Application Software Security Sample Clauses

Application Software Security. Manage the security life cycle of all in-house developed and acquired software in order to prevent, detect, and correct security weaknesses.
AutoNDA by SimpleDocs
Application Software Security. Web application firewalls (WAFs) must be deployed to protect internet-accessible web applications. For vendors that store, process, transmit or handle cardholder data: ● Comply with and provide Hyatt with Payment Card Industry Data Security Standard (PCI DSS) Attestation of Compliance (AOC) on an annual basis. This Schedule provides a summary of the OTA Insight security controls and policies. These controls and policies are aligned with the ISO 27001 standard for information security. OTA Insight is ISO 27001 certified. A copy of this certificate is available upon request. OTA Insight is a cloud-based data intelligence platform for the hospitality industry. We provide hoteliers with a suite of revenue management solutions that empower them to make smarter revenue and distribution decisions. Our products are: ● Rate Insight ● Parity Insight ● Revenue Insight ● Market Insight These products are web applications which communicate over a secure channel (HTTPS, TLSv1.2) - and are subject to a yearly penetration test to assess the effectiveness of the security controls that are in place. The applications do not interact with any guests and are targeted at customer usage only. The applications provide authentication capabilities (e.g. a login portal) to access the web application functionality. The registered accounts will be linked to the subscription to the application. Currently, the applications do not support a single sign-on capability. The web applications require an up-to-date browser. The supported browser versions* are: ○ Chrome 67 ○ Firefox 52 ○ Edge 14 ○ Safari 9 ○ Opera 50 *or any later versions of the aforementioned browsers. *or any later versions of the aforementioned browsers. The OTA Insight products are developed using a Secure SDLC process with several controls in place (e.g. Four-eyed coding principle for any change, automated testing, etc.) Furthermore, the OTA Insight applications are subject to a yearly penetration test to find and remediate any potential security flaws within the application. Employees working for OTA Insight are made aware of their responsibilities in terms of information security. Before employment, they are vetted based on the position and level of system access they will have within the company. The OTA Insight Products (including any customer and app data) are Cloud based and stored within the European Union, using Google Cloud infrastructure for hosting the applications. The OTA Insight applications are monitored 24...
Application Software Security. For all software and applications developed in-house or procured from third party developers ensure software is developed and tested secure software development lifecycle practices pursuant to a documented development processes that explicitly addresses security requirements and identifies the standards and tools used in the development process.

Related to Application Software Security

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • Incorporation of Software Code I agree that I will not incorporate into any Company software or otherwise deliver to Company any software code licensed under the GNU General Public License or Lesser General Public License or any other license that, by its terms, requires or conditions the use or distribution of such code on the disclosure, licensing, or distribution of any source code owned or licensed by Company except in strict compliance with Company’s policies regarding the use of such software.

  • Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Technical Documentation Prior to commencement of the Tests on Completion, the Contractor shall supply to the Engineer the technical documentation as specified in the Employer’s Requirements. The Works or Section shall not be considered to be completed for the purposes of taking- over under sub-clause 10.1 [Taking Over of the Works and Sections] until the Engineer has received the technical documentation as defined in this sub-clause 5.7, the "history file" including design calculations and certain certification as well as any other documents required to meet the CE Marking requirements.

  • L/C Applications The Company shall execute and deliver to the Issuing Lender the Master Letter of Credit Agreement from time to time in effect. The Company shall give notice to the Administrative Agent and the Issuing Lender of the proposed issuance of each Letter of Credit on a Business Day which is at least three Business Days (or such lesser number of days as the Administrative Agent and the Issuing Lender shall agree in any particular instance in their sole discretion) prior to the proposed date of issuance of such Letter of Credit. Each such notice shall be accompanied by an L/C Application, duly executed by the Company and in all respects satisfactory to the Administrative Agent and the Issuing Lender, together with such other documentation as the Administrative Agent or the Issuing Lender may request in support thereof, it being understood that each L/C Application shall specify, among other things, the date on which the proposed Letter of Credit is to be issued, the expiration date of such Letter of Credit (which shall not be later than the scheduled Termination Date (unless such Letter of Credit is Cash Collateralized)) and whether such Letter of Credit is to be transferable in whole or in part. Any Letter of Credit outstanding after the scheduled Termination Date which is Cash Collateralized for the benefit of the Issuing Lender shall be the sole responsibility of the Issuing Lender. So long as the Issuing Lender has not received written notice that the conditions precedent set forth in Section 12 with respect to the issuance of such Letter of Credit have not been satisfied, the Issuing Lender shall issue such Letter of Credit on the requested issuance date. The Issuing Lender shall promptly advise the Administrative Agent of the issuance of each Letter of Credit and of any amendment thereto, extension thereof or event or circumstance changing the amount available for drawing thereunder. In the event of any inconsistency between the terms of the Master Letter of Credit Agreement, any L/C Application and the terms of this Agreement, the terms of this Agreement shall control.

  • Open Source Software The Software product may include certain open source components that are subject to open source licenses (“Open Source Software”), in which case, the embedded Open Source Software is owned by a third party. The Open Source Software is not subject to the terms and conditions of this XXXX. Instead, each item of Open Source Software is licensed under its applicable license terms which accompanies such Open Source Software. Nothing in this XXXX limits your rights under, nor grants you rights that supersede, the terms and conditions of any applicable license terms for the Open Source Software. Any fees charged by GC in connection with the SOFTWARE, do not apply to the Open Source Software for which fees may not be charged under the applicable license terms. The terms and conditions of the applicable license for the Open Source Software are available on the LICENSE.txt file, which is provided with the SOFTWARE.

Time is Money Join Law Insider Premium to draft better contracts faster.