Vulnerability Scan Clause Samples

A Vulnerability Scan clause requires one or both parties to conduct systematic checks of their computer systems or networks to identify security weaknesses. Typically, this involves using specialized software tools to scan for known vulnerabilities, misconfigurations, or outdated software that could be exploited by cyber attackers. By mandating regular vulnerability scans, the clause helps ensure that security risks are detected and addressed proactively, thereby reducing the likelihood of data breaches and enhancing overall cybersecurity.
Vulnerability Scan. Lattice shall ensure that vulnerability scans are performed on servers continuously and network security scans are completed at a minimum biannually, in each case using an industry standard vulnerability scanning tool.
Vulnerability Scan. 5.1 Interactive will perform the following Vulnerability Scan: (a) External scan; (b) Internal scan including authenticated scans; 5.2 Interactive will perform automated scanning of Assets at a date/time agreed between the Customer and Interactive.
Vulnerability Scan. 1.1 The Vulnerability Scan identifies security vulnerabilities exposed on the Assets. The vulnerability scanning function is implemented using a network of vulnerability scanners and/or agents using the Cloud Platform. 1.2 Interactive will perform one Vulnerability Scan of IP addresses, which the Customer must provide to Interactive in writing, to identify and rank vulnerabilities in network infrastructure and web applications in accordance with the schedule agreed between the parties during the Preparation Phase. This is a proactive check of the network and web applications to reduce the cyber security risks due to vulnerabilities. 1.3 Interactive will provide notification of vulnerabilities to the Assets by business criticality and severity, with recommendations to mitigate the vulnerability. This may include recommendations to patch systems or change rules on perimeter devices. 1.4 Interactive will perform the Vulnerability Scan one time only, at a date and time to be agreed between the parties. 1.5 The Customer may request additional Vulnerability Scans be performed by making a Service Request. If the Customer requests additional Vulnerability Scans, they will be deemed Out of Scope Work.
Vulnerability Scan. Scan for Vulnerabilities on the Host specified by the End User.
Vulnerability Scan. Gainsight shall ensure that vulnerability scans are completed at minimum quarterly using an industry standard vulnerability scanning tool. All cloud hosted systems shall be scanned, where applicable and where approved by cloud service provider.

Related to Vulnerability Scan

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Human Leukocyte Antigen Testing This plan covers human leukocyte antigen testing for A, B, and DR antigens once per member per lifetime to establish a member’s bone marrow transplantation donor suitability in accordance with R.I. General Law §27-20-36. The testing must be performed in a facility that is: • accredited by the American Association of Blood Banks or its successors; and • licensed under the Clinical Laboratory Improvement Act as it may be amended from time to time. At the time of testing, the person being tested must complete and sign an informed consent form that also authorizes the results of the test to be used for participation in the National Marrow Donor program.

  • Target Population TREATMENT FOR ADULT (TRA) Target Population