Security Compromise Sample Clauses

A Security Compromise clause defines the obligations and procedures that parties must follow in the event of a breach or suspected breach of security, such as unauthorized access to data or systems. Typically, this clause requires the affected party to promptly notify the other party, take steps to mitigate harm, and cooperate in investigating and resolving the incident. Its core practical function is to ensure a coordinated and timely response to security incidents, thereby minimizing potential damage and clarifying responsibilities in the event of a compromise.
Security Compromise as soon as reasonably practicable but by no later than 72 (seventy-two) hours after becoming aware of any suspected or confirmed Personal Information Breach of any Personal Information in its possession or control, inform the other Party in writing thereof. Furthermore, a Party shall also inform the other Party in writing of the third party(ies) which may have been affected, the nature and extent of the Personal Information Breach and the identity of the unauthorized person/s who may have accessed or acquired the Personal Information. The Party, whose actions and/or omissions resulted in the Personal Information Breach, shall also take necessary remedial steps in order to mitigate the extent of the loss or compromise of such Personal Information, and prevent it from recurring. Such written notification however shall not be interpreted or construed as an admission of fault or liability by the other Party. Where the Party whose actions and/or omissions resulted in the Personal Information Breach, is deemed to be a Responsible Party/Controller, then it will be accountable to the Information Regulator and all affected Data Subjects, and will accordingly be required to carry out any required regulatory notifications of the Personal Information Breach in accordance with Applicable Data Protection Legislation.
Security Compromise. During the term of this Agreement, and for a period of [**] years thereafter (or if earlier, until [**] years after End of Life with respect to any particular model of the Equipment), if, while the affected Equipment is within the Initial Warranty Period or the affected Software is under Support Services and Purchaser is using a supported version of Software, a Security Compromise occurs that permits the unauthorized access to a Purchaser’s System, then the Parties jointly shall develop a counter-measures program to remedy such Security Compromise, which program shall be implemented at Seller’s sole expense. Notwithstanding the foregoing, to the extent a Security Compromise arises out of the acts or omissions of a Purchaser or any of Purchaser’s employees, consultants, agents and/or subcontractors or any Purchaser’s failure to implement any security patch available from Seller, the above-referenced counter-measure program shall be implemented at Purchaser’s sole expense, and further, Seller shall be reasonably compensated on a time and materials basis for its services in developing the counter-measures program.
Security Compromise. Where Protected Data has been acquired by any unauthorised person on systems managed by or otherwise controlled by IRONTREE INTERNET SERVICES, excluding unsuccessful attempts or activities that do not compromise the security of the Protected Data.
Security Compromise. If at any time the Client believes that the security of communications between the Client and BMO has been compromised or is in any way insecure, the Client will immediately notify BMO and provide all reasonable assistance BMO requires to investigate and correct the problem.
Security Compromise. In the event of a suspected or actual compromise of security of any kind – destruction, misappropriation, theft, unauthorized reproduction, disclosure or actual or suspected loss of transmitted or exchanged classified information and material, or any violation of national regulations on the protection of classified information transmitted under this Agreement – the competent security authorities of the other Party shall be informed immediately in writing. The notification shall be sufficiently detailed to enable the originating Party to conduct a thorough evaluation of the consequences. The recipient Party shall conduct an investigation (with the assistance of the other Party, if necessary) and take all appropriate measures, in accordance with its national laws and regulations, to mitigate the consequences and prevent any further such occurrences. The recipient Party shall inform the originating Party of the results of the investigation and of the measures taken to prevent the recurrence of such incidents.
Security Compromise. 1. In case of actual or suspected Security Compromise, the National Security Authority of the Party where it has occurred shall, without delay, inform the National Security Authority of the Originating Party and, in accordance with national laws and regulations, initiate appropriate proceedings, in order to determine the circumstances of the compromise. The results of the proceedings shall be forwarded to the National Security Authority of the Originating Party. 2. When the Security Compromise has occurred in a third state, the National Security Authority of the sending Party shall take the actions referred to in paragraph 1 of this Article without delay.

Related to Security Compromise

  • Security Cameras Security cameras have been installed throughout the Facility; however, they will not routinely be used in areas where there is an expectation of privacy, such as restrooms or patient care areas.

  • Security Controls Annually, upon Fund’s reasonable request, DST shall provide Fund’s Chief Information Security Officer or his or her designee with a summary of its corporate information security policy and an opportunity to discuss DST’s information security measures, and a high level and non-confidential summary of any penetration testing related to the provision of in-scope services . DST shall review its Security Policy annually.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

  • Security Safeguards Contractor shall store and process District Data in accordance with commercial best practices, including implementing appropriate administrative, physical, and technical safeguards that are no less rigorous than those outlined in SANS Top 20 Security Controls, as amended, to secure such data from unauthorized access, disclosure, alteration, and use. Contractor shall ensure that all such safeguards, including the manner in which District Data is collected, accessed, used, stored, processed, disposed of and disclosed, comply with all applicable federal and state data protection and privacy laws, regulations and directives, including without limitation C.R.S. § ▇▇-▇▇-▇▇▇ et seq., as well as the terms and conditions of this Addendum. Without limiting the foregoing, and unless expressly agreed to the contrary in writing, Contractor warrants that all electronic District Data will be encrypted in transmission and at rest in accordance with NIST Special Publication 800-57, as amended.

  • SECURITY CODES If the Custodian issues to the Company security codes, passwords or test keys in order that it may verify that certain transmissions of information, including Proper Instructions, have been originated by the Company, the Company shall take all commercially reasonable steps to safeguard any security codes, passwords, test keys or other security devices which the Custodian shall make available.