Security Contact Clause Samples

The Security Contact clause designates a specific individual or role within an organization as the primary point of contact for all matters related to information security. This clause typically requires the party to provide up-to-date contact details for the designated person and to notify the other party of any changes to this information. By clearly identifying who is responsible for security communications, the clause ensures that security incidents, notifications, or inquiries are directed efficiently, reducing response times and minimizing confusion during critical situations.
POPULAR SAMPLE Copied 1 times
Security Contact. If not set out elsewhere in the Agreement, the Contractor must provide the contact information for the individual who will coordinate compliance by the Contractor on matters relating to this Schedule.
Security Contact. Operator shall provide the name and contact information of Operator's Security Contact on Exhibit F. The LEA may direct security concerns or questions to the Security Contact.
Security Contact. Partner will provide Yahoo with access to knowledgeable personnel, who can be reached with and respond to security questions or security concerns (“Security Contact”). Security Contact must have a deep, current knowledge about the architecture and operation of The System. Partner Security Contact will be available twenty-four hours a day, seven days a week by telephone and email, or through Partner’s Notification Contact.
Security Contact. In accordance with Section 1.4.2 (Customer Responsibilities), of the Customer Support Policy (▇▇▇.▇▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇▇-▇▇▇▇▇▇▇▇▇.▇▇▇▇), Customer agrees to identify and maintain appropriate security contact(s) for all information security incident and information security-related communication within the Support Portal.‌
Security Contact. Each of the Parties has provided to the other Party the name and contact information of such Party’s designated primary and secondary “Security Contact” appointed for the purpose of being contacted in connection with (i) any security breach or failure requiring immediate notification to a Party with respect to the unauthorized use or disclosure of Cardholder Data or (ii) any use or disclosure of a Party’s Confidential Information except in the manner permitted by Article VIII. A Party may from time to time change its primary and secondary Security Contact by providing written notice of such change in accordance with the notice requirements herein. In the event a named Security Contact is no longer in the employ of the applicable Party, or is otherwise unable or unwilling to perform the duties of a Security Contact as set forth herein, then a replacement Security Contact shall be named by such Party as soon as possible but in no event later than [***] after the Security Contact has ceased employment with such Party or the occurrence of the event giving rise to such Security Contact’s inability or unwillingness to perform such duties. Each Party shall further ensure that either the primary Security Contact or the secondary Security Contact is available at any given time to fulfill the purposes of this Section, unless otherwise approved in advance in writing by the other Party.
Security Contact. HortonWorks will provide Yahoo with access to knowledgeable personnel, who can be reached with and respond to security questions or security concerns (“Security Contact”). The Security Contact must have a deep, current knowledge about the architecture and operation of The System. The Security Contact will be available during business hours by telephone and email, or through HortonWorks’ Notification Contact. xix Yahoo and HortonWorks Confidential [**] Confidential treatment has been requested for the bracketed portions. The confidential redacted portion has been omitted and filed separately with the Securities and Exchange Commission. At all times, the Security Contact will be available as necessary for HortonWorks to comply with the response and resolution times set forth below and in Exhibit C (Support Services), if and as applicable. Yahoo may suspend access to the system until it is able to contact HortonWorks’ security.
Security Contact. ▇▇▇▇▇ agrees to identify and maintain appropriate security contact(s) for all information security incident and information security-related communication. Buyer must report to Supplier any failure of the Services to function materially in accordance with its Documentation (currently via Supplier’s Support Portal at the Supplier Site or email at ▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇.▇▇▇). Where the Buyer cannot report via the Support Portal or email (or other means provided under Documentation), then Buyer will report by telephone. Supplier will provide Buyer with its assigned support contact telephone.
Security Contact. Customer agrees to identify and maintain appropriate security contact(s) for all information security incident and information security-related communication within the Support Portal.
Security Contact. Subcontractor shall: (i) provide ESG with the name and contact information for an employee of Subcontractor who shall serve as ESG’s primary security contact and shall be available to assist ESG twenty-four (24) hours per day, seven (7) days per week as a contact in resolving obligations associated with a Security Breach; and (ii) notify ESG of a Security Breach as soon as practicable, but no later than twenty-four (24) hours after Subcontractor becomes aware of the Security Breach. Subcontractor agrees to fully cooperate with ESG in ESG’s handling of the Security Breach, including, without limitation: (i) assisting with any investigation; (ii) providing ESG with physical access to the facilities and operations affected; (iii) facilitating interviews with Subcontractor’s employees and others involved in the matter; and (iv) making available all relevant records, logs, files, data reporting and other materials required to comply with Applicable Law, industry standards or as otherwise required by ESG.
Security Contact. The primary point of contact for Customer in case of a suspected Security Breach will be the Avaya account manager, client service manager, or service delivery manager, as advised by Avaya. These individuals will be responsible for engaging the appropriate internal resources based on the specifics of the identified issue.