Laserfiche WebLink
DocuSign Envelope ID: 348BB866-CFC7-422D-BFB7-863533B13759 <br />Attachment G <br />GLO Contract No. 22-119-004-D374 <br />Page 3 of 4 <br />4. Data Mining <br />4.1. Subrecipient shall not use GLO Data for unrelated commercial purposes, advertising or <br />advertising -related services, or for any other purpose not explicitly authorized by the <br />GLO in this Contract. <br />4.2. Subrecipient shall take all reasonable physical, technical, administrative, and procedural <br />measures to ensure that no unauthorized use or access of GLO Data occurs. <br />5. Breach of Security <br />5.1. Subrecipient shall provide the GLO with the name and contact information for an <br />employee of Subrecipient which shall serve as the GLO's primary security contact. <br />5.2. Upon Subrecipient's discovery of a Breach of Security or suspected Breach of Security, <br />Subrecipient shall notify the GLO as soon as possible, but no later than 24 hours after <br />discovery of the Breach of Security or suspected Breach of Security. Within 72 hours, <br />Subrecipient shall provide to the GLO, at minimum, a written preliminary report <br />regarding the Breach or suspected Breach to the GLO with root cause analysis <br />including a log detailing the data affected. <br />5.3. Subrecipient shall submit the initial notification and preliminary report to the GLO <br />Information Security Officer at .tifon-nation CLlit;y��X>gjc� t���1� <br />5.4. Subrecipient shall take all reasonable steps to immediately remedy a Breach of Security <br />and prevent any further Breach of Security. <br />5.5. Subrecipient shall not inform any third party of any Breach of Security or suspected <br />Breach of Security without first obtaining GLO's prior written consent unless such <br />action is required by law or is limited to third parry personnel that have a need to know <br />for the sole purpose of containing or remediating the Breach of Security or suspected <br />Breach of Security. However, while a third parry may be informed of the Breach or <br />suspected Breach for the sole purpose of containing or remediating it, no GLO Data <br />shall be shared with such third parry unless express written permission is obtained from <br />the GLO in accordance with Section 2.5. Subrecipient will legally bind such third party <br />to the same requirements stated herein and obligations stipulated in the Contract and <br />documents related thereto as soon as practicable upon securing such third parry to <br />contain or remediate the Breach of Security or suspected Breach of Security. <br />5.6. Notwithstanding the remedies provided in the Contract, if a Breach of Security includes <br />SPI, Subrecipient shall, at the discretion of the GLO, notify affected individuals of such <br />Breach and provide affected individuals complimentary access to one (1) year of credit <br />monitoring services. <br />6. Right to Audit <br />6.1 Upon the GLO's request and to confirm Subrecipient's compliance with this <br />Attachment, Subrecipient grants the GLO, or a GLO-contracted vendor, permission to <br />perform an assessment, audit, examination, investigation, or review of all controls in <br />Subrecipient's, or Subrecipient's contractor/subcontractor's, physical and/or technical <br />environment in relation to GLO Data. Subrecipient shall fully cooperate with such <br />