Code Security Sample Clauses

Code Security. 8.2.1. All production code is digitally signed, using trusted third-party Public Key Infrastructure (PKI) services. 8.2.2. As part of Xxxxxxx’ CI/CD pipeline, code is scanned nightly for vulnerabilities, both third-party and any introduced in Xxxxxxx custom code. This scanning is performed using best in class Software Composition Analysis (SCA) and Static Application Security Testing (SAST) tools, which allows for deep and thorough analysis as well as continuous vulnerabilities detection. 8.2.3. Dynamic Application Security Testing (DAST) is executed on live, deployed application instances 8.2.4. A trusted third-party penetration team is contracted to perform continuous penetration testing on the product (including milestones). 8.2.5. Any vulnerabilities discovered are triaged and run through an internal risk assessment with enforced remediation of all Critical and High vulnerabilities discovered.
AutoNDA by SimpleDocs
Code Security. Customer shall take appropriate steps to protect the use of such Customer Identification Code(s), and Vendor will provide all assistance reasonably required, including but not limited to changing such Customer Identification Code(s), at the written request of Customer. Customer shall be liable for all charges incurred under any additional Customer Identification Code(s) established by Vendor in accordance with this section. Customer shall notify Vendor of any authorized use of Customer Identification Code. Vendor shall not be responsible for any unauthorized access to, or alteration of, transmissions or data sent or received, regardless of whether data is actually received by Customer.
Code Security. The password or access code ("access code") that you select is for your security purposes. The access code is confidential and should not be disclosed to third parties or recorded. You are responsible for safekeeping your access code. You agree not to disclose or otherwise make your access code available to anyone not authorized to sign on your accounts. If you authorize anyone to use your access code, that authority shall continue until you specifically revoke such authority by changing your password and/or notifying the Credit Union. If you fail to maintain the security of these access codes and the Credit Union suffers a loss, we may terminate your Home Banking and account services immediately. You will be required to change the password assigned upon first access. If you want to discontinue access to these products, please notify the Credit Union at 000-000-0000 or 000-000-0000.
Code Security. The UW Covered Component does not use or disclose the code or other means of record identification for any other purpose, and does not disclose the mechanism for re‐identification.

Related to Code Security

  • E7 Security The Authority shall be responsible for maintaining the security of the Authority premises in accordance with its standard security requirements. The Contractor shall comply with all security requirements of the Authority while on the Authority premises, and shall ensure that all Staff comply with such requirements.

  • Site Security While providing services at a DSHS location, the Contractor, its agents, employees, or Subcontractors shall conform in all respects with physical, fire, or other security regulations specific to the DSHS location.

  • JOB SECURITY 23.01 Subject to the willingness and capacity of individual employees to accept relocation and retraining, the Employer will make every reasonable effort to ensure that any reduction in the work force will be accomplished through attrition.

  • User Security You agree to take every precaution to ensure the safety, security and integrity of your account and transactions when using Mobile Banking. You agree not to leave your Device unattended while logged into Mobile Banking and to log off immediately at the completion of each access by you. You agree not to provide your username, password or other access information to any unauthorized person. If you permit other persons to use your Device, login information, or other means to access Mobile Banking, you are responsible for any transactions they authorize and we will not be liable for any damages resulting to you. You agree not to use any personally identifiable information when creating shortcuts to your Account. We make no representation that any content or use of Mobile Banking is available for use in locations outside of the United States. Accessing Mobile Banking from locations outside of the United States is at your own risk.

  • Uniform Commercial Code Security Agreement (a) This Instrument is also a security agreement under the Uniform Commercial Code for any of the Mortgaged Property which, under applicable law, may be subjected to a security interest under the Uniform Commercial Code, whether such Mortgaged Property is owned now or acquired in the future, and all products and cash and non-cash proceeds thereof (collectively, "UCC Collateral"), and Borrower hereby grants to Lender a security interest in the UCC Collateral. Borrower hereby authorizes Lender to prepare and file financing statements, continuation statements and financing statement amendments in such form as Lender may require to perfect or continue the perfection of this security interest and Borrower agrees, if Lender so requests, to execute and deliver to Lender such financing statements, continuation statements and amendments. Borrower shall pay all filing costs and all costs and expenses of any record searches for financing statements and/or amendments that Lender may require. Without the prior written consent of Lender, Borrower shall not create or permit to exist any other lien or security interest in any of the UCC Collateral. (b) Unless Borrower gives Notice to Lender within 30 days after the occurrence of any of the following, and executes and delivers to Lender modifications or supplements of this Instrument (and any financing statement which may be filed in connection with this Instrument) as Lender may require, Borrower shall not (i) change its name, identity, structure or jurisdiction of organization; (ii) change the location of its place of business (or chief executive office if more than one place of business); or (iii) add to or change any location at which any of the Mortgaged Property is stored, held or located. (c) If an Event of Default has occurred and is continuing, Lender shall have the remedies of a secured party under the Uniform Commercial Code, in addition to all remedies provided by this Instrument or existing under applicable law. In exercising any remedies, Lender may exercise its remedies against the UCC Collateral separately or together, and in any order, without in any way affecting the availability of Lender's other remedies. (d) This Instrument constitutes a financing statement with respect to any part of the Mortgaged Property that is or may become a Fixture, if permitted by applicable law.

  • System Security (a) If any party hereto is given access to the other party’s computer systems or software (collectively, the “Systems”) in connection with the Services, the party given access (the “Availed Party”) shall comply with all of the other party’s system security policies, procedures and requirements that have been provided to the Availed Party in advance and in writing (collectively, “Security Regulations”), and shall not tamper with, compromise or circumvent any security or audit measures employed by such other party. The Availed Party shall access and use only those Systems of the other party for which it has been granted the right to access and use. (b) Each party hereto shall use commercially reasonable efforts to ensure that only those of its personnel who are specifically authorized to have access to the Systems of the other party gain such access, and use commercially reasonable efforts to prevent unauthorized access, use, destruction, alteration or loss of information contained therein, including notifying its personnel of the restrictions set forth in this Agreement and of the Security Regulations. (c) If, at any time, the Availed Party determines that any of its personnel has sought to circumvent, or has circumvented, the Security Regulations, that any unauthorized Availed Party personnel has accessed the Systems, or that any of its personnel has engaged in activities that may lead to the unauthorized access, use, destruction, alteration or loss of data, information or software of the other party hereto, the Availed Party shall promptly terminate any such person’s access to the Systems and immediately notify the other party hereto. In addition, such other party hereto shall have the right to deny personnel of the Availed Party access to its Systems upon notice to the Availed Party in the event that the other party hereto reasonably believes that such personnel have engaged in any of the activities set forth above in this Section 9.2(c) or otherwise pose a security concern. The Availed Party shall use commercially reasonable efforts to cooperate with the other party hereto in investigating any apparent unauthorized access to such other party’s Systems.

  • Network Security The AWS Network will be electronically accessible to employees, contractors and any other person as necessary to provide the Services. AWS will maintain access controls and policies to manage what access is allowed to the AWS Network from each network connection and user, including the use of firewalls or functionally equivalent technology and authentication controls. AWS will maintain corrective action and incident response plans to respond to potential security threats.

  • Operations Security Supplier must enable logging and monitoring on all operating systems, databases, applications, and security and network devices that are involved in providing Deliverables. Supplier will maintain anti-malware controls that are designed to protect systems from malicious software, including malicious software that originates from public networks. In addition, Supplier will use anti-malware software (of Industry Standard or better quality), maintain such software at the then current major release, purchase maintenance & support available from the vendor for such software, and promptly implement new releases and versions of such software.

  • Tender Security 18.1 The Tenderer shall furnish as part of its Tender, either a Tender-Securing Declaration or a Tender Security, as specified in the TDS, in original form and, in the case of a Tender Security, in the amount and currency specified in the TDS. 18.2 A Tender Securing Declaration shall use the form included in Section IV, Tendering Forms. 18.3 If a Tender Security is specified pursuant to ITT 18.1, the Tender Security shall be a demand guarantee in any of the following forms at the Tenderer option: i) cash; ii) a bank guarantee; iii) a guarantee by an insurance company registered and licensed by the Insurance Regulatory Authority listed by the Authority; or

  • School Code, Section 10-20.21 - Contracts (Sheet is unprotected and can be re-formatted as needed, but must be used for submission)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!