Security Review Sample Clauses

Security Review. Application security assessments and network penetration tests are performed on a periodic basis to ensure that code generated by ALPS meets industry standards and best practices.
AutoNDA by SimpleDocs
Security Review. The Government may elect to conduct random periodic reviews to ensure that the security requirements contained in this contract are being implemented and enforced. The Contractor shall afford DHS, the Office of the Inspector General, and other Government organizations access to the Contractor’s facilities, installations, operations, documentation, databases and personnel used in the performance of this contract. The Contractor shall, through the Contracting Officer and COR, contact the Headquarters or Component CIO, or designee, to coordinate and participate in review and inspection activity by Government organizations external to the DHS. Access shall be provided, to the extent necessary as determined by the Government, for the Government to carry out a program of inspection, investigation, and audit to safeguard against threats and hazards to the integrity, availability and confidentiality of Government data or the function of computer systems used in performance of this contract and to preserve evidence of computer crime.
Security Review. Subject to the conditions set out herein, Flexera will permit Customer personnel or authorized representatives to review and assess Flexera’s compliance with the obligations set out in this Section (“Security Review”). The definition of audit rights is to be mutually agreed between Flexera and Customer. Unless otherwise required by law:
Security Review. MP and AOL will work together to perform an initial --------------- security review of, and to perform tests of, the MP system, network, and service security in order to evaluate the security risks and provide recommendations to MP, including periodic follow-up reviews as reasonably required by MP or AOL. MP will fix any security risks or breaches of security as may be identified by AOL's Operations Security. Specific services to be performed on behalf of AOL's Operations Security team will be as determined by AOL in its sole discretion.
Security Review. The Vendor shall: give to (or procure the giving to) TSP (or any person authorised by TSP) such access at all reasonable times to the Vendor’s and any Subcontractor’s records and premises related to this Agreement as TSP may require from time to time to assess the Vendor’s compliance of these policies in this Agreement; and such assessments may include assessments of all elements of physical and logical audits, penetration testing of the Vendor’s Systems. The Vendor shall facilitate this assessment by permitting TSP to collect, retain and analyse information to identify potential security risks including trace files, statistics, network addresses and the actual information or screens accessed or transferred; and provide such reports to TSP and attend such meetings as may be reasonably required by TSP.
Security Review. Subject to the conditions set out herein, Revenera will permit Customer personnel or authorized representatives to review and assess Revenera’s compliance with the obligations set out in this Section (“Security Review”). The definition of audit rights is to be mutually agreed between Revenera and Customer. Unless otherwise required by law:
Security Review. InfoSpace and AOL will work together to perform an initial security review of, and to perform tests of, the InfoSpace system, network, and service security in order to evaluate the security risks and provide recommendations to InfoSpace, including periodic follow-up reviews as reasonably required by InfoSpace or AOL. InfoSpace will use commercially reasonable best efforts to fix any security risks or breaches of security as may be identified by AOL's Operations Security. Specific services to be performed on behalf of AOL's Operations Security team will be as determined by AOL in its sole discretion.
AutoNDA by SimpleDocs
Security Review. Examination of The System or information related to the security of The System requiring the assistance of or coordination with Partner that can identify and/or diagnose, or are intended to identify and/or diagnose, Security Issues.
Security Review. Upon the conditions set forth below, Yahoo, directly or through a Yahoo Affiliate designated by Yahoo, will have the right, at its own expense, to conduct Security Reviews, and/or to have an independent third party subject to a Partner-approved confidentiality agreement conduct Security Reviews. In the case that Yahoo uses an independent third party, the third party will be selected by Yahoo subject to approval by Partner, and such approval will not be unreasonably withheld or delayed. Partner will provide sufficient access to its facilities, personnel, and records as required for the Security Review during Partner’s regular business hours, and will otherwise support and cooperate with the Security Review. Security Reviews may result in the identification of Security Issues.
Security Review. Customer may, from time to time, at Customer’s sole cost and upon reasonable prior written notice, perform a reasonable security review of the facilities from which the Systems are operated or hosted. SSN agrees to meet with Customer to discuss the results of any such security review and SSN shall take any commercially reasonable corrective action to remedy any deficiencies that SSN agrees were identified by such review in accordance with this Agreement, including Exhibit U.
Time is Money Join Law Insider Premium to draft better contracts faster.