Third Party Security Audit Sample Clauses

Third Party Security Audit. Lattice is and shall continue to be annually audited against the SOC 2 Type II standard. The audit shall be completed by an independent third-party. Upon Customer’s written request, Lattice will provide a summary copy (on a confidential basis) of the most recent resulting annual audit report, so that Customer can verify Lattice’s compliance with the audit standards against which it has been assessed and this DPA. Although that report provides an independently audited confirmation of Lattice’s security posture annually, the most common points of interest are further detailed below. Lattice shall provide Customer with this initial evidence of compliance within thirty (30) days of written request and annually upon written request.
AutoNDA by SimpleDocs
Third Party Security Audit. Contractor engaged IOActive to evaluate the security threats and risks associated with Contractor’s external web application, and to perform a vulnerability assessment and penetration test. As a result, IOActive consultants performed an extensive security assessment of the identified application. About IOActive: Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specializations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, game, hardware, retail, financial, media, travel, aerospace, healthcare, high-tech, social networking, and software development organizations.
Third Party Security Audit. Gainsight shall continue to be annually audited against the SOC 2 Type II standard, at Gainsight’s expense. The audit shall be completed by an independent third-party. Upon Client’s written request, Gainsight will provide a copy of the resulting annual audit report. Although that report provides an independently audited confirmation of Gainsight’s security posture annually, the most common points of interest are further detailed below. Gainsight shall provide Client with this initial evidence of compliance within thirty (30) days of written request and annually upon written request.

Related to Third Party Security Audit

  • Safety; Security Contractor’s failure to comply with any of the requirements in this Section shall be cause for termination.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

  • Third Party Data Any statistical, industry-related and market-related data, which are included in the Disclosure Package and the Prospectus, is based on or derived from sources that the Company reasonably and in good faith believes to be reliable and accurate, and such data agrees with the sources from which it is derived, and the Company has obtained the written consent for the use of such data from such sources to the extent required.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!