Common use of Security Reviews Clause in Contracts

Security Reviews. Web application vulnerability assessments must be performed during the applicationdevelopment and the deployment lifecycle. • All 3rd party software included in the application must meet all security requirementsoutlined herein. • Secure interfaces for USER LOGIN and user data input of Personal Data must utilizecertificates signed by a Trusted Certificate Authority (CA) only. Examples: HTTPS / TLS / SSH.

Appears in 2 contracts

Samples: Data Processing and Security Agreement, Data Processing and Security Agreement

AutoNDA by SimpleDocs

Security Reviews. Web application vulnerability assessments must be performed during the applicationdevelopment application development and the deployment lifecycle. All 3rd party software included in the application must meet all security requirementsoutlined requirements outlined herein. Secure interfaces for USER LOGIN and user data input of Personal Data must utilizecertificates utilize certificates signed by a Trusted trusted Certificate Authority (CA) only. Examples: HTTPS / TLS / SSH.

Appears in 1 contract

Samples: Data Processing and Security Agreement

AutoNDA by SimpleDocs

Security Reviews. Web application vulnerability assessments must be performed during the applicationdevelopment application development and the deployment lifecycle. All 3rd party software included in the application must meet all security requirementsoutlined requirements outlined herein. Secure interfaces for USER LOGIN and user data input of Personal Data must utilizecertificates utilize certificates signed by a Trusted trusted Certificate Authority (CA) only. Examples: HTTPS / TLS / SSH.

Appears in 1 contract

Samples: Data Processing and Security Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!