Vulnerability Assessments Sample Clauses

Vulnerability Assessments. For all Planning grant agreements (Resilient Florida Grant Program and Regional Resilience Entities), the Grantee must submit Exhibit I, Vulnerability Assessment Compliance Checklist Certification, with the final grant deliverable(s).
AutoNDA by SimpleDocs
Vulnerability Assessments. Company will perform periodic vulnerability assessments of its Service and network.
Vulnerability Assessments. 22. Accessing Party shall maintain a vulnerability management and assessment program based on industry standard practices that frequently assesses Affected Computing Devices and mitigates or eliminates vulnerabilities.
Vulnerability Assessments. Administrator will conduct quarterly vulnerability assessments that meet the following criteria:
Vulnerability Assessments. Without limiting the Data Recipient's obligations set forth in this Agreement, the Data Recipient will maintain, at its own expense, a vulnerability assessment program that is consistent with the Data Recipient's standard process and procedures, or at least annually, on all information applications and/or systems associated with accessing, processing, storage, communication and/or transmission of the Data including the Data Recipient's systems and networks. The assessment program must include a methodology for identifying, quantifying, ranking and mitigating weaknesses in the Data Recipient's systems.
Vulnerability Assessments. Without limiting Servicer’s obligations set forth in the Agreement, Servicer will conduct, at its own expense, a vulnerability assessment on a schedule that is consistent with Servicer’s standard process and procedures, or at least annually, on all information applications and/or systems associated with accessing, processing, storage, communication and/or transmission of Servicing Data including Servicer’s systems and networks. The assessment process must include a methodology for identifying, quantifying, ranking and mitigating weaknesses in Servicer systems (“Vulnerability Assessment”). These Vulnerability Assessments will be done for the system and networks related to the Services and will be carried out internally. In addition, Servicer must undergo an annual perimeter network penetration test, conducted by a third party organization that specializes in providing this type of security assessment service. Position Holder Trust may, with Servicer’s consent (not to be unreasonably withheld), at Position Holder Trust’s own expense, conduct periodic independent onsite vulnerability and information security assessments, with prior reasonable notice, with respect to Servicer’s security as it relates to the Services.
Vulnerability Assessments. The Processor performs periodic vulnerability assessments and network penetration testing on any and all systems, platforms, networks and applications that Process Personal Data.
AutoNDA by SimpleDocs
Vulnerability Assessments. Veson shall conduct vulnerability assessments (including penetration testing) of the Veson products and services on a regular basis. Any identified issues shall be remediated in an appropriate timeframe in accordance with Veson policies.
Vulnerability Assessments. Voya will conduct monthly vulnerability assessments that meet the following criteria:
Vulnerability Assessments. Supplier shall retain an independent third party to conduct quarterly vulnerability assessments of any systems or networks that Process Personal Information. Supplier shall promptly remediate any critical or high-risk vulnerabilities identified in connection with any such vulnerability assessment. If Supplier cannot remediate a critical vulnerability within three (3) calendar days, Supplier shall notify Leidos of the vulnerability. Supplier shall remediate all other identified vulnerabilities in accordance with its information security policy (or policies) and associated procedures.
Time is Money Join Law Insider Premium to draft better contracts faster.