Vulnerability Assessments Sample Clauses

Vulnerability Assessments. For all Planning grant agreements (Resilient Florida Grant Program and Regional Resilience Entities), the Grantee must submit Exhibit I, Vulnerability Assessment Compliance Checklist Certification, with the final grant deliverable(s).
AutoNDA by SimpleDocs
Vulnerability Assessments. Company will perform periodic vulnerability assessments of its Service and network.
Vulnerability Assessments. 22. Accessing Party shall maintain a vulnerability management and assessment program based on industry standard practices that frequently assesses Affected Computing Devices and mitigates or eliminates vulnerabilities.
Vulnerability Assessments. Administrator will conduct quarterly vulnerability assessments that meet the following criteria:
Vulnerability Assessments. Without limiting the Data Recipient's obligations set forth in this Agreement, the Data Recipient will maintain, at its own expense, a vulnerability assessment program that is consistent with the Data Recipient's standard process and procedures, or at least annually, on all information applications and/or systems associated with accessing, processing, storage, communication and/or transmission of the Data including the Data Recipient's systems and networks. The assessment program must include a methodology for identifying, quantifying, ranking and mitigating weaknesses in the Data Recipient's systems.
Vulnerability Assessments. AWS will perform regular external vulnerability assessments and penetration testing of the AWS Network, and will investigate identified issues and track them to resolution in a timely manner.
Vulnerability Assessments. Xxxxxx performs periodic vulnerability assessments and penetration testing on systems and applications that Process Personal Data.
AutoNDA by SimpleDocs
Vulnerability Assessments. Seller performs vulnerability assessments on systems and applications that Handle Buyer’s PII or Personal Data.
Vulnerability Assessments. Supplier shall retain an independent third party to conduct quarterly vulnerability assessments of any systems or networks that Process Personal Information. Supplier shall promptly remediate any critical or high-risk vulnerabilities identified in connection with any such vulnerability assessment. If Supplier cannot remediate a critical vulnerability within three (3) calendar days, Supplier shall notify Leidos of the vulnerability. Supplier shall remediate all other identified vulnerabilities in accordance with its information security policy (or policies) and associated procedures.
Vulnerability Assessments. Veson shall conduct vulnerability assessments (including penetration testing) of the Veson products and services on a regular basis. Any identified issues shall be remediated in an appropriate timeframe in accordance with Veson policies.
Time is Money Join Law Insider Premium to draft better contracts faster.