Vulnerability Sample Clauses

Vulnerability a weakness in the computational logic (for example, code) found in software and hardware components that when exploited, results in a negative impact to the confidentiality, integrity, or availability, and the term Vulnerabilities shall be construed accordingly.
AutoNDA by SimpleDocs
Vulnerability a weakness in a system, application, network or process that is subject to exploitation or misuse.
Vulnerability susceptibility to loss or damage of elements exposed to the impact of a natural phenomenon.
Vulnerability a weakness in the computational logic (for example, code) found in software and hardware components that when exploited, results in a negative impact to the confidentiality, integrity, or availability, and the term Vulnerabilities shall be interpreted accordingly. Zoom: Zoom Video Communications Inc.
Vulnerability. The vulnerability (V) of water supply to shortage is defined as the probability that the demand (D) exceeds the supply (Q), that is, V = Pr[Q < D]. Therefore, making use of the probability density functions obtained in major Task A, the following tasks will be perfomed: C.1: For current climate conditions, quantify the vulnerability of water supply following the methods of Kochendorfer and Xxxxxxx, (1996).
Vulnerability. If any Product User’s systems or services are compromised, it is the responsibility of Customer to address the vulnerability and demonstrate to Converge’s sole satisfaction that it or such
Vulnerability a weakness in the computational logic (for example, code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability; and Working Day: Monday to Friday inclusive, with the exception of bank and public holidays in England and Wales.
AutoNDA by SimpleDocs
Vulnerability. Vulnerabilities in software or hardware enabling cyber criminals to break in digital.
Vulnerability a weakness in a system, application, network or process that is subject to exploitation or misuse. Workforce Member: employees, volunteers, and other persons whose conduct, in the performance of work for Los Angeles County, is under the direct control of Los Angeles County, whether or not they are paid by Los Angeles County. This includes, but may not be limited to, full and part time elected or appointed officials, employees, affiliates, associates, students, volunteers, and staff from third party entities who provide service to the County. INFORMATION SECURITY AND PRIVACY PROGRAMS
Vulnerability. An explanation for these discrepancies may be that there are many factors of blockchain adoption [24]. It is likely that the experts do not have all factors readily available but mention only those that are important to them. Another explanation for these discrepancies may be that the experts take a different viewpoint. For example, blockchain could provide economic benefits (factor 16) when improving existing business pro- cesses. However, blockchain does not necessarily provide eco- nomic benefits when compared to another technology, which also can be used to improve existing business processes. As another example, in the literature it is well known [42] that a public blockchain has limited transaction scalability, which could be considered as an impediment. However, scalability is only a problem when a requirement exists that exceeds the current scalability of blockchain. As these factors allow for such a point of view, it may explain the discrepancies between the experts opinions.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!