Security Violation Clause Samples

Security Violation. An act from within an organization that bypasses or disobeys security policies, practices, or procedures. Sensitive data is a special category of personally identifiable information (PII) that has the potential to cause great harm to an individual, government agency, or program if abused, misused, or breached. It is sensitive information protected against unwarranted disclosure and carries specific criminal and civil penalties for an individual convicted of unauthorized access, disclosure, or misuse. Protection of sensitive information usually involves specific classification or legal precedents that provide special protection for legal and ethical reasons. SIM is software that automates the collection of event log data from security devices such as firewalls, proxy servers, intrusion detection systems and anti-virus software. The SIM translates the data into correlated and simplified formats. SMDS is a telecommunications service that provides connectionless, high- performance, packet- switched data transport. Although not a protocol, it supports standard protocols and communications interfaces using current technology. Synonymous with “SSA-supplied data/information‟, defines information under the control of SSA provided to an external entity under the terms of an information exchange agreement with SSA. The following are examples of SSA-provided data/information: • SSA’s response to a request from an EIEP for information from SSA (e.g., date of death) • SSA’s response to a query from an EIEP for verification of an SSN This term, sometimes used interchangeably with “SSA-provided data/information,‟ denotes information under the control of SSA provided to an external entity under the terms of an information exchange agreement with SSA. However, “SSA data/information” also includes information provided to the EIEP by a source other than SSA, but which the EIEP attests to that SSA verified it, or the EIEP couples the information with data from SSA as to to certify the accuracy of the information. The following are examples of SSA information: • SSA’s response to a request from an EIEP for information from SSA (e.g., date of death) • SSA’s response to a query from an EIEP for verification of an SSN • Display by the EIEP of SSA’s response to a query for verification of an SSN and the associated SSN provided by SSA • Display by the EIEP of SSA’s response to a query for verification of an SSN and the associated SSN provided to the EIEP by a source other than SSA •...
Security Violation. Recipient shall monitor access of Users and shall notify Agency within twenty-four (24) hours if a security violation of this Contract is detected, or if Recipient suspects that the security or integrity of TWC Information has or may have been compromised in any way.
Security Violation. If any activity violating the Platform's security or threatening the integrity of user data or Netzo is detected.
Security Violation. Board and Board subcontractor shall monitor access of Users and shall notify Agency within twenty-four (24) hours if a security violation of this Agreement is detected, or if Board or Board subcontractor suspects that the security or integrity of TWC Information has or may have been compromised in any way. The time period for notifying TWC under this section is reduced to one (1) hour for suspected security violations that involve protected health information of a covered under 45 C.F.R. Parts 160, 162, and 164, such as Medicaid Information provided from, by or accessed through the Health and Human Services Commission systems as required by the Health Information and Portability and Accountability Act (HIPAA) and the Health Information Technology Act (HITECH).
Security Violation. Independent Contractor agrees that any Employee who violates the security requirements of this Document and/or any other obligation to BCBSM Data will be immediately removed and prohibited from providing services to BCBSM under any agreement, including statements of work or engagement letters, entered into between BCBSM and Independent Contractor.
Security Violation. The Member is prohibited from violating or attempting to violate the security of the Site including, without limitation, accessing data not intended for them or logging into a server or account which they are not authorized to access, attempting to probe, scan or test the vulnerability of a system or network or attempting to breach security or authentication measures without proper authorization, attempting to interfere with service to any Member, host or network or sending unsolicited e-mail. Violation of the system or network security may result in civil or criminal liability.

Related to Security Violation

  • Non-Violation The execution and delivery of this Amendment and the performance and observance by it of the terms and provisions hereof (a) do not violate or contravene its Organization Documents or any applicable Laws or (b) conflict with or result in a breach or contravention of any provision of, or constitute a default under, any other agreement, instrument or document binding upon or enforceable against it.

  • WAGE VIOLATIONS Contractor represents and warrants as previously certified in Contractor’s Bidder’s Certification, that during the term of this Contract and the three (3) year period immediately preceding the award of the Contract, Contractor has not been determined, by a final and binding citation and notice of assessment issued by the Washington Department of Labor and Industries or through a civil judgment entered by a court of limited or general jurisdiction, to be in willful violation of any provision of Washington state wage laws set forth in RCW 49.46, 49.48, or 49.52.

  • Repeat Violations ▇▇▇▇▇▇ agrees to comply with all regulatory requirements and acknowledges that repeat violations could result in increased penalties in the future.

  • Policy Compliance Violations The Requester and Approved Users acknowledge that the NIH may terminate the DAR, including this Agreement and immediately revoke or suspend access to all controlled-access datasets subject to the NIH GDS Policy at any time if the Requester is found to be no longer in agreement with the principles outlined in the NIH GDS Policy, the terms described in this Agreement, or the Genomic Data User Code of Conduct. The Requester and PI agree to notify the NIH of any violations of the NIH GDS Policy, this Agreement, or the Genomic Data User Code of Conduct data within 24 hours of when the incident is identified. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. The Requester and PI agree to notify the appropriate DAC(s) of any unauthorized data sharing, breaches of data security, or inadvertent data releases that may compromise data confidentiality within 24 hours of when the incident is identified. As permitted by law, notifications should include any known information regarding the incident and a general description of the activities or process in place to define and remediate the situation fully. Within 3 business days of the DAC notification(s), the Requester agrees to submit to the DAC(s) a detailed written report including the date and nature of the event, actions taken or to be taken to remediate the issue(s), and plans or processes developed to prevent further problems, including specific information on timelines anticipated for action. The Requester agrees to provide documentation verifying that the remediation plans have been implemented. Repeated violations or unresponsiveness to NIH requests may result in further compliance measures affecting the Requester. NIH, or another entity designated by NIH may, as permitted by law, also investigate any data security incident or policy violation. Approved Users and their associates agree to support such investigations and provide information, within the limits of applicable local, state, tribal, and federal laws and regulations. In addition, Requester and Approved Users agree to work with the NIH to assure that plans and procedures that are developed to address identified problems are mutually acceptable and consistent with applicable law.

  • AIR OR WATER POLLUTION VIOLATION Under the State laws, the Contractor shall not be: (1) in violation of any order or resolution not subject to review promulgated by the State Air Resources Board or an air pollution control district; (2) subject to cease and desist order not subject to review issued pursuant to Section 13301 of the Water Code for violation of waste discharge requirements or discharge prohibitions; or (3) finally determined to be in violation of provisions of federal law relating to air or water pollution.