Security Audits definition

Security Audits are audits conducted to determine the compliance of network Devices that have published security standards and to disclose security vulnerabilities and may include, but are not limited to, port scanning and port connections, assessing services by checking versions and responses to certain requests, and crawling websites to perform testing of forms, application responses, or to confirm the existence of certain files, downloading and scanning the source code files of websites.
Security Audits. The County may perform security reviews and testing. Such testing shall ensure all pertinent County security standards are in place. Contractor shall reasonably cooperate with all County security reviews and testing, including but not limited to penetration testing of any cloud-based solution provided by Contractor to County under this Contract. Contractor shall inform County of any security audit or assessment performed by Contractor or at Contractor’s behest or direction that includes County hosted content, within sixty (60) calendar days of such audit or assessment. Notices: Any and all notices permitted or required to be given hereunder shall be deemed duly given (1) upon actual delivery, if delivery is by hand; (2) upon delivery by the United States mail, if delivery is by postage paid registered or certified return receipt requested mail; or (3) upon delivery via electronic mail with paper copy delivered by United States mail or hand to Party. Each such notice shall be sent to the respective Party at the address indicated below or to any other address as the respective Parties may designate from time to time. For Contractor: Attn: Xxxxxx Xxxx Title: Chief Operations Officer Phone 1: 000.000.0000 Phone 2: (000) 000-0000 Email: xxxxxx@xxxxxxxx.xxx For County: County of Orange, Information Technology Attn: Xxx Xxxxx, Project Manager 714-567-5023 0000 X. Xxxx Xxxxxx Xxxxx Xxx, XX 00000 Xxx.Xxxxx@xxxx.xxxxx.xxx For County: County of Orange, Information Technology Attn: Xxx Xxxxxx, Deputy Purchasing Agent 714-567-7488 0000 X. Xxxx Xxxxxx Xxxxx Xxx, XX 00000 Xxxxxxx.Xxxxxx@xxxx.xxxxx.xxx Equal Employment Opportunity: The Contractor shall comply with Executive Order 11246, “Equal Employment Opportunity”, as amended by Executive order 11375, “Amending Executive Order 11246 relating to Equal Employment Opportunity”, and as supplemented by regulations at 41 CFR part 60, “Office of Federal Contract Compliance Programs, Equal Employment Opportunity, Department of Labor.”
Security Audits. We conduct regular security audits and vulnerability assessments to identify and address potential security threats. This will include regular penetration testing by a third party.

Examples of Security Audits in a sentence

  • Section 551.089 - Deliberations Regarding Security Devices or Security Audits.

  • The Solution shall be governed and supported by the Standard Operating Procedures, which includes Security Audits, established Policies, Maintenance components such as SLA, AMC, etc., System Administration and Database Administration support, besides the infrastructure maintenance support for the Application Server, Database Server, OS and Middleware, Security Systems, Network Monitoring, Replication / Backup, Disaster Recovery Setup, etc.

  • The Security Agency shall have resources to assist the principal employer (i.e. the Institute) in conducting Security Audits, Surveys, and Investigation etc.

  • Section 551.076 - Deliberation Regarding Security Devices or Security Audits; Closed Meeting.

  • Deliberation Regarding Security Devices or Security Audits - Sections 551.076 and 551.089 U.

  • Section 551.076, Deliberations on Security Devices or Security Audits Deliberate regarding the deployment, or specific occasions for implementation, of security personnel or devices.

  • Indicate all that apply.Periodic Security Audits Backups Secured Off-site Rules of BehaviorRole-Based TrainingRegular Monitoring of Users’ Security PracticesMethods to Ensure Only Authorized Personnel Have Access to PII Encryption of Backups Containing Sensitive DataMandatory Security, Privacy and Records Management Training Other.

  • Assign an individual to be responsible for managing IT Security Audits.

  • Deliberation Regarding Security Devices or Security Audits – Section 551.076 U.

  • Information Security Audits carried out in last 12 Months : Govt.


More Definitions of Security Audits

Security Audits. We periodically subject our software to penetration tests. We have this done by a specialized and certified external party.
Security Audits. Each Contract year, County may perform or have performed security reviews and subsequent verification testing of Contractors security controls and processes (“Audit”) based on a solution infrastructure review plan. Such Audit shall ensure all pertinent County security standards are in place. Contractor shall inform County of any security audit performed that includes County Data, within sixty (60) calendar days of such Audit. Contractor will provide to County upon request the most recent third party SOC 2 Type 2 report. County may also have the right to review Plans of Actions and Milestones (POA&M) for any outstanding items identified by the SOC 2 Type 2 report requiring remediation as it pertains to the confidentiality, integrityP,agaen2d0 of 240 File Folder: C030087 Page 20 of 240 availability of the County Data. Additionally, the County reserves the authority to conduct unannounced or scheduled audits of Contractor's facilities and practices to verify compliance with applicable statutes, regulations, and policies in accordance with CJIS 5.11.

Related to Security Audits

  • Security Assets means all assets of the Chargor the subject of any security created by this Deed.

  • Security Agreements means the Borrower Security Agreement and the Subsidiary Security Agreement.

  • Intellectual Property Security Agreements has the meaning specified in the Security Agreement.

  • Security Agreement Collateral means all "Collateral" as defined in the Security Agreement.

  • Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).

  • Intellectual Property Security Agreement means the Intellectual Property Security Agreement dated as of the Closing Date among the Loan Parties and the Collateral Agent, granting a Lien in the Intellectual Property and certain other assets of the Loan Parties, as amended and in effect from time to time.

  • Inventory Appraisal means (a) on the Closing Date, the appraisal prepared by Great American Group dated June 2007 and (b) thereafter, the most recent inventory appraisal conducted by an independent appraisal firm pursuant to Section 9.2(b).

  • Patent Security Agreements means the Patent Security Agreements made in favor of Agent, on behalf of itself and Lenders, by each applicable Credit Party.

  • Patent Collateral means all Patents, whether now owned or hereafter acquired by the Company that are associated with the Business.

  • Security Tests means conduct tests of the processes and countermeasures contained in the Security Plan.

  • Copyright Security Agreements means the Copyright Security Agreements made in favor of Agent, on behalf of itself and Lenders, by each applicable Credit Party.

  • Trademark Security Agreements means the Trademark Security Agreements made in favor of Agent, on behalf of Lenders, by each applicable Credit Party.

  • Security Account “Software”, and “Supporting Obligations”.

  • Patent Security Agreement means each Patent Security Agreement executed and delivered by Grantors, or any of them, and Agent, in substantially the form of Exhibit B.

  • Intellectual Property Collateral means, collectively, the Patents, Trademarks, Copyrights, Intellectual Property Licenses and Goodwill.

  • Intellectual Property Security Agreement Supplement has the meaning specified in the Security Agreement.

  • Security freeze means a notice placed in a consumer's credit report, at the request of the consumer, that prohibits the credit rating agency from releasing the consumer's credit report or any information from it relating to an extension of credit or the opening of a new account, without the express authorization of the consumer;

  • Request regarding a list of collateral means a record authenticated by a debtor requesting that the recipient approve or correct a list of what the debtor believes to be the collateral securing an obligation and reasonably identifying the transaction or relationship that is the subject of the request.

  • Patent and Trademark Security Agreement means the Patent and Trademark Security Agreement by the Borrower in favor of the Lender of even date herewith.

  • Trademark Security Agreement means each Trademark Security Agreement executed and delivered by Grantors, or any of them, and Agent, in substantially the form of Exhibit D.

  • Collateral has the meaning specified in the Granting Clause of this Indenture.

  • Trade Secrets Collateral means all common law and statutory trade secrets and all other confidential or proprietary or useful information and all know-how obtained by or used in or contemplated at any time for use in the business of the Grantor (all of the foregoing being collectively called a "Trade Secret"), whether or not such Trade Secret has been reduced to a writing or other tangible form, including all documents and things embodying, incorporating or referring in any way to such Trade Secret, all Trade Secret licenses, including each Trade Secret license referred to in Schedule V attached hereto, and including the right to xxx for and to enjoin and to collect damages for the actual or threatened misappropriation of any Trade Secret and for the breach or enforcement of any such Trade Secret license.

  • Copyright Security Agreement means each Copyright Security Agreement executed and delivered by Grantors, or any of them, and Agent, in substantially the form of Exhibit A.

  • Canadian Security Agreements means, collectively, those certain Amended and Restated Security Agreements, dated as of the Restatement Date, and those certain deeds of movable hypothec dated on or about the Restatement Date, made by the Canadian Credit Parties party thereto in favor of Agent, on behalf of itself and for the benefit of the Secured Parties, as amended, restated, supplemented or otherwise modified from time to time.

  • Real Property Collateral means the parcel or parcels of Real Property identified on Schedule R-1 and any Real Property hereafter acquired by Borrower.

  • Patent means (a) all patents and patent applications in any country or supranational jurisdiction in the Territory, (b) any substitutions, divisionals, continuations, continuations-in-part, provisional applications, reissues, renewals, registrations, confirmations, re-examinations, extensions, supplementary protection certificates and the like of any such patents or patent applications, and (c) foreign counterparts of any of the foregoing.