Integration Security Review Sample Clauses

Integration Security Review. SFDC may conduct periodic security evaluations of the Integration (“Security Reviews”), which may include a qualitative assessment involving review of a questionnaire completed by Partner, an interview with appropriate Partner personnel, and/or security testing. SFDC conducts such Security Reviews for its own benefit and Partner may not rely on, publicly disclose, or promote an Integration's successful passage of such Security Review. Partner shall not distribute an Integration unless such Integration has successfully passed the Integration Security Review. There may be fees associated with such review. If the Integration, in whole or in part, runs outside SFDC’s systems, security testing may include remote application-level security testing of the Integration, and network-level security testing including a vulnerability threat assessment. SFDC may conduct such testing itself or through a third party. SFDC will provide reasonable notice to Partner before starting such testing. SFDC will cooperate reasonably with Partner to mitigate the effects of such testing on Partner’s business and operations. Partner agrees to cooperate reasonably with such testing. Despite the foregoing, such testing may in rare cases cause downtime or other adverse effects on the Integration or Partner’s systems. Partner agrees that SFDC and its agents or contractors conducting the testing will bear no responsibility or liability arising from such testing. Any Partner Confidential Information to which SFDC obtains access in the course of a Security Review will be subject to Section 5 (Confidentiality).
AutoNDA by SimpleDocs

Related to Integration Security Review

  • System Security Review All systems processing and/or storing DHCS PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Project Monitoring Reporting and Evaluation The Recipient shall furnish to the Association each Project Report not later than forty-five (45) days after the end of each calendar semester, covering the calendar semester.

  • Monitoring Services IDT staff shall, using methods that include face-to-face and other contacts with the member, monitor the services a member receives. This monitoring shall ensure that:

  • Aviation Security (1) Each Contracting Party reaffirms that its obligation to the other Contracting Party to protect the security of civil aviation against unlawful interference forms an integral part of this Agreement. Each Contracting Party shall in particular act in conformity with the aviation security provisions of the Convention on Offences and Certain Other Acts Committed on Board Aircraft, signed at Tokyo on 14 September 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, signed at The Hague on 16 December 1970 and the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, signed at Montreal on 23 September 1971.

  • Supervisory Control and Data Acquisition (SCADA) Capability The wind plant shall provide SCADA capability to transmit data and receive instructions from the ISO and/or the Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected, as applicable, to protect system reliability. The Connecting Transmission Owner for the Transmission District to which the wind generating plant will be interconnected and the wind plant Developer shall determine what SCADA information is essential for the proposed wind plant, taking into account the size of the plant and its characteristics, location, and importance in maintaining generation resource adequacy and transmission system reliability in its area.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Project Monitoring Reporting Evaluation A. The Project Implementing Entity shall monitor and evaluate the progress of its activities under the Project and prepare Project Reports in accordance with the provisions of Section 5.08(b) of the General Conditions and on the basis of indicators agreed with the Bank. Each such report shall cover the period of one

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • Constructability Review Prepare detailed interdisciplinary constructability review within Fourteen (14) days of receipt of the plans from the District that:

  • Application Security The ISP will require that in-house application development be governed by a documented secure software development life cycle methodology, which will include deployment rules for new applications and changes to existing applications in live production environments.

Time is Money Join Law Insider Premium to draft better contracts faster.