Security Weakness definition

Security Weakness means a flaw or vulnerability of any kind in the security controls or other measures used to protect the Data.
Security Weakness has the meaning given in paragraph 5.1 of Part C of Schedule 2.5 (Security Requirements).

Examples of Security Weakness in a sentence

  • I also accept and will abide by L.E.A.D. Academy Trust’s Internet AUA, its email policy and its Information Security Weakness and Event Reporting policy.

  • Unless authorized by the Information Security Department, at no time shall an attempt be made to take advantage of any Security Weakness or Security Vulnerability.

  • DOT Order 1351.37; DOT, Security Weakness Management Guide (2017).Table 5.

  • See also Mimecast, ROPEMAKER Email Security Weakness - Vulnerability or Application Misuse?, available at https://www.mimecast.com/blog/2017/08/introducing-the-ropemaker-email-exploit/ and Doug Olenick, 2018 Winter Olympics Being Used As Phishing Attack Bait, available at https://www.scmagazine.com/2018-winter- olympics-being-used-as-phishing-attack-bait/article/735639/.

  • The world’s leading device manufacturers support two key GSMA initiativesto strengthen IMEI security: definition of technical design principles for IMEI security implementation, and participation in the GSMA’s IMEI Security Weakness Reporting and Correction Process.More could be done by some device manufacturers to enhance IMEI integrity, which is essential to effective device blocking.

  • DOT’s Security Weakness Remediation Process Lacks Adequate ControlsFISMA requires agencies to develop processes to remediate security weaknesses that they detect during system monitoring and testing.

  • Security Weakness in the Smart Grid Key Distribution Scheme Proposed by Xia and Wang.

  • Until such time as the Dispute is resolved in accordance with the Dispute Resolution Procedure, the Contractor shall comply with any additional or alternative security measures notified by the DCC which are (in the reasonable opinion of the DCC) necessary to address relevant Security Weakness.

  • The parties will each bear their own costs of audits under clause 19.1(a), except where the audit reveals any non-compliance with the Contract by the Service Provider (including any Data Breach or Security Weakness), in which case the costs of the audit will be borne by the Service Provider.

  • FAA must prioritize POA&M remediation efforts across its organizations as stated in the DOT Security Weakness Management Guide.

Related to Security Weakness

  • Weakness means a flaw in the SOQ that increases the risk of unsuccessful Contract performance. A significant Weakness in the SOQ is a flaw that appreciably increases the risk of unsuccessful Contract performance.

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Internal Controls for districts means processes designed and im- plemented by districts to provide reasonable assurance regarding the achievement of objectives in the following categories:

  • Internal control means a set of systems to ensure that financial and other records are reliable and complete and which ensure adherence to the entity's management policies, the orderly and efficient conduct of the entity, and the proper recording and safeguarding of assets and resources;

  • Security System means the building access control system developed by Alya and known as the O.P.E.N.centrix-Open Platform for Essential Network, which includes, without limitation, the Application Software, the firmware containing the Application Software, the O.P.E.N.cortex platform software and all hardware related thereto; and

  • Deficiencies means defects arising from non-conformity with the mutually agreed specifications and/or failure or non-conformity in the Scope of the Services.

  • Collateral Reports means the reports with respect to the Collateral referred to in Annex F.

  • Central Repository means the repository responsible for the receipt, consolidation, and retention of all information reported to the CAT pursuant to SEC Rule 613 and the CAT NMS Plan.

  • Security freeze means a notice placed in a credit report, at the

  • Internal combustion engine or ‘engine’ means an energy converter, other than a gas turbine, designed to transform chemical energy (input) into mechanical energy (output) with an internal combustion process; it includes, where they have been installed, the emission control system and the communication interface (hardware and messages) between the engine's electronic control unit(s) and any other powertrain or non-road mobile machinery control unit necessary to comply with Chapters II and III;

  • Internal control over financial reporting means a process effected by an insurer’s board of directors, management and other personnel designed to provide reasonable assurance regarding the reliability of the financial statements, i.e., those items specified in Section 5(B)(2) through 5(B)(7) of this regulation and includes those policies and procedures that:

  • Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).

  • Floodplain Management Regulations means this ordinance and other zoning ordinances, subdivision regulations, building codes, health regulations, special purpose ordinances, and other applications of police power. This term describes federal, state or local regulations, in any combination thereof, which provide standards for preventing and reducing flood loss and damage.

  • Internal inspection means as complete an examination as can be reasonably made of the internal and external surfaces of a boiler or pressure vessel while it is shut down and while manhole plates, handhole plates or other inspection opening closures are removed as required by the inspector.

  • Information Security Incident means (i) any actual or suspected incident involving Seller Information System that may involve Buyer’s Sensitive Information, or (ii) any actual or suspected unauthorized access to, use, or disclosure of Buyer’s Sensitive Information.

  • Financial Reporting Measures means measures that are determined and presented in accordance with the accounting principles used in preparing the Company’s financial statements, and all other measures that are derived wholly or in part from such measures. Stock price and total shareholder return (and any measures that are derived wholly or in part from stock price or total shareholder return) shall, for purposes of this Policy, be considered Financial Reporting Measures. For the avoidance of doubt, a Financial Reporting Measure need not be presented in the Company’s financial statements or included in a filing with the SEC.

  • Statement of Grievance shall name the grievant(s) involved, the facts giving rise to the grievance, provision(s) of the Agreement alleged to be violated and the remedy (specific relief) requested.

  • Financial Reports means the Annual Financial Statements and the Interim Accounts.

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security Management Plan means the Supplier's security management plan prepared pursuant to paragraph 3 of schedule 2 an outline of which is set out in paragraph 2.7 of the Order Form as updated from time to time;

  • Financial Reporting Measure means any measure determined and presented in accordance with the accounting principles used in preparing the Company’s financial statements, and any measures derived wholly or in part from such measures, including GAAP, IFRS and non-GAAP/IFRS financial measures, as well as stock or share price and total equityholder return.

  • NIST Cybersecurity Framework means the U.S. Department of Commerce National Institute for Standards and Technology Framework for Improving Critical Infrastructure Cybersecurity (Version 1.1).

  • Collateral Report means any certificate (including any Borrowing Base Certificate), report or other document delivered by any Grantor to the Administrative Agent or any Lender with respect to the Collateral pursuant to any Loan Document.

  • Security Tests means conduct tests of the processes and countermeasures contained in the Security Plan.

  • Financial Report means the annual financial report prepared under Chapter 2M of the Corporations Act for the Company and its controlled entities;

  • Electronic Subcontracting Reporting System (eSRS) means the Governmentwide, electronic, web-based system for small business subcontracting program reporting. The eSRS is located at http://www.esrs.gov.