Software Integrity Sample Clauses

Software Integrity. The installed base of software on each Host is kept as small as possible. Software packages which have been deemed unnecessary or redundant have been eliminated so as to minimize the potential number of access points on any given Server. When an advisory for installed software is released from sources including CERT, SecurityFocus/BugTraq, and/or Synacor vendors, Synacor will immediately perform an evaluation of the relative risk. Highest priority (eg. Priority 1) is given where a known exploit is published that affects services accessible to public networks. Depending on the nature of the advisory a given service may be further restricted or shut down as we prepare an update. The time frames between an advisory, triage, testing and patching differ based on the severity of the advisory. A critical patch will be applied as soon as it has been staged and tested, and will receive the highest level of attention from Synacor staff; Adelphia will be notified either while the patch is being evaluated, or as soon afterward as possible, when relevant to the customer’s service. Non-critical patches will be applied as part of the Maintenance Window; however, Synacor may not reveal all details (other than affected services) to the customer until after the patch has been applied to prevent potential security breaches. With few exceptions, such as a fundamental design issue that necessitates changes that cannot be easily ported to installed versions, any updates related to security are applied to the existing version of the software, even if the fix is released by an upstream source in new release. This is to avoid ancillary changes which may result in undesired behavior or even new security risks. Regardless of source, any updates are tested independently for suitability before general deployment, both to test the correctness of the fix itself as well as general functionality. This review process is, of course, expedited in the case of a serious risk. The review process is: apply patch, build package, install on a test host, review by QA and System Administration personnel with an attempt to run any known exploit if one exists, install on a pilot machine, review again, and general deployment. Data Backups, backup handling: All data backups are performed once per night, only over a secured Private Network to a protected Host residing in a locked rack. Backups are kept off-site as defined herein. The on-call Synacor Systems Administrator is alerted in the event of a back...
AutoNDA by SimpleDocs
Software Integrity. If the licensed content can be delivered to a device which has any outputs (either digital or analogue), the Content Protection System must ensure that the hardware and software (e.g. device drivers) providing output functionality has not been tampered with or replaced with non-compliant versions. Digital Outputs. If the licensed content can be delivered to a device which has digital outputs, the Content Protection System shall prohibit digital output of decrypted protected content. Notwithstanding the foregoing, a digital signal may be output if it is protected and encrypted by High-Bandwidth Digital Copy Protection (“HDCP”) or Digital Transmission Copy Protection (“DTCP”). Exception Clause for Standard Definition, Uncompressed Digital Outputs on Windows-based PCs and Macs running OS X or higher). HDCP must be enabled on all uncompressed digital outputs (e.g. HDMI, Display Port), unless the customer’s system cannot support HDCP (e.g., the content would not be viewable on such customer’s system if HDCP were to be applied) Upscaling: Device may scale Included Programs in order to fill the screen of the applicable display; provided that Licensee’s marketing of the Device shall not state or imply to consumers that the quality of the display of any such upscaled content is substantially similar to a higher resolution to the Included Program’s original source profile (i.e. SD content cannot be represented as HD content).
Software Integrity. GCH provides technical support of the software enabling the GIN Service. This includes fixing any bugs and updating the software in response to requests made by users. Updates/repairs will be immediately available to [AGENCY].
Software Integrity. Software Package Development Sonic Wall Content Security Management Sonic Wall E-Class Solutions Sonic Wall Endpoint Security Sonic Wall SSL-VPN Secure Remote Access Sonic Wall UTM / Firewall / VPN Spanning Tree SQL SQL Query Development SQL Server SSH SSL VPN SSLVPN Sun Directory Proxy Server Sun Directory Server Support and Maintenance of 1 - 5,000 Network Endpoints Support and Maintenance of 5,001 - 10,000 Network Endpoints SurfControl Administration SurfControl Report Scripting SurveyGizmo Sybase Sygate Admin Syslog Sysprep System Center (SMS) System/Middleware security TCP/IP Technical Documentation Technical Writing Telnet Terminal Networking TFTP Trusted credentials TSO TWS Unisys - ECL/WFL Unix Administration Unix command line Unix Scripting VB/batch scripting VB6 Version Control Video Conferencing Viewpoint Virtual Private Network (VPN) VISIO, CADD Visual Basic Visual Basic Scripting Visual FoxPro Visual SourceSafe Visual Studio .Net VLAN Vlan Tagging - 802.1q VMware Network Support VOIP VPN Devices VRRP WAN-Level Network Troubleshooting Web development tools (Dream Xxxxxx, Frontpage) Web Services Websense Administration Websense Report Scripting Windows Scripting Windows Services end to end solution development Windows Vista/7 Imaging and Advanced Administration Windows XP Imaging and Advanced Administration WLAN - 802.11a/b/g WLAN - 802.11a/b/g/n WLAN - 802.11n XML XML website development XSLT website development X-Windows
Software Integrity. 1. The Contractor must ensure the integrity of installed software by ensuring they are regularly checking for all viruses, worms, Trojan horses, and other malicious software and eradicating them in a timely manner.
Software Integrity. C OSI represents and warrants that no component of the New ALICOMP Software or the COSI Software shall include any feature or function which may enable COSI to: (i) discontinue at any time during the term of this Agreement or thereafter ALICOMP's effective use of the same; (ii) erase, destroy, corrupt, or modify without the consent of ALICOMP of any ALICOMP Data or other date stored on Computer Equipment used by ALICOMP; or (iii) bypass any internal or external software security measure without the consent or knowledge of ALICOMP to obtain access to such ALICOMP Data or other data. COSI xxxx XXXX 15 advise ALICOMP if it learns that a third party may accomplish any of the foregoing
Software Integrity. (4) Not to nor to attempt to copy or emulate the System or software in whole or in part and not to cause any third party to do so.
AutoNDA by SimpleDocs

Related to Software Integrity

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Review Systems The Asset Representations Reviewer will maintain and utilize an electronic case management system to manage the Tests and provide systematic control over each step in the Review process and ensure consistency and repeatability among the Tests.

  • Information Systems 5.1. The Customer is aware that vehicles manufactured, supplied or marketed by a company within the Volvo Group are equipped with one or more systems which may gather and store information about the vehicle (the “Information Systems”), including but not limited to information relating to vehicle condition and performance and information relating to the operation of the vehicle (together, the “Vehicle Data”). The Customer agrees not to interfere with the operation of the Information System in any way.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Materials and Equipment ‌ Material means property that may be consumed or expended during performance, component parts of a higher assembly, or items that lose their individual identity through incorporation into an end item. Equipment means a tangible item that is functionally complete for its intended purpose, durable, nonexpendable, and needed for performance. Materials and Equipment shall be priced in accordance with the terms of the task order award, contract type, and applicable FAR and agency-specific regulatory supplements. Unless otherwise directed by task order terms and conditions, the Contractor may apply indirect costs to materials and equipment consistent with the Contractor’s usual accounting practices.

  • Upgrades If this copy of the Software is an upgrade from an earlier version of the Software, it is provided to you on a license exchange basis. You agree by your installation and use of such copy of the Software to voluntarily terminate your earlier XXXX and that you will not continue to use the earlier version of the Software or transfer it to another person or entity unless such transfer is pursuant to Section 3.

Time is Money Join Law Insider Premium to draft better contracts faster.