System and Communications Protection. Supplier will: a. Encrypt (in Transit and at Rest) Verizon Highly Confidential information. b. Employ reasonable controls to secure source code, including version control, segregation of source code repositories, and least privilege access principles. c. Incorporate security vulnerability and malicious code assessments throughout the software development life cycle.
Appears in 4 contracts
Samples: Master Collateral Agency and Intercreditor Agreement (Verizon Master Trust), Master Collateral Agency and Intercreditor Agreement (Verizon Master Trust), Transfer and Servicing Agreement (Verizon Master Trust)