Anti-malware, Patching, and Configuration Management Sample Clauses

Anti-malware, Patching, and Configuration Management. The use of anti-malware software is a principal mechanism for protection of Customer assets from malicious software. The software detects and prevents the introduction of computer viruses and worms into the systems. Anti- malware software provides both preventive and detective control over malicious software. Changes, such as updates, hotfixes, and patches made to the production environment, follow the same standard change management process. Patches are implemented within the time frame specified by the issuing company. Changes are both reviewed and evaluated by Xxxxxxx teams for applicability, risk, and resource assignment prior to being implemented.
AutoNDA by SimpleDocs

Related to Anti-malware, Patching, and Configuration Management

  • Enterprise Information Management Standards Grantee shall conform to HHS standards for data management as described by the policies of the HHS Office of Data, Analytics, and Performance. These include, but are not limited to, standards for documentation and communication of data models, metadata, and other data definition methods that are required by HHS for ongoing data governance, strategic portfolio analysis, interoperability planning, and valuation of HHS System data assets.

  • Scope of Services The specific scope of work for each job shall be determined in advance and in writing between TIPS Member, Member’s design professionals and Vendor. It is permitted for the TIPS Member to provide a general scope description, but the awarded vendor should provide a written scope of work, and if applicable, according to the TIPS Member’s design Professional as part of the proposal. Once the scope of the job is agreed to, the TIPS Member will issue a PO and/or an Agreement or Contract with the Job Order Contract Proposal referenced or as an attachment along with bond and any other special provisions agreed by the TIPS Member. If special terms and conditions other than those covered within this solicitation and awarded Agreements are required, they will be attached to the PO and/or an Agreement or Contract and shall take precedence over those in this base TIPS Vendor Agreement.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

Time is Money Join Law Insider Premium to draft better contracts faster.