Code Security Sample Clauses

The Code Security clause establishes requirements and standards for protecting software code from unauthorized access, modification, or breaches. It typically mandates the use of secure coding practices, regular vulnerability assessments, and the implementation of security controls such as encryption and access restrictions. By setting these expectations, the clause helps prevent data breaches and ensures that both parties are clear on their responsibilities for maintaining the integrity and confidentiality of the code.
Code Security. 8.2.1. All production code is digitally signed, using trusted third-party Public Key Infrastructure (PKI) services. 8.2.2. As part of ▇▇▇▇▇▇▇’ CI/CD pipeline, code is scanned nightly for vulnerabilities, both third-party and any introduced in ▇▇▇▇▇▇▇ custom code. This scanning is performed using best in class Software Composition Analysis (SCA) and Static Application Security Testing (SAST) tools, which allows for deep and thorough analysis as well as continuous vulnerabilities detection. 8.2.3. Dynamic Application Security Testing (DAST) is executed on live, deployed application instances 8.2.4. A trusted third-party penetration team is contracted to perform continuous penetration testing on the product (including milestones). 8.2.5. Any vulnerabilities discovered are triaged and run through an internal risk assessment with enforced remediation of all Critical and High vulnerabilities discovered.
Code Security. Customer shall take appropriate steps to protect the use of such Customer Identification Code(s), and Vendor will provide all assistance reasonably required, including but not limited to changing such Customer Identification Code(s), at the written request of Customer. Customer shall be liable for all charges incurred under any additional Customer Identification Code(s) established by Vendor in accordance with this section. Customer shall notify Vendor of any authorized use of Customer Identification Code. Vendor shall not be responsible for any unauthorized access to, or alteration of, transmissions or data sent or received, regardless of whether data is actually received by Customer.
Code Security. The password or access code ("access code") that you select is for your security purposes. The access code is confidential and should not be disclosed to third parties or recorded. You are responsible for safekeeping your access code. You agree not to disclose or otherwise make your access code available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access code, that authority shall continue until you specifically revoke such authority by changing your password and/or notifying the Credit Union. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your Home Banking and account services immediately. You will be required to change the password assigned upon first access. If you want to discontinue access to these products, please notify the Credit Union at ▇▇▇-▇▇▇-▇▇▇▇ or ▇▇▇-▇▇▇-▇▇▇▇.
Code Security. The UW Covered Component does not use or disclose the code or other means of record identification for any other purpose, and does not disclose the mechanism for re‐identification.

Related to Code Security

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.