Security Reviews. Web application vulnerability assessments must be performed during the applicationdevelopment and the deployment lifecycle. • All 3rd party software included in the application must meet all security requirementsoutlined herein. • Secure interfaces for USER LOGIN and user data input of Personal Data must utilizecertificates signed by a Trusted Certificate Authority (CA) only. Examples: HTTPS / TLS / SSH.
Appears in 2 contracts
Samples: Data Processing and Security Agreement, Data Processing and Security Agreement
Security Reviews. ▪ Web application vulnerability assessments must be performed during the applicationdevelopment application development and the deployment lifecycle. • ▪ All 3rd party software included in the application must meet all security requirementsoutlined requirements outlined herein. • ▪ Secure interfaces for USER LOGIN and user data input of Personal Data must utilizecertificates utilize certificates signed by a Trusted trusted Certificate Authority (CA) only. Examples: HTTPS / TLS / SSH.
Appears in 1 contract
Security Reviews. Web application vulnerability assessments must be performed during the applicationdevelopment application development and the deployment lifecycle. • All 3rd party software included in the application must meet all security requirementsoutlined requirements outlined herein. • Secure interfaces for USER LOGIN and user data input of Personal Data must utilizecertificates utilize certificates signed by a Trusted trusted Certificate Authority (CA) only. Examples: HTTPS / TLS / SSH.
Appears in 1 contract