adverse effects; (iii) types of information affected by the Security Breach; and (iv) date and time of the Security Breach. Where required , Tines shall provide reasonable assistance to Customer to the extent required for Customer to comply with its obligations under Applicable Data Protection Laws.
Security Breach Response. Client agrees and acknowledges that Company's notification of or response to a Security Breach will not be construed as an acknowledgment by Company of any fault or liability with respect to the Security Incident.
Security Breach Response. (a) Upon becoming aware of any unauthorized or accidental access to or use or disclosure of any In-Scope Personal Data which is in the Service Provider’s custody or control, or the Service Provider having reasonable belief that any such access, use or disclosure has occurred or is at risk of occurring (which shall include, without limitation, the loss of or the inability to locate definitively any media, device or equipment on which In-Scope Personal Data is or may be stored), the Service Provider shall: (i) notify ▇▇▇▇▇▇ without delay, and in any event within twenty-four (24) hours, providing reasonable detail of the impact on ▇▇▇▇▇▇ of the access, use or disclosure and the corrective action taken and to be taken by the Service Provider; (ii) subject to Clause 34.11, promptly take all necessary and appropriate corrective action to mitigate and to remedy the underlying causes of the access, use or disclosure; (iii) take any action pertaining to the access, use or disclosure required by Applicable Law including, without limitation, at the request of ▇▇▇▇▇▇, providing notices to data subjects whose Personal Data may have been affected, whether or not such notice is required by Applicable Law; and (iv) if the access, use or disclosure would permit access to a data subject’s financial information or lead to a reasonable risk of identity theft or fraud, the Service Provider shall provide, for a reasonable period of time of not less than one (1) year, credit monitoring services for any such data subjects. (b) Except where the Service Provider is not responsible for the actions of the applicable Third Party as set out in Clause 24.7, the Service Provider shall be responsible for all of the following costs and expenses resulting from any unauthorized or accidental access to or use or disclosure of any In-Scope Personal Data which is in the Service Provider’s custody or control, regardless of whether such costs and expenses are incurred by or on behalf of the Service Provider or by or on behalf of ▇▇▇▇▇▇: (i) the cost of providing notice of the event to affected individuals; (ii) the cost of providing required notice to government agencies, credit bureaus, media and/or other required entities; (iii) the cost of providing individuals affected by the event with credit monitoring (including identity theft insurance) and credit protection services designed to prevent fraud associated with identity theft crimes for a specific period not to exceed twelve (12) months, exc...
Security Breach Response. Funraisin will notify Customer, without due delay and in any event no later than 48 hours after becoming aware, of any Security Breach and will provide all assistance and information reasonably requested by Customer. Funraisin shall document the Security Breach and the facts surrounding it, the effects and any remedial action taken. Funraisin will use reasonable endeavors to mitigate and, where possible, to remedy the effect of, any Security Breach in accordance with the Security Measures.
Security Breach Response. Manager shall document responsive actions taken in connection with any incident involving a breach of security, and mandatory post-incident review of events and actions taken, if any, to make changes in business practices relating to protection of Owner Data.
Security Breach Response