Vulnerability Assessments Clause Examples

The Vulnerability Assessments clause requires regular evaluation of systems, networks, or processes to identify and address security weaknesses. Typically, this involves scheduled scans or tests performed by internal teams or third-party experts, with findings reported and remediated within specified timeframes. Its core function is to proactively manage and reduce security risks by ensuring vulnerabilities are detected and mitigated before they can be exploited.
POPULAR SAMPLE Copied 1 times
Vulnerability Assessments. Without limiting the Data Recipient's obligations set forth in this Agreement, the Data Recipient will maintain, at its own expense, a vulnerability assessment program that is consistent with the Data Recipient's standard process and procedures, or at least annually, on all information applications and/or systems associated with accessing, processing, storage, communication and/or transmission of the Data including the Data Recipient's systems and networks. The assessment program must include a methodology for identifying, quantifying, ranking and mitigating weaknesses in the Data Recipient's systems.
Vulnerability Assessments. Accessing Party shall maintain a vulnerability management and assessment program based on industry standard practices that frequently assesses Affected Computing Devices and mitigates or eliminates vulnerabilities.
Vulnerability Assessments. For all Planning grant agreements (Resilient Florida Grant Program and Regional Resilience Entities), the Grantee must submit Exhibit I, Vulnerability Assessment Compliance Checklist Certification, with the final grant deliverable(s).
Vulnerability Assessments. Company will perform periodic vulnerability assessments of its Service and network.
Vulnerability Assessments. AWS will perform regular external vulnerability assessments and penetration testing of the AWS Network, and will investigate identified issues and track them to resolution in a timely manner.
Vulnerability Assessments. Administrator will conduct quarterly vulnerability assessments that meet the following criteria: (a) all production servers and network devices must be scanned at least monthly; (b) all findings must be risk rated; (c) all findings must be tracked to closure based on risk; and (d) tools used for scanning must have signatures updated at least monthly with the latest vulnerability. Administrator will implement and maintain a formal process for tracking and resolving issues in a timely fashion. Administrator will provide the results of Administrator’s most recent vulnerability assessment. Administrator will maintain current/current-1 patch levels.
Vulnerability Assessments. Voya will conduct monthly vulnerability assessments that meet the following criteria: (a) All production servers and network devices must be scanned at least monthly; (b) All vulnerabilities must be rated; (c) All vulnerability remediation must be prioritized based on risk; (d) All tools used for scanning must have signatures updated at least monthly with the latest vulnerability data; and, (e) Voya will implement and maintain a formal process for tracking and resolving issues in a timely fashion.
Vulnerability Assessments. Xxxxx performs vulnerability assessments on systems and applications that Handle Customer’s Personal Data.
Vulnerability Assessments. The Processor performs periodic vulnerability assessments and network penetration testing on any and all systems, platforms, networks and applications that Process Personal Data.
Vulnerability Assessments. GLBE performs periodic vulnerability assessments and network penetration testing on systems and applications that process Personal Data.