Security Audits definition

Security Audits are audits conducted to determine the compliance of network Devices that have published security standards and to disclose security vulnerabilities and may include, but are not limited to, port scanning and port connections, assessing services by checking versions and responses to certain requests, and crawling websites to perform testing of forms, application responses, or to confirm the existence of certain files, downloading and scanning the source code files of websites.
Security Audits. Each Contract year, County may perform or have performed security reviews and subsequent verification testing of Contractors security controls and processes (“Audit”) based on a solution infrastructure review plan. Such Audit shall ensure all pertinent County security standards are in place. Contractor shall inform County of any security audit performed that includes County Data, within sixty (60) calendar days of such Audit. Contractor will provide to County upon request the most recent third party SOC 2 Type 2 report. County may also have the right to review Plans of Actions and Milestones (POA&M) for any outstanding items identified by the SOC 2 Type 2 report requiring remediation as it pertains to the confidentiality, integrityP,agaen2d0 of 240 File Folder: C030087 Page 20 of 240 availability of the County Data. Additionally, the County reserves the authority to conduct unannounced or scheduled audits of Contractor's facilities and practices to verify compliance with applicable statutes, regulations, and policies in accordance with CJIS 5.11.
Security Audits. The County may perform security reviews and testing. Such testing shall ensure all pertinent County security standards are in place. Contractor shall reasonably cooperate with all County security reviews and testing, including but not limited to penetration testing of any cloud-based solution provided by Contractor to County under this Contract. Contractor shall inform County of any security audit or assessment performed by Contractor or at Contractor’s behest or direction that includes County hosted content, within sixty (60) calendar days of such audit or assessment. Notices: Any and all notices permitted or required to be given hereunder shall be deemed duly given (1) upon actual delivery, if delivery is by hand; (2) upon delivery by the United States mail, if delivery is by postage paid registered or certified return receipt requested mail; or (3) upon delivery via electronic mail with paper copy delivered by United States mail or hand to Party. Each such notice shall be sent to the respective Party at the address indicated below or to any other address as the respective Parties may designate from time to time. Equal Employment Opportunity: The Contractor shall comply with Executive Order 11246, “Equal Employment Opportunity”, as amended by Executive order 11375, “Amending Executive Order 11246 relating to Equal Employment Opportunity”, and as supplemented by regulations at 41 CFR part 60, “Office of Federal Contract Compliance Programs, Equal Employment Opportunity, Department of Labor.”

Examples of Security Audits in a sentence

  • The Contractor must contract with a third -party to perform a yearly Information Security Audits of their primary and backup datacenter.

  • Customer will conduct on-site Security Audits at SAS’ corporate headquarters in Cary, North Carolina, USA during SAS’ normal business hours.

  • On-site Security Audits must not interfere with SAS’ normal business operations and will not exceed three (3) SAS Business Days.

  • Customer may request additional Security Audits during the Term of an Order Form provided, however, that Customer may not conduct more than one (1) Security Audit during any twelve (12) month period.

  • Security Audits will be conducted periodically by the System Admin Staff in pursuant to the baseline standards defined in the HUD 2004 Data and Technical Standards.

  • Disclosing Party’s right, and the right of its representatives and agents, to conduct Security Audits, and any exercise of such right, shall not in any way diminish or affect Receiving Party’s duties and liabilities under this Agreement.

  • Customer hereby authorizes SiteLock to perform Security Audits, on any Devices and IPs specified by Customer.

  • Taking into account the nature of the Services and the information available to Coalfire, Coalfire will assist Client in complying with Client’s obligations in respect of data protection impact assessments and prior consultation pursuant to Articles 35 and 36 of the GDPR, by providing the information Coalfire makes available under Section 11, Security Audits.

  • Security Audits – Vulnerability Assessments We welcome external security audits and assessments, but need to be informed of any operation that is ongoing on our systems.

  • The MTA shall be entitled to require the SI to perform a security audit other than an SSAE No. 16 Audit if, in the determination of the Engineer, an alternative procedure is warranted based on industry practice, developments in information security or other relevant factors (SSAE No. 16 Audits and such alternative procedures are collectively referred to as "Security Audits").


More Definitions of Security Audits

Security Audits. We conduct regular security audits and vulnerability assessments to identify and address potential security threats. This will include regular penetration testing by a third party.
Security Audits. Regularly conduct security audits and vulnerability scans to promptly identify and fix potential security risks. Data Backup and Recovery: Establish data backup and recovery mechanisms to ensure the integrity and availability of personal data in case of accidents.
Security Audits. We periodically subject our software to penetration tests. We have this done by a specialized and certified external party.

Related to Security Audits

  • Security Assets means all assets of the Chargor the subject of any security created by this Deed.

  • Audits means the audits and reviews carried out by the Bank or the Bank’s auditors, experts and insurers, as the case may be in accordance with the terms and conditions set out in Section 18.

  • Security Agreements means the U.S. Security Agreement and the Canadian Security Agreement.

  • Intellectual Property Security Agreements has the meaning specified in the Security Agreement.

  • Search ’ means to review, manually or by auto- mated means, agency records for the purpose of locating those records which are responsive to a request.