Security Incident Reporting. A security incident occurs when information assets are accessed, modified, destroyed, or disclosed without proper authorization, or are lost or stolen. Contractor must report all security incidents to County contact identified in paragraph 18, Notices immediately upon detection.
Appears in 2 contracts
Security Incident Reporting. 9.22.3.4.1 A security incident occurs when information assets Information Assets are accessed, modified, destroyed, or disclosed without proper authorization, or are lost or stolen. Contractor must report all security incidents to County contact identified in paragraph 18, Notices immediately upon County's Project Manager within two (2) business days of detection.
Appears in 1 contract
Sources: Contract
Security Incident Reporting. 9.23.3.4.1 A security incident occurs when information assets Information Assets are accessed, modified, destroyed, or disclosed without proper authorization, or are lost or stolen. Contractor must report all security incidents to County contact identified in paragraph 18, Notices immediately upon County's Project Manager within two (2) business days of detection.
Appears in 1 contract
Sources: Consultant Agreement
Security Incident Reporting. 9.22.3.3.1 A security incident occurs when information assets Information Assets are accessed, modified, destroyed, or disclosed without proper authorization, or are lost or stolen. Contractor must report all security incidents to County contact identified in paragraph 18, Notices immediately upon County's Project Manager within two (2) business days of detection.
Appears in 1 contract
Sources: Contract for Dietary Administrative Support Services (Dass) Program
Security Incident Reporting. 9.16.13.1 A security incident occurs when information assets County Information Assets are accessed, modified, destroyed, destroyed or disclosed without proper authorization, authorization or are lost or stolen. A security incident includes (but is not limited to) instances in which Contractor must report all security incidents to County contact identified employees access systems in paragraph 18excess of their user rights or use the systems inappropriately, Notices immediately upon detectiondata is breached, etc.
Appears in 1 contract
Sources: Master Agreement