Application Level Clause Samples

Application Level. 1.1. Regularly scheduled security audits, both internal and external 1.2. External security audits and vulnerability scans performed by TrustWave. The results of these audits are available to Customer on request. 1.3. Use of Secure Sockets Layer (SSL/TLS) 1.4. Strong cryptographic standards, including advanced password hashing techniques 1.5.Strong incident management, change control and asset management policies.
Application Level. The present Agreement will apply to the acquisition by the Banks with General License, on their own account and risk, of certificates of indebtedness issued by any modality, independently of the way they were acquired.
Application Level. 1.1. 1.2. 1.3.
Application Level. 1.1. Regularly scheduled security audits, both internal and external 1.2. External security audits and vulnerability scans performed by TrustWave. The results of these audits are available to Customer on request. 1.3. Use of Secure Sockets Layer (SSL/TLS) 1.4. Strong cryptographic standards, including advanced password hashing techniques 1.5. Strong incident management, change control and asset management policies. 1.6. Access to applications is restricted only to whitelisted IP addresses (if requested by Customer): customers can choose to have their data and application be accessible only from IP addresses that they specify during the setup. 1.7. Password Authentication for all users: only Authorised Users have access to the application. In addition, there are different levels of authorisation. For example, users not authorised for administrator access cannot add or remove users. 1.8. Support for different roles and permissions for each role. Permissions can be set at the role level or at individual users’ level. Only roles or user authorised to access a protected resource can do so. 1.9. All User activity is logged: In the event of unauthorised activity, we can review the log to investigate 1.10. Use one-time password authentication for critical systems. AWS, Gmail, Github, Lastpass applications are all secured with the second layer of OTP system where the user is required to input username and password as well as the code shown on the authenticator application.