Secure Software Development Sample Clauses

Secure Software Development. (a) Licensor shall ensure all Products have been developed in accordance with principles of secure software development consistent with software development industry best practices, including, security design review, secure coding practices, risk based testing and remediation requirements.
AutoNDA by SimpleDocs
Secure Software Development. Talos represents and warrants that any software used in connection with the Processing of Customer Personal Data is or has been developed using secure software development practices, including: (a) segregating development and production environments; (b) filtering out potentially malicious character sequences in user inputs; (c) using secure communication techniques, including encryption; (d) using sound memory management practices; (e) using web application firewalls to address common web application attacks such as cross-site scripting, SQL injection and command injection; (f) implementing the OWASP Top Ten recommendations, as applicable; (g) patching of software; (h) testing object code and source code for common coding errors and vulnerabilities using code analysis tools; (i) testing of web applications for vulnerabilities using web application scanners; and (j) testing software for performance under denial of service and other resource exhaustion attacks.
Secure Software Development. Any new feature and product enhancement we implement goes through a security review during design. Additionally, any code committed to our code base goes through a code-review process ensuring code quality and adherence to standards. We also perform regular penetration testing and automatic scanning to validate no security vulnerabilities exist in our platform.
Secure Software Development. Contractor represents and warrants that any software used in connection with the Processing of County Data is or has been developed using secure software development practices, including the following: (i) segregating development and production environments,
Secure Software Development. RingCentral will employ documented secure programming guidelines, standards, and procedures in the development of applications that process or store Confidential Customer Data.
Secure Software Development. Pleo will follow secure software development and code review practices to prevent harm from malware. Software will be developed using secure application development policies and procedures aligned with industry standard practices. Relevant personnel will receive appropriate training regarding secure application development practices.
Secure Software Development i. Security is part of the entire software development lifecycle.
AutoNDA by SimpleDocs
Secure Software Development. Data Importer shall maintain policies and procedures to ensure that system, device, application and infrastructure development is performed in a secure manner. This includes review and test of all Data Importer applications, products and services for common security vulnerabilities and defects, employing defense-in-depth strategy through the use of multiple layers of security boundaries and technologies, periodic pen testing and security assessment of these services, defining baseline configurations and requirements for patching of third party systems.
Secure Software Development. Cleafy shall implement and maintain secure application development policies and procedures aligned with industry standard practices such as the OWASP Top Ten (or a substantially equivalent standard). All personnel responsible for secure application design and development will receive appropriate training regarding Cleafy’s secure application development practices.
Secure Software Development. 1. Supplier shall ensure all Products have been developed in accordance with principles of secure software development consistent with software development industry best practices, including, security design review, secure coding practices, risk based testing and remediation requirements. Supplier’s software development environment used to develop the Products must have security controls that can detect and prevent attacks by use of network layer firewalls and intrusion detection/prevention systems (IDS/IPS) in a risk based manner.
Time is Money Join Law Insider Premium to draft better contracts faster.