Security Breach Response Actions Clause Samples

Security Breach Response Actions. In the event of a Security Breach, Service Provider shall: (a) immediately conduct a reasonable investigation of the reasons for and circumstances of such Security Breach; (b) use reasonable efforts and take all necessary actions to prevent, contain, and mitigate the impact of, such Security Breach, and remediate such Security Breach, without delay; (c) provide notice to Customer using the contact information identified in subsection 4.4 immediately, and in any event within twelve (12) hours after the Service Provider discovered such Security Breach; (d) promptly, and in no event more than two (2) business days after the date Service Provider discovered a Security Breach, provide a written report to Customer providing all relevant details concerning such Security Breach; (e) collect and preserve all evidence concerning the discovery, cause, vulnerability, remedial actions and impact related to such Security Breach, which shall meet reasonable expectations of forensic admissibility; (f) document the incident response and remedial actions taken in detail, which shall meet reasonable expectations of forensic admissibility; (g) if requested by Customer, provide notice to individuals or entities whose Information was affected by the Security Breach, or may have reasonably been exposed or put at risk of exposure, Regulators, public authorities and the media, in a manner and format specified by Customer; and (h) keep the fact and details of the Security Breach confidential, to the extent possible, during the investigation and remediation of the Security Breach and limit communications about the Security Breach to those necessary to fulfill the requirements of subsections 4.1 (a) to (g) above.
Security Breach Response Actions. In the event of a Security Breach, Agency shall: (a) immediately conduct a reasonable investigation of the reasons for and circumstances of such Security Breach; (b) use best efforts and take all necessary actions to prevent, contain, and mitigate the impact of, such Security Breach; (c) provide notice to AIG using the contact information identified in subsection 4.4 immediately and in any event within twelve (12) hours after the Agency discovered such Security Breach; (d) promptly, and in no event more than two (2) business days after the date Agency discovered a Security Breach, provide a written report to AIG providing all relevant details concerning such Security Breach; (e) collect and preserve all evidence concerning the discovery, cause, vulnerability, remedial actions and impact related to such Security Breach, which shall meet reasonable expectations of forensic admissibility; (f) document the incident response and remedial actions taken in detail, which shall meet reasonable expectations of forensic admissibility; and (i) if requested by AIG, provide notice to individuals or entities whose Information was or may have reasonably been exposed in a manner and format specified by AIG.

Related to Security Breach Response Actions

  • Security Breach Notification In addition to the information enumerated in Article V, Section 4(1) of the DPA Standard Clauses, any Security Breach notification provided by the Provider to the LEA shall include: a. A list of the students whose Student Data was involved in or is reasonably believed to have been involved in the breach, if known; and b. The name and contact information for an employee of the Provider whom parents may contact to inquire about the breach.

  • Data Breach Notification Seller will promptly notify Buyer of any actual or potential exposure or misappropriation of Buyer data ("breach") that comes to Seller's attention. Seller will cooperate with ▇▇▇▇▇ and in investigating any such breach, at ▇▇▇▇▇▇'s expense. Seller will likewise cooperate with Buyer and, as applicable, with law enforcement agencies in any effort to notify injured or potentially injured parties, and such cooperation will be at Seller's expense, except to the extent that the breach was caused by ▇▇▇▇▇. The remedies and obligations set forth in this subsection are in addition to any others Buyer may have, including, but not limited to, any requirements in the “Privacy, Confidentiality, and Security” provisions of this Agreement.

  • Security Incident Response Upon becoming aware of a Security Incident, MailChimp shall notify Customer without undue delay and shall provide timely information relating to the Security Incident as it becomes known or as is reasonably requested by Customer.

  • Security Breach Notice and Reporting The Contractor shall have policies and procedures in place for the effective management of Security Breaches, as defined below, which shall be made available to the State upon request.

  • Security Breach In the event that Seller discovers or is notified of a breach, potential breach of security, or security incident at Seller's Facility or of Seller's systems, Seller shall immediately (i) notify Company of such potential, suspected or actual security breach, whether or not such breach has compromised any of Company's confidential information; (ii) investigate and promptly remediate the effects of the breach, whether or not the breach was caused by Seller; (iii) cooperate with Company with respect to any such breach or unauthorized access or use; (iv) comply with all applicable privacy and data protection laws governing Company's or any other individual's or entity's data; and (v) to the extent such breach was caused by Seller, provide Company with reasonable assurances satisfactory to Company that such breach, potential breach, or security incident shall not recur. Seller shall provide documentation to Company evidencing the length and impact of the breach. Any remediation of any such breach will be at Seller's sole expense.