Social Engineering Sample Clauses

Social Engineering a. Social engineering is when someone manipulates you into performing a certain action or divulging confidential information. Social engineers employ many approaches to this – some of the more prominent techniques include:
AutoNDA by SimpleDocs
Social Engineering. These attacks result from internal weaknesses which expose the school’s system, e.g. poor password use.
Social Engineering. A Social Engineering Engagement is designed to determine the susceptibility of company staff to an electronic or telephone-based social engineering attack and the extent to which internal users may represent an exploitable risk to the organization’s security. The engagement will determine what level of access can be achieved through disclosure of credentials or confidential information.
Social Engineering. Client agrees and understands that InfoSight will not be responsible or held liable for any cyberattacks wherein social engineering tactics are employed, including any damages resulting therefrom. For example, common scams to test employees' adherence to the security policies and practices, phishing attempts, business email compromise, corporate account takeover, or ransomware attacks leading to cyber extortion, or the transfer of Client funds.
Social Engineering. The parties agree that Customer will not order, and Verizon will not perform, any IR Services under this Agreement that would constitute social engineering services or assessments.
Social Engineering. Users shall be aware that "social engineers" may ------------------ impersonate others to obtain information in a fraudulent manner. Users shall provide information only to persons known or verified to have a need to know such information for a Buyer-approved purpose. If a caller does not appear to be legitimate, User should report the incident to the Buyer Sponsor or Buyer Security.
Social Engineering. The assessor will/will not use social engineering during the assessment. If social engineering is in scope, the target of this attack will be the client/the service provider/both the client and the service provider.
AutoNDA by SimpleDocs
Social Engineering. SPECIMEN We will pay for Social Engineering Loss resulting directly from a Social Engineering Incident, provided such Social Engineering Incident is first Discovered during the Policy Period. With respect to this Insuring Agreement 7:
Social Engineering. Assess vulnerabilities to various types of Phishing attacks. • Determine adequacy of physical access security and protocols.
Social Engineering 
Time is Money Join Law Insider Premium to draft better contracts faster.