Common use of Vulnerability Monitoring Clause in Contracts

Vulnerability Monitoring. Zoommust continuously gather information and analyze vulnerabilities in light of existing and emerging threats and actual attacks. Processes must include vulnerability scans, anti-malware, Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS), logging and security information and event management analysis and correlation.

Appears in 4 contracts

Samples: Student Data Privacy Agreement, higherlogicdownload.s3.amazonaws.com, www.queensu.ca

AutoNDA by SimpleDocs

Vulnerability Monitoring. Zoommust Zoom must continuously gather information and analyze vulnerabilities in light of existing and emerging threats and actual attacks. Processes must include vulnerability scans, anti-malware, Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS), logging and security information and event management analysis and correlation.

Appears in 2 contracts

Samples: zoom.us, explore.zoom.us

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.