Vulnerability Testing Sample Clauses

Vulnerability Testing. The Contractor shall run quarterly vulnerability assessments and promptly report results to the State. Contractor shall remediate all critical issues within 90 days, all medium issues within 120 days and low issues within 180 days. Contractor shall obtain written State approval for any exceptions. Once remediation is complete, Contractor shall re-perform the test.
AutoNDA by SimpleDocs
Vulnerability Testing. Copper has obtained third-party vulnerability testing of its application. Upon Customer’s written request, Copper will provide Customer with a report that summarizes the results of the vulnerability testing (a “Report”). Customer will treat Reports as Copper’s Confidential Information for purposes of the Agreement.
Vulnerability Testing a) Atlassian conducts internal vulnerability testing, as described here. This includes our bug bounty program. We make the results of these internal tests publicly available and commit to making bug fixes in line with our Security Bug Fix Policy. b) Customer may, either itself or through an independent third party (who has entered into confidentiality obligations with Atlassian), perform its own vulnerability testing of its Cloud Products in accordance with the Security Test Rules. Customer may report any vulnerabilities impacting the Cloud Products to Atlassian in accordance with the procedures set forth in the Security Test Rules. c) Atlassian will use commercially reasonable efforts to address identified security vulnerabilities in our Cloud Products and our infrastructure in accordance with the Security Bug Fix Policy. The parties acknowledge that Atlassian may update the Security Bug Fix Policy from time to time in its discretion, provided such updates do not result in a material derogation of the Security Bug Fix Policy. Measures for user identification and authorisation Atlassian cloud users can authenticate using username and password, or external IdPs (incl. via XXXX, Google, Microsoft and Apple). All credentials are hosted in the application database, which is encrypted at rest. Passwords are stored using a secure hash + salt algorithm. Administrators are able to configure and enforce password complexity requirements for managed accounts via Atlassian Access: xxxxx://xxxxxxx.xxxxxxxxx.xxx/security-and-access-policies/docs/manage-your-password-policy/. Administrators are also able to enforce SSO via Atlassian Access. Measures for the protection of data during transmission See the item above titled “Measures of pseudonymisation and encryption of data“ Measures for the protection of data during storage Data Hosting Facilities Atlassian will, no less frequently than annually, request assurances (e.g., in the form of an independent third party audit report and vendor security evaluations) from its data hosting providers that store or process Customer Data that: a) such data hosting provider’s facilities are secured in an access-controlled location and protected from unauthorized access, damage, and interference; b) such data hosting provider’s facilities employ physical security appropriate to the classification of the assets and information being managed; and Measure Description c) such data hosting provider’s facilities limit and screen all entrants...
Vulnerability Testing. No attempt to probe, scan, penetrate or test the vulnerability of a Crowe system or network or to breach Xxxxx’x security or authentication measures, whether by passive or intrusive techniques, may be done without Xxxxx'x express written consent.
Vulnerability Testing. Vendor agrees to perform vulnerability assessments at least on a quarterly basis.
Vulnerability Testing. The Contractor shall run vulnerability assessments of its software and provide security patches as part of its release schedule as part of its maintenance program test.
Vulnerability Testing. You may not attempt to probe, scan, penetrate or test the vulnerability of a Novus system or network or to breach Novus’ security or authentication measures, whether by passive or intrusive techniques, without Novus’s express written consent.
AutoNDA by SimpleDocs
Vulnerability Testing. The Contractor shall run quarterly vulnerability assessments and shall provide an executive summary of the report, upon request, to the State. Contractor shall remediate all critical issues within 90 days, all medium issues within 120 days and low issues within 180 days. Contractor shall obtain written State approval for any exceptions. Once remediation is complete, Contractor shall re-perform the test. Vendor will allow Vermont DOC to view confidential vulnerability report electronically on a mutually agreed upon date and time.
Vulnerability Testing. Upon reasonable prior notice to Company, Customer may periodically (but not more frequently than once per year) perform vulnerability tests on the Company’s networks, software and systems, including any Application Software, to confirm Company’s compliance with its obligations the Agreement and this Data Privacy and Security Exhibit. Company will promptly address and correct all security vulnerabilities identified in a vulnerability test or report.
Vulnerability Testing. (a) Harvest conducts internal vulnerability testing, as described here. This includes identifying and fixing bugs according to risk and priority. (b) Harvest will use commercially reasonable efforts to address identified security vulnerabilities in our products. APPENDIX 2: List of HARVEST TECHNOLOGY PTY LTD’s current sub-processors Sub- processor Purpose Entity Country Website Amazon Web Services, Inc Data hosting Australia, Ireland, USA xxxxx://xxx.xxxxxx.xxx Digital Ocean Data hosting USA Htts://xxx.xxxxxxxxxxxx.xxx Dropbox International Unlimited Company File hosting services Ireland, USA xxxxx://xxxxxxx.xxx Freshworks / Freshdesk Customer service and support Australia, Germany, India, UK, USA xxxxx://xxx.xxxxxxxxxx.xxx/freshdesk/ Hotjar Ltd Web analytics Malta xxxxx://xxx.xxxxxx.xxx Google Ireland Limited Web analytics Ireland xxxxx://xxxxxxxxx.xxxxxx.xxx Microsoft Corporation Email service provider and file hosting services Ireland, USA xxxxx://xxxxxxxxx.xxx OVH Australia Pty Ltd Data hosting Australia xxxxx://xxx.xxxxxxxx.xxx/en-au/ Rocketgenius, Inc. dba Gravity Forms Customer service USA xxxxx://xxxxxxxxxxxx.xxx SFDC Australia Pty Ltd (Salesforce) Account management CRM Australia xxxxx://xxx.xxxxxxxxxx.xxx SAP Australia Pty Ltd Account management CRM Australia xxxxx://xxx.xxx.xxx/australia/index.html Stripe Payments Australia Pty Ltd Payment Gateway Australia xxxxx://xxxxxx.xxx/au/
Time is Money Join Law Insider Premium to draft better contracts faster.