Vulnerability Management Program Sample Clauses

Vulnerability Management Program. Bluecore maintains a vulnerability management program aiming to identify and remediate security vulnerabilities within computing systems. This includes regular testing and record of system remediation. Toolsets used to identify vulnerabilities are maintained with up-to-date vulnerability signatures. Results of vulnerability testing are utilized to craft an annual penetration test of systems and networks perceived as high risk, high value, or demonstrating a need for further scrutiny. All newly deployed systems or systems that have experienced a high level of change will be scanned for vulnerabilities prior to production deploy. Highly orchestrated environments with appropriate change control may be exempt from pre-deployment scanning.
AutoNDA by SimpleDocs
Vulnerability Management Program. State Street maintains a vulnerability management program that includes processes for: being made aware of newly announced vulnerabilities; discovering vulnerabilities within the infrastructure and applications; risk rating vulnerabilities consistent with industry standards; and defining timeframes for remediating vulnerabilities (other than medium or low risk vulnerabilities) consistent with industry standards and taking into account any mitigation efforts taken by State Street with respect to such vulnerabilities.
Vulnerability Management Program. Keep operating system(s), Firewalls, Routers, servers, personal computer (laptop and desktop) and all other systems current with appropriate system patches and updates. Configure infrastructure such as Firewalls, Routers, personal computers, and similar components to industry best security practices, including disabling unnecessary services or features, removing or changing default passwords, IDs and sample files/programs, and enabling the most secure configuration features to avoid unnecessary risks. Implement and follow current best security practices for Computer Virus detection scanning services and procedures: Use, implement and maintain a current, commercially available Computer Virus detection/scanning product on all computers, systems and networks. If you suspect an actual or potential virus, immediately cease accessing the system and do not resume the inquiry process until the virus has been eliminated. On a weekly basis at a minimum, keep anti-virus software up-to-date by vigilantly checking or configuring auto updates and installing new virus definition files. Implement and follow current best security practices for computer anti-Spyware scanning services and procedures: Use, implement and maintain a current, commercially available computer anti-Spyware scanning product on all computers, systems and networks. If you suspect actual or potential Spyware, immediately cease accessing the system and do not resume the inquiry process until the problem has been resolved and eliminated. Run a secondary anti-Spyware scan upon completion of the first scan to ensure all Spyware has been removed from your computers. Keep anti-Spyware software up-to-date by vigilantly checking or configuring auto updates and installing new anti-Spyware definition files weekly, at a minimum. If your company’s computers have unfiltered or unblocked access to the Internet (which prevents access to some known problematic sites), then it is recommended that anti-Spyware scans be completed more frequently than weekly. Protect Data Develop and follow procedures to ensure that data is protected throughout its entire information lifecycle (from creation, transformation, use, storage and secure destruction) regardless of the media used to store the data (i.e., tape, disk, paper, etc.) All credit reporting agency data is classified as Confidential and must be secured to this requirement at a minimum. Procedures for transmission, disclosure, storage, destruction and any other informatio...

Related to Vulnerability Management Program

  • Program Management 1.1.01 Implement and operate an Immunization Program as a Responsible Entity

  • Virus Management Transfer Agent shall maintain a malware protection program designed to deter malware infections, detect the presence of malware within the Transfer Agent environment.

  • Collaboration Management Promptly after the Effective Date, each Party will appoint a person who will oversee day-to-day contact between the Parties for all matters related to the management of the Collaboration Activities in between meetings of the JSC and will have such other responsibilities as the Parties may agree in writing after the Effective Date. One person will be designated by Merck (the “Merck Program Director”) and one person will be designated by Moderna (the “Moderna Program Director,”) together will be the “Program Directors”. Each Party may replace its Program Director at any time by notice in writing to the other Party. Any Program Director may designate a substitute to temporarily perform the functions of that Program Director by written notice to the other Party. The initial Program Directors will be: For Moderna: [***] For Merck: [***]

  • Contract Management To ensure full performance of the Contract and compliance with applicable law, the System Agency may take actions including:

  • Project Management Project Management Institute (PMI) certified project manager executing any or all of the following: • Development of Project Charter • Development of project plan and schedule • Coordination and scheduling of project activities across customer and functional areas • Consultation on operational and infrastructure requirements, standards and configurations • Facilitate project status meetings • Timely project status reporting • Address project issues with functional areas and management • Escalation of significant issues to customers and executive management • Manage project scope and deliverable requirements • Document changes to project scope and schedule • Facilitate and document project closeout

  • Benchmarking 19.1 The Parties shall comply with the provisions of Framework Schedule 12 (Continuous Improvement and Benchmarking) in relation to the benchmarking of any or all of the Goods and/or Services.

  • Maintenance Program LESSEE's Maintenance Program

  • Account Management 15.1 The Contractor is required to provide a dedicated Strategic Account Manager who will be the main point of contact for the Authority. The Strategic Account Manager will:  Attend quarterly, or as otherwise agreed, review meetings with the Authority, in person at the Authority’s premises or other locations as determined by the Authority  Attend regular catch-up meetings with the Authority, in person or by telephone/videoconference  Resolve any on-going operational issues which have not been resolved by the Contractor or Account Manager(s) and therefore require escalation  Ensure that the costs involved in delivering the Framework are as low as possible, whilst always meeting the required standards of service and quality.

  • Research Analyst Independence The Company acknowledges that the Underwriters’ research analysts and research departments are required to be independent from their respective investment banking divisions and are subject to certain regulations and internal policies, and that such Underwriters’ research analysts may hold views and make statements or investment recommendations and/or publish research reports with respect to the Company and/or the offering that differ from the views of their respective investment banking divisions. The Company hereby waives and releases, to the fullest extent permitted by law, any claims that the Company may have against the Underwriters with respect to any conflict of interest that may arise from the fact that the views expressed by their independent research analysts and research departments may be different from or inconsistent with the views or advice communicated to the Company by such Underwriters’ investment banking divisions. The Company acknowledges that each of the Underwriters is a full service securities firm and as such from time to time, subject to applicable securities laws, may effect transactions for its own account or the account of its customers and hold long or short positions in debt or equity securities of the companies that may be the subject of the transactions contemplated by this Agreement.

  • Change Management BellSouth provides a collaborative process for change management of the electronic interfaces through the Change Control Process (CCP). Guidelines for this process are set forth in the CCP document as amended from time to time during this Agreement. The CCP document may be accessed via the Internet at xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx.

Time is Money Join Law Insider Premium to draft better contracts faster.