Third Party Security Audit Sample Clauses

Third Party Security Audit. Lattice is and shall continue to be annually audited against the SOC 2 Type II standard. The audit shall be completed by an independent third-party. Upon Customer’s written request, Lattice will provide a summary copy (on a confidential basis) of the most recent resulting annual audit report, so that Customer can verify Lattice’s compliance with the audit standards against which it has been assessed and this DPA. Although that report provides an independently audited confirmation of Lattice’s security posture annually, the most common points of interest are further detailed below. Lattice shall provide Customer with this initial evidence of compliance within thirty (30) days of written request and annually upon written request.
AutoNDA by SimpleDocs
Third Party Security Audit. Contractor engaged IOActive to evaluate the security threats and risks associated with Contractor’s external web application, and to perform a vulnerability assessment and penetration test. As a result, IOActive consultants performed an extensive security assessment of the identified application. “The IOActive consultants found the assessed application to be in good security standing overall—it contained little in terms of critical vulnerabilities and the one high-risk item found that enabled session hijacking was remediated quickly by Socrata staff.” About IOActive: Established in 1998, IOActive is an industry leader that offers comprehensive computer security services with specializations in smart grid technologies, software assurance, and compliance. Boasting a well-rounded and diverse clientele, IOActive works with a majority of Global 500 companies including power and utility, game, hardware, retail, financial, media, travel, aerospace, healthcare, high-tech, social networking, and software development organizations.
Third Party Security Audit. Gainsight shall continue to be annually audited against the SOC 2 Type II standard, at Gainsight’s expense. The audit shall be completed by an independent third-party. Upon Client’s written request, Gainsight will provide a copy of the resulting annual audit report. Although that report provides an independently audited confirmation of Gainsight’s security posture annually, the most common points of interest are further detailed below. Gainsight shall provide Client with this initial evidence of compliance within thirty (30) days of written request and annually upon written request.

Related to Third Party Security Audit

  • Security Audit Customer agrees that PROS’ Audit Report will be used to satisfy any audit or inspection requests by or on behalf of Customer, and PROS will make Audit Reports available to Customer upon request. PROS will promptly remediate any material weaknesses or significant control deficiencies identified in any Audit Reports. In the event that an audit opinion is qualified and the qualification has not been remediated by the date of the Audit Report, PROS shall (i) provide Customer with PROS remediation plan; and (ii) execute such plan in accordance with its terms.

  • Security Audits Each Contract Year, County may perform or have performed security reviews and testing based on an IT infrastructure review plan. Such testing shall ensure all pertinent County security standards as well as any customer agency requirements, such as federal tax requirements or HIPPA.

  • Third Party Services Any services required for or contemplated by the performance of the above-referenced services by the Administrator to be provided by unaffiliated third parties (including independent auditors’ fees and counsel fees) may, if provided for or otherwise contemplated by the Financing Order and if the Issuer deems it necessary or desirable, be arranged by the Issuer or by the Administrator at the direction (which may be general or specific) of the Issuer. Costs and expenses associated with the contracting for such third-party professional services may be paid directly by the Issuer or paid by the Administrator and reimbursed by the Issuer in accordance with Section 2, or otherwise as the Administrator and the Issuer may mutually arrange.

  • Third-Party Applications Oracle or third party providers may offer Third Party Applications. Except as expressly set forth in the Estimate/Order Form, Oracle does not warrant any such Third Party Applications, regardless of whether or not such Third Party Applications are provided by a third party that is a member of an Oracle partner program or otherwise designated by Oracle as “Built For NetSuite,” "certified," "approved" or “recommended.” Any procurement by Customer of such Third Party Applications or services is solely between Customer and the applicable third party provider. Customer may not use Third Party Applications to enter and/or submit transactions to be processed and/or stored in the NetSuite CPQ, unless Customer has procured the applicable subscription to the NetSuite CPQ for such use and access. Oracle is not responsible for any aspect of such Third Party Applications that Customer may procure or connect to through the NetSuite CPQ, or any interoperation, descriptions, promises, or other information related to the foregoing. If Customer installs or enables Third Party Applications for use with the NetSuite CPQ, Customer agrees that Oracle may enable such third party providers to access Customer Data for the interoperation of such Third Party Applications with the NetSuite CPQ, and any exchange of data or other interaction between Customer and a third party provider is solely between Customer and such third party provider pursuant to a separate privacy policy or other terms governing Customer’s access to or use of the Third Party Applications. Oracle shall not be responsible for any disclosure, modification or deletion of Customer Data resulting from any such access by Third Party Applications or third party providers. No procurement of such Third Party Applications is required to use the NetSuite CPQ. If Customer was referred to Oracle by a member of one of Oracle’s partner programs, Customer hereby authorizes Oracle to provide such member or its successor entity with access to Customer’s business information related to the procurement and use of the NetSuite CPQ pursuant to this Agreement, including but not limited to User names and email addresses, support cases and billing/payment information.

  • Third Party Links The Services may contain links to third-party services such as third party websites, applications, or ads ("Third-Party Links"). When you click on such a link, we will not warn you that you have left the Services. The Company does not control and is not responsible for Third-Party Links. The Company provides these Third-Party Links only as a convenience and does not review, approve, monitor, endorse, warrant, or make any representations with respect to them, or any content, products or services accessible through such links. Your use of all Third-Party Links is at your own risk.

  • Third Party Servicer The Assuming Institution may perform any of its obligations and/or exercise any of its rights under this Single Family Shared-Loss Agreement through or by one or more Third Party Servicers, who may take actions and make expenditures as if any such Third Party Servicer was the Assuming Institution hereunder (and, for the avoidance of doubt, such expenses incurred by any such Third Party Servicer on behalf of the Assuming Institution shall be included in calculating Losses to the extent such expenses would be included in such calculation if the expenses were incurred by Assuming Institution); provided, however, that the use thereof by the Assuming Institution shall not release the Assuming Institution of any obligation or liability hereunder.

  • Information Security Program (1) DTI shall implement and maintain a comprehensive written information security program applicable to the Personal Information ("Information Security Program") which shall include commercially reasonable measures, including, as appropriate, policies and procedures and technical, physical, and administrative safeguards that are consistent with industry standards, providing for (i) the security and confidentiality of the Personal Information, (ii) protection of the Personal Information against reasonably foreseeable threats or hazards to the security or integrity of the Personal Information, (iii) protection against unauthorized access to or use of or loss or theft of the Personal Information, and (iv) appropriate disposal of the Personal Information. Without limiting the generality of the foregoing, the Information Security Program shall provide for (i) continual assessment and re-assessment of the risks to the security of Personal Information acquired or maintained by DTI and its agents, contractors and subcontractors in connection with the Services, including but not limited to (A) identification of internal and external threats that could result in unauthorized disclosure, alteration or destruction of Personal Information and systems used by DTI and its agents, contractors and subcontractors, (B) assessment of the likelihood and potential damage of such threats, taking into account the sensitivity of such Personal Information, and (C) assessment of the sufficiency of policies, procedures, information systems of DTI and its agents, contractors and subcontractors, and other arrangements in place, to control risks; and (ii) appropriate protection against such risks.

  • Third Party Vendors Nothing herein shall impose any duty upon DST in connection with or make DST liable for the actions or omissions to act of the following types of unaffiliated third parties: (a) courier and mail services including but not limited to Airborne Services, Federal Express, UPS and the U.S. Mails, (b) telecommunications companies including but not limited to AT&T, Sprint, MCI and other delivery, telecommunications and other such companies not under the party’s reasonable control, and (c) third parties not under the party’s reasonable control or subcontract relationship providing services to the financial industry generally, such as, by way of example and not limitation, the National Securities Clearing Corporation (processing and settlement services), Fund custodian banks (custody and fund accounting services) and administrators (blue sky and Fund administration services), and national database providers such as Choice Point, Acxiom, TransUnion or Lexis/Nexis and any replacements thereof or similar entities, provided, if DST selected such company, DST shall have exercised due care in selecting the same. Such third party vendors shall not be deemed, and are not, subcontractors for purposes of this Agreement.

  • Third Party Financing If Product acquisitions are financed through any third party financing, Contractor may be required as a condition of Contract Award to agree to the terms and conditions of a “Consent & Acknowledgment Agreement” in a form acceptable to the Commissioner.

  • Third Party Verification 4.8.1 The SPD shall be further required to provide entry to the site of the Power Project free of all encumbrances at all times during the Term of the Agreement to SECI and a third Party nominated by any Indian Governmental Instrumentality for inspection and verification of the works being carried out by the SPD at the site of the Power Project.

Time is Money Join Law Insider Premium to draft better contracts faster.