Secure Coding. Contractor warrants that all Cloud Services are free from any and all defects in materials, workmanship, and design. Contractor warrants that all Cloud Services are free from any and all viruses, malware, and other harmful or malicious code. Contractor must scan all source code for vulnerabilities, including before and after any source code changes are made and again before being placed into production, and must promptly remediate any and all vulnerabilities. Contractor must follow best practices for application code review and the most current version of the OWASP top 10.
Secure Coding. Contractor warrants that all Software Services are free from any and all defects in materials, workmanship, and design. Contractor warrants that all Software Services are free from any and all viruses, malware, and other harmful or malicious code. Contractor must scan all source code for vulnerabilities, including before and after any source code changes are made and again before being placed into production, and must promptly remediate any and all vulnerabilities. Contractor must follow best practices for application code review and the most current version of the OWASP top 10.
Secure Coding. Virtusa shall adhere to Metavante’s policy and coding standards made known to Virtusa, and industry best practices in software programming to prevent holes or other vulnerabilities in software code or architecture that might otherwise be exploited by PORTIONS OF THIS EXHIBIT WERE OMITTED AND HAVE BEEN FILED SEPARATELY WITH THE SECRETARY OF THE COMMISSION PURSUANT TO AN APPLICATION FOR CONFIDENTIAL TREATMENT UNDER RULE 24B-2 OF THE SECURITIES EXCHANGE ACT; [***] DENOTES OMISSIONS. unauthorized third parties seeking to intrude, penetrate, or hack into software programs developed hereunder. Virtusa shall not program or design into any software programs developed hereunder any security keys, embedded code or other device which are specifically designed to prevent Metavante from using any components of the software.”
Secure Coding. Contractor warrants that the software is free from any and all defects in materials, workmanship, and design. Contractor warrants that the software is free from any and all viruses, malware, and other harmful or malicious code. Contractor must scan all source code for vulnerabilities, including before and after any source code changes are made, and must promptly remediate any and all vulnerabilities and provide the State with patches to address the vulnerabilities at no cost to the State. Contractor must follow best practices for application code review and the most current version of the OWASP top 10. Contractor shall indemnify, hold harmless and defend the State in the event that the State incurs any losses, expenses or legal fees associated in any way with a violation of this paragraph.
Secure Coding. Contractor warrants that all products and services are free from any and all viruses, malware, and other harmful or malicious code. Contractor must scan all source code for vulnerabilities, including before and after any source code changes are made and again before being made available and/or placed into production, and must promptly remediate any and all vulnerabilities. If Contractor becomes aware of or has reasonable suspicion of a privacy and/or security incident(s) regarding any State data, a privacy and/or security incident targeting vulnerabilities in the product(s) and/or service(s) used by or purchased by the State, or a privacy and/or security incident that results in a successful access or use of the product and/or services used by or purchased by the State, Contractor must report such incident to the State and the State Chief Information Security Officer as soon as possible, but no later than twenty-four (24) hours after such incident.
Secure Coding. Contractor warrants that all Cloud Services are free from any and all defects in materials, workmanship, and design. Contractor warrants that all Cloud Services are free from any and all viruses, malware, and other harmful or malicious code. Contractor must scan all source code for vulnerabilities, including before and after any source code changes are made and again before being placed into production, and must promptly remediate any and all vulnerabilities. Contractor must follow best practices for application code review and the most current version of the OWASP top 10. Compliance with Data Privacy and Security Laws and Standards. Contractor shall comply with IRS Publication 1075, Exhibit 7, which is incorporated herein.
Secure Coding. Contractor shall disclose what tools are used in the software development environment to encourage secure coding and ensure that all requirements stated, and controls specified within this schedule are incorporated into developed software, applications, and solutions that comprise the Services.
Secure Coding. All source code will be scanned for vulnerabilities when changes are made and all medium, high, and critical vulnerabilities remediated and scanned again before being placed in to production. CONSULTANT must follow best practices for application code review and the OWASP top 10.
Secure Coding. Contract Vendor must scan all source code for vulnerabilities when any source code changes are made, remediate any and all vulnerabilities, and scan all source code again before being placed into production. Contract Vendor must follow best practices for application code review and the OWASP top 10.
Secure Coding. AvePoint follows a set of secure coding guidelines such as the OWASP secure coding guidelines.