Laserfiche WebLink
SOLICITATION # CH16012 <br />CA <br />CA Technologies abides to contractual requirements for notification, in addition to working with <br />legal to ensure compliance with regulatory requirements. There may be cases where incident <br />analysis completion is a requirement for confirming the breach, and / or its impact and data <br />leakage boundary. Prior to completion of this activity, CA may not have the needed conclusions for <br />customer communication. Once subscriber data has been identified as part of the investigation, <br />said subscribers will be notified as soon as possible and not longer than 5 days. A report of the <br />incident will be available and distributed to clients within 30 days. <br />Please note that none of the offerings proposed as considered payment products and are not <br />intended for use of storage of cardholder data. <br />Google <br />Google will take and implement appropriate technical and organizational measures to protect <br />Customer Data against accidental or unlawful destruction or accidental loss or alteration or <br />unauthorized disclosure or access or other unauthorized processing. If Google becomes aware of <br />a Data Incident, Google will promptly notify Customer as permitted by law of the Data Incident, <br />and take reasonable steps to minimize harm and secure Customer Data. Notification(s) of any <br />Data Incident(s) will be delivered to the Notification Email Address provided by the Purchasing <br />Entity in connection with the Agreement or, at Google's discretion, by direct communication (e.g., <br />b hone call or an in -person meeting). <br />Salesforce <br />Salesforce will promptly notify the State (within 48 hours, reflected in a negotiated agreement <br />between the parties) in the event Salesforce becomes aware of an actual or reasonably suspected <br />unauthorized disclosure of Customer Data. Notification may include phone contact by Salesforce <br />support, email to the State's administrator and Security Contact (if contact is submitted by State <br />and contact information is kept up to date), and public posting on trust.salesforce.com. <br />SAP <br />Ariba <br />Ariba has developed a computer security incident response team. Following <br />policies and procedures, this team responds to suspected security incidents to <br />mitigate risks and damage. The team conducts response and forensic <br />analysis of systems and network traffic. This information can be used to assist <br />with prosecution if a security breach is detected and the offender caught. <br />Fieldglass <br />SAP Fieldglass' security team is responsible for managing security incidents <br />and all communication is conducted via the respective account managers to <br />ensure timeliness. The process is defined within the Incident Response <br />Management Standard. <br />Customers are notified of an incident within 48 hours. <br />Hanna <br />SAP will notify via defined communication channels within 36 hours of a <br />confirmed data security breaches to the affected customers. The report will <br />detail the following information: <br />• Details relating to the security incident that has occurred, known at the time <br />of notification. <br />• IT infrastructure and/or application affected by the security incident. <br />• Overview of the performed mitigation actions to restore the security, <br />documented within the incident report form. <br />• All further applicable requirements by country regulations "on obligation to <br />notify" will be met. <br />Hybris <br />Since we do not allow for CC data to be transmitted, stored or processed in <br />our environment, we regularly scan the customer environment in case this is <br />done without our consent. <br />However, we do have a CSIRP in place, in which we would notify the <br />customer and our internal Forensics team in the event that a customer <br />environment should be breached. <br />SuccessFactors <br />Upon the occurrence of a data breach, initial communication is distributed to <br />the appropriate individuals and an escalation process is followed. Upon <br />carahsoft <br />carahsoft <br />