Security Compromise definition
Examples of Security Compromise in a sentence
PROVIDER REPRESENTATIONS AND WARRANTY Internal Network Security Compromise Policy Provider monitors the availability and performance of its internal firewall and network security.
Servicer must have a plan for security incident management and response in the event of an actual or suspected (i) Security Compromise with respect to Cellco Confidential Information, (ii) Loss or Misuse of Cellco Confidential/Highly Confidential Information, or (iii) malware posing a significant threat to Cellco Confidential Information (collectively "Security Incident").
Internal Network Security Compromise Policy Provider monitors the availability and performance of its internal firewall and web caching system.
Servicer must have a plan for security incident management and response in the Management and event of an actual or suspected (i) Security Compromise with respect to Cellco Response Confidential Information, (ii) Loss or Misuse of Cellco Confidential/Highly Confidential Information, or (iii) malware posing a significant threat to Cellco Confidential Information (collectively "Security Incident").
In case of actual or suspected Security Compromise, the National Security Authority of the Party where it has occurred shall, without delay, inform the National Security Authority of the Originating Party and, in accordance with national laws and regulations, initiate appropriate proceedings, in order to determine the circumstances of the compromise.
BTS is able to provide the services under the scope of the Internal Network Security Compromise Policy as they may pertain to client-owned equipment if client agrees in writing to contract such services at an additional charge.
The Internal Network Security Compromise Policy applies only to BTS and its partners hosted, core, and internal networks only.
Servicer must have a plan for security incident management and response in the event of an actual or suspected (i) Security Compromise with respect to Cellco Confidential Information, (ii) Loss or Misuse of Cellco Confidential/Highly Confidential Information, or (iii) malware posing a significant threat to Cellco Confidential Information (collectively “Security Incident”).
Notwithstanding the foregoing, the Payment Brands may directly engage, or demand that Paymentech engage, an examiner on behalf of TP3 or a Merchant in order to expedite the investigation of the Data Security Compromise Event.
When the Security Compromise has occurred in a third state, the National Security Authority of the sending Party shall take the actions referred to in paragraph 1 of this Article without delay.