Vulnerability Scans Sample Clauses

Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for PC, IP enabled terminal, or integrated ECR merchants. Here are the steps to receive your Scan:
AutoNDA by SimpleDocs
Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for any merchant with Internet accessible I/P addresses connected to or that could allow access to their cardholder data environment. This includes, but is not limited to internet connected terminals, internet connected registers, and ecommerce environments. Here are the steps to receive your Scan:
Vulnerability Scans. Vendor shall perform internal and external host/network vulnerability scans at least quarterly and after any material change in the host/network configuration, and suspected or substantiated IT security or privacy incidents.
Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for may not waive, forgive, release, assign or in any manner fail to insist on strict performance of Sections 2.B, 2.D, 5.B.iii, 6.A, and 14.X.
Vulnerability Scans. Centercode (either directly or through third parties) shall scan all internet-accessible sites related to Customer’s Services at least annually and at any time a major change is made to a hosted site that could introduce vulnerabilities using industry standard scanning tools such as Nessus.
Vulnerability Scans. The Service Provider shall ensure that the Hosted Infrastructure, Platform Components and Application(s) are subjected to an OWASP-compliant vulnerability scan at least quarterly.
Vulnerability Scans. Pearson has a single, global vulnerability scanning and management program for its entire server/hosting estate. Coverage includes co-located and cloud-based servers, as well as all of the data centers managed directly by Pearson. Scanning is executed on an ongoing periodic basis for all servers/networks in scope, with critical applications and services are scanned more frequently depending upon the severity and necessity. Vulnerabilities discovered as part of Pearson vulnerability management program are assessed, collated and presented to individual application and system owners for remediation. Pearson then tracks the risk represented by vulnerabilities, and identifies where remediation requires additional attention or escalation through a Risk Exception process. When highly critical vulnerabilities are released, or threats are assessed as being high priority, Pearson executes a global remediation plan independent of vulnerability scanning to ensure the gap between vulnerability and closure is as small as possible. ● Pearson does not authorize customers to perform vulnerability scans or penetration scans against Pearson products which are shared with other customers. ● Pearson may share the results of our security assessments with our customers ● We will provide high level summaries via email under NDA. ● We will share actual vulnerability data on site and in person.
AutoNDA by SimpleDocs

Related to Vulnerability Scans

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • SAFEGUARDING CHILDREN AND VULNERABLE ADULTS 8.1 The Service Provider will have ultimate responsibility for the management and control of any Regulated Activity provided under this agreement and for the purposes of the Safeguarding Vulnerable Groups Xxx 0000.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Geological and Archeological Specimens If, during the execution of the Work, the Contractor, any Subcontractor, or any servant, employee, or agent of either should uncover any valuable material or materials, such as, but not limited to, treasure trove, geological specimens, archival material, archeological specimens, or ore, the Contractor acknowledges that title to the foregoing is vested in the Owner. The Contractor shall notify the Owner upon the discovery of any of the foregoing, shall take reasonable steps to safeguard it, and seek further instruction from the Design Professional. Any additional cost incurred by the Contractor shall be addressed under the provision for changed conditions. The Contractor agrees that the Geological and Water Resources Division and the Historic Preservation Division of the Georgia Department of Natural Resources may inspect the Work at reasonable times.

  • CURVE WIDENING The minimum widening placed on the inside of curves is:  6 feet for curves of 50 to 79 feet radius.  4 feet for curves of 80 to 100 feet radius.

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.