Processing Environment definition

Processing Environment means the combination of software and hardware on which the Application runs. “Application” shall mean the computer code that supports and accomplishes the State’s requirements as set forth in this Contract. “Penetration Tests” shall be in the form of attacks on the Contractor’s computer system, with the purpose of discovering security weaknesses which have the potential to gain access to the Processing Environment’s features and data. The “Vulnerability Assessment” shall be designed and executed to define, identify, and classify the security holes (vulnerabilities) in the Processing Environment. The Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Processing Environment.
Processing Environment means the combination of software and hardware on which the Application runs. “Application” shall mean the
Processing Environment means the combination of software and hardware on which the Application runs. “

Examples of Processing Environment in a sentence

  • The written statement of Deficiencies shall be entered into the CMS Automated Survey Processing Environment (ASPEN) system and sent to HCPF to the designated email address.

  • The Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Processing Environment.

  • The written statement of Deficiencies shall be entered into the CMS Automated Survey Processing Environment (ASPEN) system.

  • The Cycle E Processing Environment shall include *** (*) ******* ********* (“****”), ***** (*)**** *********** (** ******** ****** ** ******* *** *******), *** (*) *******® ********** ***********, *** (*) ****** ************** ******** *********** *** ******* ************ **** *********** (“******”).

  • The audit report shall include at least one audit type that ascertains the Processing Environment uses FIPS 1402 encryption technologies to encrypt data at rest and date in motion and will report any findings if DRC is not appropriately using these technologies.

  • The IMS Processing Environment will be protected against the risks of intrusion through the use of suitable software, the effectiveness and updating of which must be checked periodically, in accordance with industry standards.

  • Upon expiration or termination of this Agreement, TSI shall have the option to purchase the Hardware from the Initial Distributed Processing Environment as set forth in Exhibit C hereto, in an "as is" condition at that time, for the amount of One Dollar ($1.00).

  • Service Provider must develop, implement and enforce reasonable written policies and procedures designed to ensure that Service Provider furnishes and maintains physical and electronic security for the IMS Processing Environment in compliance with this Exhibit, including standards for physical security as described in this subsection (g).

  • The procedure for reporting and managing security incidents regarding the IMS Processing Environment must include a record of each incident, including the time at which it occurred, the person reporting it, to whom it was reported, and the effects thereof.

  • If the annual system audit report contains any findings in the Processing Environment that are deemed critical in nature by the assessor, those critical findings will be remediated within 30 days of the issuance of the report.


More Definitions of Processing Environment

Processing Environment means the combination of software and hardware on which the Application runs. “Application” shall mean the computer code that supports and accomplishes the State’s requirements as set forth in this Contract. “Penetration Tests” shall be in the form of attacks on the Contractor’s computer system, with the purpose of discovering security weaknesses which have the potential to gain access to the Processing Environment’s features and data. The “Vulnerability Assessment” shall be designed and executed to define, identify, and classify the security holes (vulnerabilities) in the Processing Environment. The Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Processing Environment. The Contractor shall provide a letter of attestation on its processing environment that penetration tests and vulnerability assessments has been performed on an annual basis and taken corrective action to evaluate and address any findings. In the event of an unauthorized disclosure or unauthorized access to State data, the State Strategic Technology Solutions (STS) Security Incident Response Team (SIRT) must be notified and engaged by calling the State Customer Care Center (CCC) at ▇▇▇-▇▇▇-▇▇▇▇. Any such event must be reported by the Contractor within twenty-four (24) hours after the unauthorized disclosure has come to the attention of the Contractor.
Processing Environment means the combination of software and hardware on which the Application runs. “Application” shall mean the computer code that supports and accomplishes the State’s requirements as set forth in this Contract. “Penetration Tests” shall be in the form of attacks on Contractor’s computer system, with the purpose of discovering security weaknesses that have the potential to gain access to the Processing Environment’s features and data. The “Vulnerability Assessment” shall be designed and executed to define, identify, and classify the security holes (vulnerabilities) in the Processing Environment. Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Processing Environment. Upon State request, Contractor shall provide a copy of all Confidential State Data it holds. The Contractor shall provide such data on media and in a format determined by the State. Upon expiration of the Agreement, and in consultation with the State, Contractor shall destroy all Confidential State Data it holds in accordance with the current version of the National Institute of Standards and Technology (“NIST”) Special Publication 800-88. Contractor shall provide a written confirmation of destruction to the State within ten (10) business days after destruction. Contractor may maintain Confidential State Data it holds in its archives or backups, and such Confidential State Data shall be purged in accordance with Contractor’s backup lifecycle policies, provided that the requirements of this Section shall survive for as long as the Contractor holds State Data.
Processing Environment means the combination of software and hardware on which the Application runs. “Penetration Tests” shall be in the form of software attacks on the Contractor’s computer system, with the purpose of discovering security weaknesses, and potentially gaining access to the computer's features and data. The “Vulnerability Assessment” shall have the goal of defining, identifying, and classifying the security holes (vulnerabilities) in the Contractor’s computer, network, or communications infrastructure. The Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Contractor’s Processing Environment.

Related to Processing Environment

  • Services Environment refers to the combination of hardware and software components owned, licensed or managed by Oracle to which Oracle grants You and Your Users access as part of the Cloud Services which You have ordered. As applicable and subject to the terms of this Agreement and Your order, Oracle Programs, Third Party Content, Your Content and Your Applications may be hosted in the Services Environment.

  • Customer Environment means Customer’s data network/equipment and premises environment.

  • Production Environment means a logical group of virtual or physical computers comprised within the Cloud Environment to which the Customer will be provided with access and use the purchased Cloud Application(s) in production and for its generally marketed purpose.

  • ICT Environment means the Authority System and the Contractor System. “Information” has the meaning given under section 84 of the FOIA.

  • Operating Environment means, collectively, the platform, environment and conditions on, in or under which the Software is intended to be installed and operate, as set forth in the Statement of Work, including such structural, functional and other features, conditions and components as hardware, operating software and system architecture and configuration.