Application Source Code Security Sample Clauses

The Application Source Code Security clause establishes requirements and standards for protecting the source code of software applications from unauthorized access, modification, or disclosure. Typically, this clause mandates the implementation of security controls such as encryption, access restrictions, and regular security audits to safeguard the codebase. By setting these expectations, the clause helps prevent data breaches, intellectual property theft, and other security risks, ensuring the integrity and confidentiality of the application's source code.
POPULAR SAMPLE Copied 1 times
Application Source Code Security. Install and maintain source control software in a strictly controlled environment as approved by Customer X
Application Source Code Security. Contractor shall: 1. Implement all security requests and password reset requests associated with applications code subject to IOT and State Entity User approval on all data or information requests 2. Install, when required, and maintain source control software in compliance with IOT’s standards and methodology. 3. Monitor and restrict access to source code and IOT Data in accordance with IOT policies 4. Comply with Ad Hoc, annual audit, and regulatory requests 5. Perform IOT Data/source code security audits, and report test results 6. Immediately report any security violations to IOT 7. Promptly report to IOT any SSAE-18 compliance issues or e-discovery issues as such issues become known to the Contractor. Contractor must create a security risk assessment for new and modified applications to identify potential threats and vulnerabilities and proposed prevention measures.
Application Source Code Security a. IBM will: (1) implement VMU approved security and password change requirements associated with Application code and executable modules; (2) monitor and restrict access to Application source code and data; (3) upon VMU’s request, comply with ad hoc, annual audit and regulatory requests; (4) perform Application source code and data security audits and provide such results to VMU; and (5) report security violations. b. VMU will provide requirements for IBM to comply with ad hoc, annual audit and regulatory requests.

Related to Application Source Code Security

  • Source Code License Subject to the terms and conditions of this ▇▇▇▇, if You separately acquire a Source Code License, You are licensed to use the Source Code. A separate independent Source Code License is also required for each affiliate or subsidiary using the SOFTWARE. i. You expressly do not have, and are not granted the right to use the Source Code to create any derivative works. ii. You expressly do not have, and are not granted the right to modify the SOFTWARE or its Source Code in any way unless the appropriate Source Code modification license has been purchased. iii. Under no circumstances may the Source Code or any portion thereof be distributed, disclosed or otherwise made available to any third party outside of Your organization. iv. GC shall retain all rights, title and interest in and to the licensed Source Code, and all GC updates, modifications or enhancements thereof. Nothing herein shall be deemed to transfer any ownership or title rights in and to the licensed Source Code from GC to You. v. THE SOURCE CODE IS PROVIDED TO YOU AS IS. GC DOES NOT AND SHALL NOT PROVIDE YOU WITH ANY TECHNICAL SUPPORT, OR ANY AUTOMATIC UPDATES OR UPGRADES FOR YOUR SOURCE CODE LICENSE.

  • Source Code 5.1 Nothing in this ▇▇▇▇ shall give to the User or any other person any right to access or use the Source Code or constitute any licence of the Source Code.

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • OPEN SOURCE COMPONENTS The DS Offerings may include open source components. Whenever notices (such as acknowledgment, copies of licenses or attribution notice) are required by the original licensor, such notices are included in the Documentation of the DS Offerings. Moreover, some open source components may not be distributed and licensed under the terms of the Agreement but under the terms of their original licenses as set forth in the Documentation of the DS Offerings themselves. Source code for open source software components is available upon request. Except for components mentioned in the section EXCLUSIONS below, the warranty and indemnification provided by DS under the Agreement apply to all open source software components and shall be provided by DS and not by the original licensor, but only for the use of the DS Offerings that is in compliance with the terms of the Agreement, and in conjunction with the DS Offerings. The original licensors of said open source software components provide them on an “as is” basis and without any liability whatsoever to Customer.