Partner Application Security Review Sample Clauses

Partner Application Security Review. SFDC may conduct periodic security evaluations of each Partner Application (“Security Reviews”), which may include a qualitative assessment involving review of a questionnaire completed by Partner, an interview with appropriate Partner personnel, and/or security testing. SFDC conducts such Security Reviews for its own benefit and Partner may not rely on, publicly disclose or promote, a Partner Application's successful passage of such Security Review. Partner shall not distribute a Partner Application unless such Partner Application has successfully passed the Partner Application Security Review. There may be fees associated with such review. If the Partner Application, in whole or in part, runs outside SFDC’s systems, security testing may include remote application-level security testing of the Partner Application, and network-level security testing including a vulnerability threat assessment. SFDC may conduct such testing itself or through a third party. SFDC will provide reasonable notice to Partner before starting such testing. SFDC will cooperate reasonably with Partner to mitigate the effects of such testing on Partner’s business and operations. Partner agrees to cooperate reasonably with such testing. Despite the foregoing, such testing may in rare cases cause downtime or other adverse effects on the Partner Application or Partner’s systems. Partner agrees that SFDC and its agents or contractors conducting the testing will bear no responsibility or liability arising from such testing. Any of Partner Confidential Information to which SFDC obtains access in the course of a Security Review will be subject to Section 10 (Confidentiality) of the SPPA. Partner acknowledges that if Partner is not participating in the Partner Program with respect to a Partner Application, any security review conducted by SFDC with respect to such Partner Application will be considered null and void, unless otherwise agreed to in writing by SFDC. SFDC reserves the right to notify Customers that a Partner Application is not listed on the AppExchange or otherwise enrolled in the AppExchange Program. Notwithstanding anything to the contrary contained herein, the status of SFDC’s review of a Partner Application can be disclosed by SFDC at SFDC’s sole discretion.
AutoNDA by SimpleDocs

Related to Partner Application Security Review

  • System Security Review All systems processing and/or storing DHCS PHI or PI must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • How to File an Appeal of a Prescription Drug Denial For denials of a prescription drug claim based on our determination that the service was not medically necessary or appropriate, or that the service was experimental or investigational, you may request an appeal without first submitting a request for reconsideration. You or your physician may file a written or verbal prescription drug appeal with our pharmacy benefits manager (PBM). The prescription drug appeal must be submitted to us within one hundred and eighty (180) calendar days of the initial determination letter. You will receive written notification of our determination within thirty (30) calendar days from the receipt of your appeal. How to File an Expedited Appeal Your appeal may require immediate action if a delay in treatment could seriously jeopardize your health or your ability to regain maximum function, or would cause you severe pain. To request an expedited appeal of a denial related to services that have not yet been rendered (a preauthorization review) or for on-going services (a concurrent review), you or your healthcare provider should call: • our Grievance and Appeals Unit; or • our pharmacy benefits manager for a prescription drug appeal. Please see Section 9 for contact information. You will be notified of our decision no later than seventy-two (72) hours after our receipt of the request. You may not request an expedited review of covered healthcare services already received.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Information Security IET information security management practices, policies and regulatory compliance requirements are aimed at assuring the confidentiality, integrity and availability of Customer information. The UC Xxxxx Cyber-safety Policy, UC Xxxxx Security Standards Policy (PPM Section 310-22), is adopted by the campus and IET to define the responsibilities and key practices for assuring the security of UC Xxxxx computing systems and electronic data.

  • CHILD AND DEPENDENT ADULT/ELDER ABUSE REPORTING CONTRACTOR shall establish a procedure acceptable to ADMINISTRATOR to ensure that all employees, agents, subcontractors, and all other individuals performing services under this Agreement report child abuse or neglect to one of the agencies specified in Penal Code Section 11165.9 and dependent adult or elder abuse as defined in Section 15610.07 of the WIC to one of the agencies specified in WIC Section 15630. CONTRACTOR shall require such employees, agents, subcontractors, and all other individuals performing services under this Agreement to sign a statement acknowledging the child abuse reporting requirements set forth in Sections 11166 and 11166.05 of the Penal Code and the dependent adult and elder abuse reporting requirements, as set forth in Section 15630 of the WIC, and shall comply with the provisions of these code sections, as they now exist or as they may hereafter be amended.

  • Antitrust Certification Statements (Tex Government Code § 2155.005) By submission of this bid or proposal, the Bidder certifies that: I affirm under penalty of perjury of the laws of the State of Texas that: (1) I am duly authorized to execute this contract on my own behalf or on behalf of the company, corporation, firm, partnership or individual (Company) listed below; (2) In connection with this bid, neither I nor any representative of the Company has violated any provision of the Texas Free Enterprise and Antitrust Act, Tex. Bus. & Comm. Code Chapter 15; (3) In connection with this bid, neither I nor any representative of the Company has violated any federal antitrust law; (4) Neither I nor any representative of the Company has directly or indirectly communicated any of the contents of this bid to a competitor of the Company or any other company, corporation, firm, partnership or individual engaged in the same line of business as the Company.

  • Additional Information for Product Development Projects Outcome of product development efforts, such copyrights and license agreements. • Units sold or projected to be sold in California and outside of California. • Total annual sales or projected annual sales (in dollars) of products developed under the Agreement. • Investment dollars/follow-on private funding as a result of Energy Commission funding. • Patent numbers and applications, along with dates and brief descriptions.  Additional Information for Product Demonstrations: • Outcome of demonstrations and status of technology. • Number of similar installations. • Jobs created/retained as a result of the Agreement.

  • Information Security Requirements In cases where the State is not permitted to manage/modify the automation equipment (server/computer/other) that controls testing or monitoring devices, the Contractor agrees to update and provide patches for the automation equipment and any installed operating systems or applications on a quarterly basis (at minimum). The Contractor will submit a report to the State of updates installed within 30 days of the installation as well as a Plan of Actions and Milestones (POA&M) to remediate any vulnerabilities ranging from Critical to Low. The contractor will provide an upgrade path or compensatory security controls for any operating systems and applications listed as beyond “end-of-life” or EOL, within 90 days of the EOL and complete the EOL system’s upgrade within 90 days of the approved plan.

  • Drug-Free Workplace Policy Consultant shall provide a drug-free workplace by complying with all provisions set forth in City’s Council Policy 100-5, attached hereto as Exhibit “D” and incorporated herein by reference. Consultant’s failure to conform to the requirements set forth in Council Policy 100-5 shall constitute a material breach of this Agreement and shall be cause for immediate termination of this Agreement by City.

  • How Do I Get More Information? For more information, including the full Notice, Claim Forms and Settlement Agreement go to xxx.xxxxxxxxxxxxxxxxxxxx.xxx, contact the settlement administrator at 0-000-000-0000, or call Class Counsel at 1-866-354-3015. Exhibit E UNITED STATES DISTRICT COURT FOR THE SOUTHERN DISTRICT OF FLORIDA Xxxxx v. AvMed, Inc., Case No. 10-cv-24513 If You Paid for or Received Insurance from AvMed, Inc. at Any Time Through December of 2009, You May Be Part of a Class Action Settlement. IMPORTANT: PLEASE READ THIS NOTICE CAREFULLY. THIS NOTICE RELATES TO THE PENDENCY OF A CLASS ACTION LAWSUIT AND, IF YOU ARE A MEMBER OF THE SETTLEMENT CLASSES, CONTAINS IMPORTANT INFORMATION ABOUT YOUR RIGHTS TO MAKE A CLAIM UNDER THE SETTLEMENT OR TO OBJECT TO THE SETTLEMENT (A federal court authorized this notice. It is not a solicitation from a lawyer.) Your legal rights are affected whether or not you act. Please read this notice carefully. YOUR LEGAL RIGHTS AND OPTIONS IN THIS SETTLEMENT SUBMIT A CLAIM FORM This is the only way to receive a payment. EXCLUDE YOURSELF You will receive no benefits, but you will retain any rights you currently have to xxx the Defendant about the claims in this case. OBJECT Write to the Court explaining why you don’t like the Settlement. GO TO THE HEARING Ask to speak in Court about your opinion of the Settlement. DO NOTHING You won’t get a share of the Settlement benefits and will give up your rights to xxx the Defendant about the claims in this case. These rights and options – and the deadlines to exercise them – are explained in this Notice. QUESTIONS? CALL 0-000-000-0000 TOLL FREE, OR VISIT XXX.XXXXXXXXXXXXXXXXXXXX.XXX PARA UNA NOTIFICACIÓN EN ESPAÑOL, LLAMAR O VISITAR NUESTRO WEBSITE BASIC INFORMATION

Time is Money Join Law Insider Premium to draft better contracts faster.