Vulnerability Sample Clauses

Vulnerability a weakness in the computational logic (for example, code) found in software and hardware components that when exploited, results in a negative impact to the confidentiality, integrity, or availability, and the term Vulnerabilities shall be construed accordingly.
AutoNDA by SimpleDocs
Vulnerability susceptibility to loss or damage of elements exposed to the impact of a natural phenomenon.
Vulnerability. The vulnerability (V) of water supply to shortage is defined as the probability that the demand (D) exceeds the supply (Q), that is, V = Pr[Q < D]. Therefore, making use of the probability density functions obtained in major Task A, the following tasks will be perfomed:
Vulnerability a weakness in a system, application, network or process that is subject to exploitation or misuse.
Vulnerability a weakness in the computational logic (for example, code) found in software and hardware components that when exploited, results in a negative impact to the confidentiality, integrity, or availability, and the term Vulnerabilities shall be construed accordingly.  Clause, schedule and paragraph headings shall not affect the interpretation of this agreement.  A person includes an individual, corporate or unincorporated body (whether or not having separate legal personality) and that person’s legal and personal representatives, successors or permitted assigns.  A reference to a company shall include any company, corporation or other body corporate, wherever and however incorporated or established.  Unless the context otherwise requires, words in the singular shall include the plural and in the plural shall include the singular.  Unless the context otherwise requires, a reference to one gender shall include a reference to the other genders.  A reference to a statute or statutory provision is a reference to it as it is in force as at the date of this agreement.  A reference to a statute or statutory provision shall include all subordinate legislation made as at the date of this agreement under that statute or statutory provision.  A reference to writing or written excludes faxes but includes e-mail.  References to clauses and schedules are to the clauses and schedules of this agreement; references to paragraphs are to paragraphs of the relevant schedule to this agreement.
Vulnerability a weakness in the computational logic (for example, code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability, and the term Vulnerabilities shall be construed accordingly. Working Day: any day other than a Saturday or Sunday or public holiday in England and Wales.
Vulnerability a weakness in a system, application, network or process that is subject to exploitation or misuse. Workforce Member: employees, volunteers, and other persons whose conduct, in the performance of work for Los Angeles County, is under the direct control of Los Angeles County, whether or not they are paid by Los Angeles County. This includes, but may not be limited to, full and part time elected or appointed officials, employees, affiliates, associates, students, volunteers, and staff from third party entities who provide service to the County. INFORMATION SECURITY AND PRIVACY PROGRAMS
AutoNDA by SimpleDocs
Vulnerability. This section will explore the distinct approaches to vulnerability that the disasters community and the climate change community have used to frame their analysis. Broaching these distinctions from the bottom-up and the top-down, comparisons will be made at the local and the national levels on the approaches they take and the lessons they derive. At both scales and in both domains, characteristics used to measure vulnerability and policy prescriptions will be investigated. Have these approaches succeeded? Looking ahead 30 years, how fit are they? Where analysis on vulnerability has been more focused at the local or the global level, this section will determine if more can, or should, be done to expand it to different scales in the future.
Vulnerability. Vulnerabilities in software or hardware enabling cyber criminals to break in digital.
Vulnerability. The degree to which a system is susceptible to, or unable to cope with, the adverse effects of climate change (including variabilities and extremes). It is a function of the character, magnitude and rate of climate change and the variation to which a system is exposed, its sensitivity, and its adaptive capacity. The process that the CVA will follow is based on the Canadian Council of Forest Ministers’ (CCFM) adaptation framework approach, designed for forest managers to use in assessing vulnerability of sustainable forest management system to climate change. 14 The CVA framework is a series of facilitated workshops and discussions that the Woodlands Staff will undertake to complete 4 key steps:
Time is Money Join Law Insider Premium to draft better contracts faster.