Security Patching Sample Clauses

Security Patching. When a security patch becomes available, the Supplier must ensure it patches any part of its network that stores or processes Amplitel Data or connects to Amplitel’s networks as soon as reasonably practicable.
Security Patching. Comcast shall have procedures in place to regularly update and patch operating systems and software that contain or access Company PI. Comcast shall implement updates it determines are critical in an accelerated timeline.
Security Patching. The Supplier will provide and apply patches to the Oracle database, application servers, and updates to the application, and will liaise with relevant Customer departments to schedule maintenance windows for performing this. The patching of the operating system is the Supplier’s responsibility and will be delivered in collaboration with the Cloud Hosting partner.
Security Patching. The vendor will ensure that security updates are distributed and installed.
Security Patching. Effective patch management practices shall be used on all of Contractor’s systems and assets (e.g., workstations, servers, and other configurable devices to the extent technically feasible) with remote or direct connections to IT/OT Technology, that store or host Information and Product/Services infrastructure. Contractor shall implement software patch management practices consistent with standards promulgated by NIST or the ISO. Contractor shall promptly install all security updates and patches made available by the vendors of any of the third party software or other products used in connection with the collection, processing, storage or distribution of Information.
Security Patching. 13.1. The Customer authorises Cantarus for the duration of this MSA to apply Security Updates or other mitigations relating to a Security Vulnerability where in Cantarus’ reasonable opinion the risk to the performance and security of either Party’s Software, Confidential Information, Personal Data and other data and content justifies such action. 13.2. The Customer understands and accepts that: 13.2.1. Software or computer systems, whether provided by Cantarus or a third-party, cannot be guaranteed to be free of Security Vulnerabilities; 13.2.2. Security Vulnerabilities may present a risk to the performance and security of the Parties’ Software, Confidential Information, Personal Data and other data and content; 13.2.3. for Security Vulnerabilities in third-party Software: 13.2.3.1. Cantarus is dependent on the provision of Security Updates by the relevant third-party Software vendor; 13.2.3.2. the Customer holds Cantarus, its officers, directors, managers, employees and agents harmless for any delay or failure by the third- party software vendor to provide such Security Updates or for any issues related to the efficacy or performance of the third-party Security Updates; 13.2.4. for Security Vulnerabilities in any Cantarus or third-party Software: 13.2.4.1. Cantarus or the third-party Software vendor may require the Customer to have the latest version of the Software installed and operational to receive a Security Update for any given Security Vulnerability; 13.2.4.2. if the latest version of the Software cannot be installed due to reasons outside of Cantarus’ direct control, Cantarus shall use its reasonable endeavours to mitigate the Security Vulnerability where practical to do so. 13.3. Where in Cantarus’ reasonable professional opinion a Security Vulnerability may be of sufficiently high risk to either Party the Customer understands and accepts that: 13.3.1. Cantarus may apply a Security Update or other mitigation without notice to the Customer; and