Change and Configuration Management. Maintaining policies and procedures for managing changes Provider makes to production systems, applications, and databases. Such policies and procedures include:
Change and Configuration Management. Maintaining policies and procedures for managing changes Workday makes to production systems, applications, and databases processing Covered Data. Such policies and procedures include:
Change and Configuration Management. Apttus will maintain policies and procedures for managing changes to production systems, applications, and databases, including:
Change and Configuration Management. Data importer maintains policies and procedures for managing changes to production systems, applications, and databases processing personal data and for documenting the changes.
Change and Configuration Management. Lusha implements and maintains policies and procedures for managing changes to production systems, applications, and databases, including without limitation, processes for documenting testing and approval of changes into production, security patching, and authentication.
Change and Configuration Management. Apttus will maintain policies and procedures for managing changes to production systems, applications, and databases, including: a process for documenting, testing and approving the promotion of changes into production; acceptance testing and approval processes specifically related to standard bug fixes, updates, and upgrades made available for the Subscription Services; a process for Apttus to utilize a third party to conduct web application level security assessments. These assessments generally include testing for: cross-site request forgery; improper input handling (e.g. cross-site scripting, SQL injection, XML injection, cross-site flashing); and insufficient authentication and authorization.
Change and Configuration Management. Even a small-size project like OPPORTUNITY may involve the necessity to re-configure the structure, scheduling or even part of the objectives during the project duration. Shall this be required, this will be undertaken under the initiative of the Steering Committee, and the EC Project Officer will immediately be informed. These changes would have for objective to maximize the project's overall success.
Change and Configuration Management. FloQast maintains policies and procedures for managing changes to production systems, applications, and databases. Such policies and procedures include:
Change and Configuration Management. Intercom uses continuous automation for application and operating systems deployment for new releases. Integration testing and unit testing are done upon every build with safeguards in place for availability and reliability. Intercom has a process for critical emergency fixes that can be deployed to Customers within minutes. As such Intercom can roll out security updates as required based on criticality. Exhibit C 2010 Standard contractual clauses for the transfer of personal data from the Community to third countries (controller to processor transfers) For the purposes of Article 26(2) of Directive 95/46/EC for the transfer of personal data to processors established in third countries which do not ensure an adequate level of data protection Intercom, Inc. (hereinafter "data importer") and Intercom R&D Unlimited Company, under a mandate from Customer (hereinafter the "data exporter") each a “party”; together “the parties”, HAVE AGREED on the following Contractual Clauses (the Clauses) in order to adduce adequate safeguards with respect to the protection of privacy and fundamental rights and freedoms of individuals for the transfer by the data exporter to the data importer of the personal data specified in Annex 1. For the purposes of the Clauses: Clause 1
Change and Configuration Management. Maintaining policies and procedures for managing changes Moveworks makes to production systems, applications, and databases. Such policies and procedures include: • Process for documenting, testing and approving the patching and maintenance of the Moveworks Product; • A security patching process that requires patching systems in a timely manner based on a risk analysis; and • A process for Moveworks to utilize a third party to conduct application level security assessments.