Solution Security Sample Clauses

Solution Security. Swissmeda implements commercially available security software, hardware and techniques to minimize and prevent non-authorized use of the Solution. These include firewalls, intrusion detection software tools, and monitored use of the Solution. The Solution also performs authentication of interactive user sessions. For increased security, the Solution uses HTTPS, which is HTTP over SSL (Secure Sockets Layer). The SSL security protocol provides data encryption, server authentication, message integrity, and optional client authentication for TCP/IP connections. The Solution's Webservers use a server digital certificate to enable SSL connections.
AutoNDA by SimpleDocs
Solution Security. 5.1. Software development life cycle (SDLC): SailPoint shall maintain a software development life cycle policy that defines the process by which personnel create secure products and services and the activities that personnel must perform at various stages of development (requirements, design, implementation, verification, documentation and delivery).
Solution Security a. Software development life cycle (SDLC): IDVerifact shall maintain a software development life cycle policy that defines the process by which personnel create secure products and services and the activities that personnel must perform at various stages of development (requirements, design, implementation, verification, documentation, and delivery).
Solution Security. Arcadis has a range of experience working with web-based products and their corresponding security. Arcadis’s Software Development team is accredited with the following certifications: • ISO 9001:2015 - Quality management systems • ISO/IEC 27001:2013 - Information Security Management • ISO/IEC 20000-1:2011 - Information technologyService management • CMMI Level 5 - Capability Maturity Model Integration Several of Arcadis’s products have also cleared the Cyber Security VAPT (Vulnerability Assessment & Penetration Testing) and are certified including CurbIQ. This testing was carried out as per the OWASP Testing Guidelines, SANS 25 & NIST Framework as per international standards. The process involves the following activities: • Acquiring detailed information about the devices, network architecture, protocols used • Devising a strategy to simulate real time threat scenario on the infrastructure. • Generating exhaustive set of test cases to run on any target environment against which the target is tested. • Plans are devised to optimize the entire process and minimize any adverse effect on live infrastructure. • Vulnerability Detection: Tests are run on respective elements of the IT infrastructure with the help of industry benchmark tools which help in listing out the potential vulnerabilities against each device. • Penetration Testing: Out of all the potential vulnerabilities, a penetration test is carried out to list out the most probable attack points to the client. 80% of the VAPT work is done here. Customized scripts are written as per the business logics and exploit each vulnerability manually for the best result. • Industry benchmark security testing tools across each of the IT infrastructure as per the business and technical requirements. • Below are few from many of the tools that are used, along with the Manual Testing wherever needed.
Solution Security 

Related to Solution Security

  • Aviation Security (1) Each Contracting Party reaffirms that its obligation to the other Contracting Party to protect the security of civil aviation against unlawful interference forms an integral part of this Agreement. Each Contracting Party shall in particular act in conformity with the aviation security provisions of the Convention on Offences and Certain Other Acts Committed on Board Aircraft, signed at Tokyo on 14 September 1963, the Convention for the Suppression of Unlawful Seizure of Aircraft, signed at The Hague on 16 December 1970 and the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation, signed at Montreal on 23 September 1971.

  • UNION SECURITY 7.01 The Employer shall deduct monthly from the pay due to each employee who is covered by this Agreement a sum equal to the monthly Union dues of each such employee. Where an employee has no earnings during the first payroll period, the deduction shall be made in the next payroll period where the employee has earnings, within that month. The Union shall notify the employer in writing of the amount of such dues from time to time. The Employer will send to the Union its cheque for the dues so deducted in the month following the month in which the dues are deducted. When arrears or adjustments are submitted retroactively, the dues month and an explanation will accompany any such dues.

  • Application Security The ISP will require that in-house application development be governed by a documented secure software development life cycle methodology, which will include deployment rules for new applications and changes to existing applications in live production environments.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • ASSOCIATION SECURITY 5.01 The Hospital will deduct from each nurse covered by this Agreement an amount equal to the regular monthly Association dues designated by the Association. The deduction period for a part-time nurse may be extended where the nurse does not receive any pay in a particular month. Where a nurse has no dues deducted during the payroll period from which dues are normally deducted, that deduction shall be made in the next payroll period provided the nurse has earnings in the next payroll period. If the failure to deduct dues results from an error by the Hospital, then, as soon as the error is called to its attention by the union, the Hospital shall make the deduction in the manner agreed to by the parties. If there is no agreement, the Hospital shall make the deduction in the manner prescribed by the union.

  • ARTICLE UNION SECURITY (a) It is agreed that all employees covered by this Agree- ment shall become and remain members of the Union in good standing as a condition of employment. New employees shall make application for membership in the Union at the time of their hiring and shall become and remain members of the Union in good standing, as a condition of employment. The Employer agrees that it will inform all new employees prior to or at the time of hiring of the Union security provisions of the Agree- ment. The Employer or designate will during the first three (3) weeks of each individual’s employment make known to the new employee the names and work locations of union stewards in the store. The Employer shall, during the term of this Agreement, as a condition of employment, deduct from members of the bargaining unit the regular weekly Union Dues and such Dues shall be remitted to the Union prior to the 15th day of the month following the month in which such deduction is made. The Employer shall notify the Union of new full-time employees’ classifications and rates of pay in addition to ter- minations, on a monthly basis. Deduction statements shall be documented by location, containing the full name of the employee and his starting date and social insurance number subject to the employee consenting to the use of his or her social insurance number. The Employer agrees to record the annual Union Dues deductions for each employee on his Form. Employers shall provide dues information to the Union in an electronic format acceptable to both parties. In the event that such weekly Dues are changed during the term of the Agreement, such change must be given to the Employer by notice properly authorized by Union Officials and shall become effective within one month following the date the notice is received. New employees shall be documented and documents for- warded to the Union Office within two (2) weeks of hiring. The first sixty (60) days worked at each store shall be con- sidered a probationary period. It is understood between the Employer and the Union that a probationary employee shall be considered an employee for all purposes of the Agree- ment save that a probationary employee may be dismissed at any time during the probationary period.

  • E7 Security E7.1 The Authority shall be responsible for maintaining the security of the Authority’s Premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority’s Premises, and shall ensure that all Staff comply with such requirements.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use.

  • Bid Security 2.1 Bid security, as a guarantee of good faith, in the form of a certified check, cashier's check, or bidder's bond, may be required to be submitted with this bid document, as indicated on the bid.

  • RECOGNITION AND UNION SECURITY 2.1 The Employer recognizes the Union as the exclusive collective bargaining agent for employees as certified by the Nebraska Commission of Industrial Relations (CIR) as set forth in Appendix A. The Employer will not during the life of this Agreement bargain with any group of employees or with any other employee organization with respect to terms and conditions of employment covered by this Agreement, which are considered to be mandatory subjects of collective bargaining.

Time is Money Join Law Insider Premium to draft better contracts faster.