Security Review. Application security assessments and network penetration tests are performed on a periodic basis to ensure that code generated by ALPS meets industry standards and best practices.
Security Review. Subject to the conditions set out herein, Flexera will permit Customer personnel or authorized representatives to review and assess Flexera’s compliance with the obligations set out in this Section (“Security Review”). The definition of audit rights is to be mutually agreed between Flexera and Customer. Unless otherwise required by law:
a. Any Security Review is subject to not less than 28 days advance written notice and limited to no more than once in any 12-month period;
b. The Security Review will take place during normal business hours and should be conducted in a manner to minimize disruption to Flexera’s business operations;
c. Customer will bear its own costs in relation to a Security Review; and
d. Any third party undertaking the Security Review must (i) be subject to confidentiality obligations no less protective than those set out in the Agreement; and (ii) must not be a competitor of Flexera.
Security Review. The Government may elect to conduct random periodic reviews to ensure that the security requirements contained in this contract are being implemented and enforced. The Contractor shall afford DHS, the Office of the Inspector General, and other Government organizations access to the Contractor’s facilities, installations, operations, documentation, databases and personnel used in the performance of this contract. The Contractor shall, through the Contracting Officer and COR, contact the Headquarters or Component CIO, or designee, to coordinate and participate in review and inspection activity by Government organizations external to the DHS. Access shall be provided, to the extent necessary as determined by the Government, for the Government to carry out a program of inspection, investigation, and audit to safeguard against threats and hazards to the integrity, availability and confidentiality of Government data or the function of computer systems used in performance of this contract and to preserve evidence of computer crime.
Security Review. MP and AOL will work together to perform an initial security review of, and to perform tests of the MP system, network, and service security in order to evaluates the security risks and provides recommendations to MP, including periodic follow-up reviews as reasonably required by MP or AOL. MP will fix any security risks or breaches of security as may be identified by AOL's Operations Security. Specific services to be performed on behalf of AOL's Operations Security team will be as determined by AOL in its sole discretion.
Security Review. Subject to the conditions set out herein, Revenera will permit Customer personnel or authorized representatives to review and assess Revenera’s compliance with the obligations set out in this Section (“Security Review”). The definition of audit rights is to be mutually agreed between Revenera and Customer. Unless otherwise required by law:
a. Any Security Review is subject to not less than 28 days advance written notice and limited to no more than once in any 12-month period;
b. The Security Review will take place during normal business hours and should be conducted in a manner to minimize disruption to Revenera’s business operations;
c. Customer will bear its own costs in relation to a Security Review; and
d. Any third party undertaking the Security Review must (i) be subject to confidentiality obligations no less protective than those set out in the Agreement; and (ii) must not be a competitor of Revenera.
Security Review. Examination of The System or information related to the security of The System requiring the assistance of or coordination with Partner that can identify and/or diagnose, or are intended to identify and/or diagnose, Security Issues.
Security Review. InfoSpace and AOL will work together to perform an initial security review of, and to perform tests of, the InfoSpace system, network, and service security in order to evaluate the security risks and provide recommendations to InfoSpace, including periodic follow-up reviews as reasonably required by InfoSpace or AOL. InfoSpace will use commercially reasonable best efforts to fix any security risks or breaches of security as may be identified by AOL's Operations Security. Specific services to be performed on behalf of AOL's Operations Security team will be as determined by AOL in its sole discretion.
Security Review. The Vendor shall: give to (or procure the giving to) TSP (or any person authorised by TSP) such access at all reasonable times to the Vendor’s and any Subcontractor’s records and premises related to this Agreement as TSP may require from time to time to assess the Vendor’s compliance of these policies in this Agreement; and such assessments may include assessments of all elements of physical and logical audits, penetration testing of the Vendor’s Systems. The Vendor shall facilitate this assessment by permitting TSP to collect, retain and analyse information to identify potential security risks including trace files, statistics, network addresses and the actual information or screens accessed or transferred; and provide such reports to TSP and attend such meetings as may be reasonably required by TSP.
Security Review. Upon the conditions set forth below, Yahoo, directly or through a Yahoo Affiliate designated by Yahoo, will have the right, at its own expense, to conduct Security Reviews, and/or to have an independent third party subject to a Partner-approved confidentiality agreement conduct Security Reviews. In the case that Yahoo uses an independent third party, the third party will be selected by Yahoo subject to approval by Partner, and such approval will not be unreasonably withheld or delayed. Partner will provide sufficient access to its facilities, personnel, and records as required for the Security Review during Partner’s regular business hours, and will otherwise support and cooperate with the Security Review. Security Reviews may result in the identification of Security Issues.
a. Yahoo will have the right to conduct a Security Review: 1) prior to The System being available or in production, 2) when there is or is planned to be a material change to The System, 3) when Yahoo suspects there may be a Security Issue in The System, 4) upon termination of this Security Agreement. Notwithstanding the foregoing. Yahoo will not conduct a Security Review more than once during any consecutive twelve (12) month period unless a Security Issue has been confirmed to have occurred, in which case Yahoo may conduct a Security Review after each Security Issue has been resolved.
b. Security Reviews will be subject to the following conditions: 1) Yahoo must provide reasonable notice to Partner before such Security Reviews, which notice must be at least fourteen (14) days in advance of the proposed review; 2) Security Reviews must be conducted during regular business hours in a manner that does not interfere with normal business activities.
Security Review. (a) Recipient or Recipient’s authorized agent may, no more than once annually, at its reasonable advanced request perform a security review. Initially the security review will be performed by means of a security questionnaire. If Recipient deems the response to the security questionnaire insufficient, then, and, to the extent reasonably necessary to provide reasonable assurance thereafter, Recipient may expand the review to verification of the controls through observation, and inquiry, (which may, at a minimum, include the items described in Appendix 1 to this Annex A) of the facilities from which the Transition Services and computer applications used therein are provided for, operated or hosted. Provider agrees to meet with Recipient to discuss the security review and the results of such review and Provider shall take reasonable corrective action to remedy any deficiencies identified by such review at Recipient’s discretion.