System and Software Protection Sample Clauses

System and Software Protection. (i) All system and applications must utilize secure authentication and authorization mechanisms (ii) All KnowBe4-developed applications must be designed and implemented using secure coding standards and design principles (e.g., OWASP) (iii) Operating systems must be hardened appropriately according to industry standard practices (iv) Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible
AutoNDA by SimpleDocs
System and Software Protection a) All system and applications must utilize secure authentication and authorization mechanisms; b) All Supplier-developed applications must be designed and implemented using secure coding standards and design principles (e.g. OWASP); c) Operating systems should be hardened appropriately according to industry best practices (e.g. NIST 800 series, NSA guidelines, CIS benchmark, etc.).
System and Software Protection. 系统与软件防护。
System and Software Protection. (i) All system and applications must utilize secure authentication and authorization mechanisms. (ii) All Sarborg-developed applications must be designed and implemented using secure coding standards and design principles (e.g., OWASP). (iii) Operating systems must be hardened appropriately according to industry standard practices. (iv) Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible.
System and Software Protection. 1. Utilize secure authentication and authorization mechanisms for all systems and applications. 2. Use secure coding standards and design principals (e.g., OWASP) for developed applications. 3. Xxxxxx operating systems appropriately according to industry best practices (e.g. NIST 800 series, NSA guidelines, CIS benchmark, etc.).

Related to System and Software Protection

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!