Security Reviews Sample Clauses

Security Reviews. Complete SOC2 Type II or substantially equivalent reviews in accordance with industry standards, which reviews are subject to review by ASU upon ASU’s request. Currently, no more than two reviews per year are required. Item 4
AutoNDA by SimpleDocs
Security Reviews. The Hartford shall regularly test and monitor its Information Security Safeguards and systems and shall conduct periodic reviews to ensure compliance with the requirements set forth herein. At the County’s reasonable request, The Hartford will allow the County to conduct a walk-through during business hours of its facilities that store and process Nonpublic Personal Information to ascertain compliance with The Hartford’s obligations under this Addendum.
Security Reviews. CaminoSoft shall conduct periodic reviews to ensure compliance with the foregoing security requirements. Legato shall have the right to conduct a review to ensure compliance with the foregoing security restrictions, including an interview of the Responsible Manager and inspection the records maintained by CaminoSoft pursuant to subsection 11.6 above, on three (3) Business Days written notice.
Security Reviews. Web application vulnerability assessments must be performed during the applicationdevelopment and the deployment lifecycle. • All 3rd party software included in the application must meet all security requirementsoutlined herein. • Secure interfaces for USER LOGIN and user data input of Personal Data must utilizecertificates signed by a Trusted Certificate Authority (CA) only. Examples: HTTPS / TLS / SSH.
Security Reviews. Supplier shall provide CUSTOMER the right to an onsite review of Supplier’s security program annually for the entire period that Supplier processes, stores or otherwise has access to CUSTOMER Confidential Information and CUSTOMER’s client’s Confidential Information. Supplier will promptly (but in no event later than thirty (30) days after receiving CUSTOMER’s request to schedule and perform such review) schedule such review for a mutually agreeable date. Supplier shall provide CUSTOMER with access to Supplier’s policies, procedures and other relevant documentation and to Supplier’s Personnel as reasonably necessary to facilitate such reviews. Supplier shall file a remediation plan with CUSTOMER within thirty (30) days following the completion of such review, and Supplier shall remediate each such issue in a timely manner in accordance with a remediation schedule agreed to by the parties.
Security Reviews a. Staff Assistance Visits (SAVs), and Security Program Reviews (SPRs), may be conducted by the ISPM.
Security Reviews. Supplier shall provide Customer the right to an onsite review of Supplier’s security program annually for the entire period that Supplier processes, stores or otherwise has access to Customer Confidential Information and Customer’s client’s Confidential Information. Supplier will promptly (but in no event later than thirty (30) days after receiving Customer’s request to schedule and perform such review) schedule such review for a mutually agreeable date. Supplier shall provide Customer with access to Supplier’s Policies, procedures and other relevant documentation and to Supplier’s Personnel as reasonably necessary to facilitate such reviews. Supplier shall file a remediation plan with Customer within thirty (30) days following the completion of such review, and Supplier shall remediate each such issue in a timely manner in accordance with a remediation schedule agreed to by the parties.
AutoNDA by SimpleDocs
Security Reviews. The Sheriff will cooperate with the Court Security Director and Court Facilities Manager in conducting periodic court security reviews to determine compliance with physical and procedural security standards and will assist in correcting any deficiencies identified. To the extent possible, the Sheriff will implement the standards set forth in the Model Post Orders document (as applicable) dated March, 2014, and provided by the Courts.
Security Reviews. Vendor shall conduct periodic reviews, not less frequently than once a year, of any Vendor electronic systems storing Client Confidential Information, in order to evaluate the security risks of such systems. In addition, Client may conduct periodic vulnerability scans of any network or site maintained by or for Vendor that houses Client Confidential Information. Vendor shall take all reasonable steps to facilitate such scans by Client, and shall promptly remediate any material vulnerability identified by Client in the course of such scans.
Security Reviews. 8.1.1 The Service Provider shall be responsible for the continuous assessment and management of security risks throughout the Contract. The Service Provider shall ensure that its own standards promote a strategic and proactive approach to the management of security, and provide an appropriate emphasis on assessment of threat.
Time is Money Join Law Insider Premium to draft better contracts faster.