Source code review Sample Clauses

Source code review. Convercent will have a documented program for secure code reviews and maintain documentation of secure code reviews performed for all applications that store or process Customer Data.
AutoNDA by SimpleDocs
Source code review. Reviewers will review and evaluate overall system architecture and security, as well as relevant source code of the software and firmware used in the voting system, including: election management applications for election definition, ballot definition and layout, vote tabulation and reporting, auditing and security enforcement; firmware, software applications, non-COTS (commercial off-the-shelf) device drivers and customized or custom-developed operating systems of all vote recording devices, ballot marking devices, ballot scanning and tabulation devices and related peripherals (such as devices used to program voter access cards). The Reviewers may, at their discretion, review and evaluate any COTS components. The source code review will primarily focus on and seek to identify any security vulnerabilities that could be exploited to alter vote recording, vote results, critical election data such as audit logs, or to conduct a “denial of serviceattack on the voting system. The review will include, but not be limited to: ▪ Adherence to coding format conventions and standards; ▪ Program logic and branching structure; ▪ Commonly exploited input and output vulnerabilities, such as buffer overflows; ▪ Error and exception handling; and Embedded, exploitable code (such as “Easter eggs”) that can be triggered to adversely affect the system. The source code reviewers will identify for the SOS any software tools necessary to facilitate this analysis. Upon mutual agreement as to necessity, availability and cost, the SOS agrees to purchase and make those software tools available to the reviewers. The SOS will be responsible for obtaining and providing all required source code from the voting system vendor. The source code reviewers will coordinate their efforts and findings with team members reviewing system documentation and team members conducting the red team/penetration testing. Reviewers may communicate for this purpose by telephone and by encrypted e-mail, or any other communication method of equivalent security that has been approved in writing by the UC Principal Investigators. Red Team Testing Reviewers will conduct “red team” or “penetration” testing, of the functions and performance of voting systems, to identify and document vulnerabilities, if any, to tampering or error that could cause incorrect recording, tabulation, tallying or reporting of votes or that could alter critical election data such as election definition or system audit data. This testing w...
Source code review. Until the Closing, Jacada shall have the right to review and evaluate the Licensed Technology. Based on its review, Jacada may determine in its sole discretion that it does not desire to license the Licensed Technology. In this event, Jacada shall be entitled to terminate this Agreement upon written notice to Licensor without liability.
Source code review. The Purchaser and Parent shall have conducted their review, analysis, examination and testing of the Source Code in the manner set forth in

Related to Source code review

  • Research Records Each Party shall maintain records of each Research Program (or cause such records to be maintained) in sufficient detail and in good scientific manner as will properly reflect all work done and results achieved by or on behalf of such Party in the performance of such Research Program. All laboratory notebooks shall be maintained for no less than the term of any Patent issuing therefrom. All other records shall be maintained by each Party during the relevant Research Term and for [**] thereafter. All such records of a Party shall be considered such Party’s Confidential Information.

  • Development Records Each Party shall maintain complete, current and accurate records of all Development activities conducted by it hereunder, and all data and other information resulting from such activities. Such records shall fully and properly reflect all work done and results achieved in the performance of the Development activities in good scientific manner [*]. Each Party shall document all non-clinical studies and clinical trials in formal written study reports according to applicable Laws and national and international guidelines (e.g., ICH, GCP, GLP, and GMP). Each Party shall have the right to review and copy such records maintained by the other Party at reasonable times and to obtain access to the original [*].

  • Samples Physical examples of materials, equipment, or workmanship that are representative of some portion of the Work and that establish the standards by which such portion of the Work will be judged. The Contractor shall furnish for approval all samples required by the Contract Documents. The Work shall be in accordance with approved samples.

  • Training Materials Training Materials will be provided for each student. Training Materials may be used only for either (i) the individual student’s reference during Boeing provided training and for review thereafter or (ii) Customer’s provision of training to individuals directly employed by the Customer.

  • Independent Review Contractor shall provide the Secretary of ADS/CIO an independent expert review of any Agency recommendation for any information technology activity when its total cost is $1,000,000.00 or greater or when CIO requires one. The State has identified two sub-categories for Independent Reviews, Standard and Complex. The State will identify in the SOW RFP the sub-category they are seeking. State shall not consider bids greater than the maximum value indicated below for this category. Standard Independent Review $25,000 Maximum Complex Independent Review $50,000 Maximum Per Vermont statute 3 V.S.A. 2222, The Secretary of Administration shall obtain independent expert review of any recommendation for any information technology initiated after July 1, 1996, as information technology activity is defined by subdivision (a) (10), when its total cost is $1,000,000 or greater or when required by the State Chief Information Officer. Documentation of this independent review shall be included when plans are submitted for review pursuant to subdivisions (a)(9) and (10) of this section. The independent review shall include: • An acquisition cost assessment • A technology architecture review • An implementation plan assessment • A cost analysis and model for benefit analysis • A procurement negotiation advisory services contract • An impact analysis on net operating costs for the agency carrying out the activity In addition, from time to time special reviews of the advisability and feasibility of certain types of IT strategies may be required. Following are Requirements and Capabilities for this Service: • Identify acquisition and lifecycle costs; • Assess wide area network (WAN) and/or local area network (LAN) impact; • Assess risks and/or review technical risk assessments of an IT project including security, data classification(s), subsystem designs, architectures, and computer systems in terms of their impact on costs, benefits, schedule and technical performance; • Assess, evaluate and critically review implementation plans, e.g.: • Adequacy of support for conversion and implementation activities • Adequacy of department and partner staff to provide Project Management • Adequacy of planned testing procedures • Acceptance/readiness of staff • Schedule soundness • Adequacy of training pre and post project • Assess proposed technical architecture to validate conformance to the State’s “strategic direction.” • Insure system use toolsets and strategies are consistent with State Chief Information Officer (CIO) policies, including security and digital records management; • Assess the architecture of the proposed hardware and software with regard to security and systems integration with other applications within the Department, and within the Agency, and existing or planned Enterprise Applications; • Perform cost and schedule risk assessments to support various alternatives to meet mission need, recommend alternative courses of action when one or more interdependent segment(s) or phase(s) experience a delay, and recommend opportunities for new technology insertions; • Assess the architecture of the proposed hardware and software with regard to the state of the art in this technology. • Assess a project’s backup/recovery strategy and the project’s disaster recovery plans for adequacy and conformance to State policy. • Evaluate the ability of a proposed solution to meet the needs for which the solution has been proposed, define the ability of the operational and user staff to integrate this solution into their work.

  • Creative Work The Executive agrees that all creative work and work product, including but not limited to all technology, business management tools, processes, software, patents, trademarks, and copyrights developed by the Executive during the term of this Agreement, regardless of when or where such work or work product was produced, constitutes work made for hire, all rights of which are owned by the Employer. The Executive hereby assigns to the Employer all rights, title, and interest, whether by way of copyrights, trade secret, trademark, patent, or otherwise, in all such work or work product, regardless of whether the same is subject to protection by patent, trademark, or copyright laws.

  • Review of Materials During the term of this Agreement, Client shall ensure that all prospectuses, statements of additional information, registration statements, proxy statements, reports to shareholders, advertising and sales literature or other materials prepared for distribution to Fund shareholders or the public, which refer to the Subadviser in any way, prepared by employees or agents of Client or its affiliates are consistent with information previously provided by Subadviser. Subadviser shall promptly notify the Client of any changes to information pertaining to the Subadviser and stated in the materials described in this Section 6(g).

  • Development Work The Support Standards do not include development work either (i) on software not licensed from CentralSquare or (ii) development work for enhancements or features that are outside the documented functionality of the Solutions, except such work as may be specifically purchased and outlined in Exhibit 1. CentralSquare retains all Intellectual Property Rights in development work performed and Customer may request consulting and development work from CentralSquare as a separate billable service.

Time is Money Join Law Insider Premium to draft better contracts faster.