Coding Practices. Provider agrees: (a) to use industry secure-coding practices (such as Microsoft’s Software Development Lifecycle, Digital Software Security Touchpoints, OWASP standards or Sans Top 25), (b) the Solutions are designed based on industry secure-coding practices, and (c) information security is addressed throughout the development lifecycle. The Solutions’ processes, direct capabilities, and other necessary actions shall comply with all PCI standards and Privacy Laws.
Appears in 4 contracts
Samples: Data Processing Addendum, www.rsa.com, Data Processing Addendum
Coding Practices. Provider agrees: agrees (a) to use industry secure-coding practices (such as for example, Microsoft’s Software Development Lifecycle, Digital Cigital Software Security Touchpoints, OWASP standards or Sans Top 25), ; (b) the Solutions are designed based on industry secure-coding practices, ; and (c) information security is addressed throughout the development lifecyclelife-cycle. The Solutions’ processes, direct capabilities, and other necessary actions shall comply with all PCI standards and Privacy Laws.
Appears in 4 contracts
Samples: Data Protection Agreement, Data Protection Agreement, Data Protection Agreement
Coding Practices. Provider agrees: (a) to use industry secure-coding practices (such as Microsoft’s Software Development Lifecycle, Digital Cigital Software Security Touchpoints, OWASP standards or Sans Top 25), (b) the Solutions are designed based on industry secure-coding practices, and (c) information security is addressed throughout the development lifecycle. The Solutions’ processes, direct capabilities, and other necessary actions shall comply with all PCI standards and Privacy Laws.
Appears in 1 contract
Samples: Data Protection Agreement
Coding Practices. Provider agrees: (a) to use industry secure-coding practices (such as Microsoft’s Software Development Lifecycle, Digital Software Security Touchpoints, OWASP standards or Sans Top 25), (b) the Solutions are designed based on industry secure-secure- coding practices, and (c) information security is addressed throughout the development lifecycle. The Solutions’ processes, direct capabilities, and other necessary actions shall comply with all PCI standards and Privacy Laws.
Appears in 1 contract
Samples: rsa.com