System Acquisition Development and Maintenance Sample Clauses

System Acquisition Development and Maintenance. 9.1. Within the software development lifecycle, production data will not be used in testing. In the event that testing requires the use of production data, then the express permission of the Controller will first be obtained.
AutoNDA by SimpleDocs
System Acquisition Development and Maintenance. 9.1. Security requirements of information systems The Contractor shall develop and put in place appropriate security control requirements, including requirements to govern web applications and transactions.
System Acquisition Development and Maintenance i. Security Requirements. Cisco shall adopt security requirements for the purchase, use, or deve- lopment of information systems, including for application services delivered through public net- works.
System Acquisition Development and Maintenance. 9.1 The Supplier shall ensure that development activities are carried out in accordance with a documented system development methodology.
System Acquisition Development and Maintenance. If Supplier develops software for use by Canary and/or Canary clients or for use in Processing Personal Information, Supplier must adhere to industry best practices and standards for Secure Software Development Lifecycle (SSDLC), including all of, but not limited to, the following techniques:
System Acquisition Development and Maintenance. Supplier shall: (i) use separate physical and logical development/test and pro- duction environments and databases; (ii) maintain written change management and secure application/system development procedures, including procedures to manage software on the network so that only authorized software is installed and can execute; (iii) maintain tools or services to identify malicious programming and code, including unauthorized or unmanaged software; and (iv) manage the security life-cycle of software to timely prevent, detect, and remediate security vulnerabilities.
System Acquisition Development and Maintenance. ● Processor has policies for secure development, system engineering and support. Processor conducts appropriate tests for system security as part of acceptance testing processes. For transfers to (sub-) processors, also describe the specific technical and organisational measures to be taken by the (sub-) processor to be able to provide assistance to the controller and, for transfers from a processor to a sub-processor, to the data exporter. ● The data shall be encrypted during its transmission and while at rest. ● Https communication is ensured. ANNEX III – LIST OF SUB-PROCESSORS Name Service Provided Purpose Data Centers Amazon Web Cloud service Cloud infrastructure provider for India (Mumbai), USA Services provider SurveySparrow. Almost all data (Xxxxxxx), Canada stored, processed and (Montreal), EU (Frankfurt), transmitted in SurveySparrow UAE (Dubai) depending on customer preference resides on Amazon Web Services data centers. Hubspot Inc. CRM This is our internal cloud based CRM tool used to keep our customer contact details and communications up to date as part of the provision of our services. United States Sparkpost Email Service Provider Sending out emails United Union States, European Newrelic Application and Performance Monitoring To monitor the performance of the application and tune it. United States, Europe Stripe Payment Solution Subscription Stripe is managed by United States Twilio Messaging SMS share utilizes Twilio to deliver messages United States Google Translate Translation Survey and Response Translation provider for SurveySparrow United States, Europe Xxxx.xx Log Management Managing the logs created in SurveySparow United States, Europe Sentry Error handling Error monitoring tool with a focus on error reporting. Used to capture errors within the Service to better understand and resolve issues in real-time. United States Zendesk CRM Internal cloud based customer support tool which is used to keep our customer contact details and communications up to date as part of the provision of our services. United States Heap Analytics Analytics tool An web based analytics tool used to track App events and measure user action on the product including page views, taps, swipes etc. United States Sendgrid Email Service Provider Sending out Emails United States Xxxx.xx Product Analytics & Error Tracking User session analytics & debugging United States Open AI Creating Survey Templates Machine Learning & Text Analytics United States Vitally CRM Optimi...
AutoNDA by SimpleDocs
System Acquisition Development and Maintenance. To establish information security as a vital part of information systems throughout the entire information lifecycle, including designing information security into the development of such systems. To ensure that sufficient controls are established to protect data used in testing.
System Acquisition Development and Maintenance. ● Processor has policies for secure development, system engineering and support. Processor conducts appropriate tests for system security as part of acceptance testing processes. For transfers to (sub-) processors, also describe the specific technical and organisational measures to be taken by the (sub-) processor to be able to provide assistance to the controller and, for transfers from a processor to a sub-processor, to the data exporter. ● The data shall be encrypted during its transmission and while at rest. ● Https communication is ensured.
System Acquisition Development and Maintenance. Radware maintains security throughout the lifecycle of the information systems.
Time is Money Join Law Insider Premium to draft better contracts faster.