Antivirus and Security Scans Sample Clauses

Antivirus and Security Scans. Anti-virus or anti-malware applications have been installed to detect or prevent unauthorized or malicious software. The Company runs security scans on a regular basis. For virus monitoring, the Company automatically or manually updates most software it runs and outsources to AWS when logical and possible. The Company maintains a vulnerability scanning process for production systems. The scope of vulnerability scans includes both external and internal systems in the production environment. The Company’s security team performs vulnerability scans at least quarterly and determines a severity rating for each vulnerability based on the assessment tools criteria such that high or higher-level ranked vulnerabilities require remediation Vulnerability scans are also run after any significant change to the production environment as determined by the Company security team. A third party penetration test is run at least annually and identified vulnerabilities are resolved according to priority and severity.
AutoNDA by SimpleDocs

Related to Antivirus and Security Scans

  • Background Screening and Security 14 These General Contract Conditions supersede and replace in their entirety all General Contract Conditions, Form PUR 1000, which is incorporated by reference in Rule 60A-1.002, Florida Administrative Code (F.A.C.)

  • Access and Security Customer shall employ all physical, administrative and technical controls, screening and security procedures and other safeguards necessary to: (a) securely administer the distribution and use of all Access Credentials and protect against any unauthorized access to or use of the Hosted Services; and (b) control the content and use of Customer Data, including the uploading or other provision of Customer Data for Processing by the Hosted Services.

  • Data and Security If Contractor is granted access to Court Data, Confidential Information or Court Work Locations in the performance of the Work;

  • Background and Security Investigations 8.1 For the safety and welfare of the children to be served under this Contract, CONTRACTOR shall, as permitted by law, ensure that its staff, employees, independent contractors, volunteers or subcontractors who may come in contact with children in the course of their work, undergo and pass a background investigation to the satisfaction of COUNTY as a condition of beginning and continuing to work under this contract. Such background investigation may include, but shall not be limited to criminal conviction information obtained through fingerprints submitted to the California Department of Justice. The fees associated with the background investigation shall be at the expense of the CONTRACTOR, regardless if the member of CONTRACTOR’s staff passes or fails the backgrounds investigation.

  • Passwords and Security You acknowledge that you will be the only authorized user of Firstrade Securities Inc.'s Electronic Services for your account(s). You will be fully responsible for the confidentiality and use of your user name(s) and password (s) and you agree that you will be fully and solely responsible for all activities, including brokerage transactions, which arise from the use of your user name (s) or password(s) (except as provided for in paragraph 5 below). You also agree that you will be fully and solely responsible for all activities, including brokerage transactions, which arise from your authorization to link your brokerage account(s) to any other Firstrade Securities Inc. account(s). You acknowledge that we may tape record conversations with you, whether in person or by telephone, for purposes of verification and you consent to such recording.

  • Password and Security If you are issued or create any password or other credentials to access the Service or the portion of the Site through which the Service is offered, you agree not to give or make available your password or credentials to any unauthorized individuals, and you agree to be responsible for all actions taken by anyone to whom you have provided such credentials. If you believe that your credentials have been lost or stolen or that someone may attempt to use them to access the Site or Service without your consent, you must inform us at once at the telephone number provided in Section 6 of the General Terms above. See also Section 16 of the General Terms above regarding how the timeliness of your notice impacts your liability for unauthorized transfers.

  • Privacy and Security (a) The Service Provider shall not transmit or store any AHS data outside the borders of Canada, nor transmit any AHS data in Canada to any party not specifically contemplated in this Agreement, without AHS’s prior written consent to each such data transmittal, which consent may be arbitrarily and unreasonably withheld.

  • Information Integrity and Security Contractor shall immediately notify County of any known or suspected breach of personal, sensitive and confidential information related to Contractor’s work under this Agreement.

  • WILD AND SCENIC RIVERS The Wild and Scenic Rivers Act of 1968 (16 U.S.C. § 1271, et seq.) as amended, particularly sections 7(b) and (c) (16 U.S.C. § 1278(b) and (c)). AIR QUALITY The Clean Air Act (42 U.S.C. § 7401, et seq.) as amended, particularly sections 176(c) and (d) (42 U.S.C. §7506(c) and (d)). Determining Conformity of Federal Actions to State or Federal Implementation Plans (Environmental Protection Agency-40 C.F.R. Parts 6, 51, and 93). FARMLAND PROTECTION Farmland Protection Policy Act of 1981 (7 U.S.C. § 4201, et seq.) particularly sections 1540(b) and 1541 (7 U.S.C. §§ 4201(b) and 4202); and Farmland Protection Policy (Department of Agriculture-7 C.F.R. part 658). HUD ENVIRONMENTAL STANDARDS Applicable criteria and standards specified in HUD environmental regulations (24 C.F.R. Part 51)(other than the runway clear zone and clear zone notification requirement in 24 C.F.R. § 51.303(a)(3); and HUD Notice 79-33, Policy Guidance to Address the Problems Posed by Toxic Chemicals and Radioactive Materials, September 10, 1979.

  • DATA HANDLING AND SECURITY It will always be the responsibility of the selected Contractor to manage data transfer and to secure all data appropriately during the project to prevent unauthorized access to all data, products, and deliverables.

Time is Money Join Law Insider Premium to draft better contracts faster.