Vulnerability Sample Clauses

Vulnerability a weakness in the computational logic (for example, code) found in software and hardware components that when exploited, results in a negative impact to the confidentiality, integrity, or availability, and the term Vulnerabilities shall be construed accordingly.
AutoNDA by SimpleDocs
Vulnerability a weakness in a system, application, network or process that is subject to exploitation or misuse.
Vulnerability. The vulnerability (V) of water supply to shortage is defined as the probability that the demand (D) exceeds the supply (Q), that is, V = Pr[Q < D]. Therefore, making use of the probability density functions obtained in major Task A, the following tasks will be perfomed:
Vulnerability susceptibility to loss or damage of elements exposed to the impact of a natural phenomenon.
Vulnerability a weakness in the computational logic (for example, code) found in software and hardware components that when exploited, results in a negative impact to the confidentiality, integrity, or availability, and the term Vulnerabilities shall be construed accordingly.  Clause, schedule and paragraph headings shall not affect the interpretation of this agreement.  A person includes an individual, corporate or unincorporated body (whether or not having separate legal personality) and that person’s legal and personal representatives, successors or permitted assigns.  A reference to a company shall include any company, corporation or other body corporate, wherever and however incorporated or established.  Unless the context otherwise requires, words in the singular shall include the plural and in the plural shall include the singular.  Unless the context otherwise requires, a reference to one gender shall include a reference to the other genders.  A reference to a statute or statutory provision is a reference to it as it is in force as at the date of this agreement.  A reference to a statute or statutory provision shall include all subordinate legislation made as at the date of this agreement under that statute or statutory provision.  A reference to writing or written excludes faxes but includes e-mail.  References to clauses and schedules are to the clauses and schedules of this agreement; references to paragraphs are to paragraphs of the relevant schedule to this agreement.
Vulnerability a weakness in the computational logic (for example, code) found in software and hardware components that when exploited, results in a negative impact to the confidentiality, integrity, or availability, and the term Vulnerabilities shall be interpreted accordingly. Order Form: the Order Form sets out the pricing of the Services and further terms on the user’s rights to make transactions, amongst other terms to be mutually agreed between the Client and the Supplier. With respect to the purchase of development, consulting, and extra support services, the Supplier shall prepare a project proposal which shall constitute a Order Form.
Vulnerability a weakness in a system, application, network or process that is subject to exploitation or misuse. Workforce Member: employees, volunteers, and other persons whose conduct, in the performance of work for Los Angeles County, is under the direct control of Los Angeles County, whether or not they are paid by Los Angeles County. This includes, but may not be limited to, full and part time elected or appointed officials, employees, affiliates, associates, students, volunteers, and staff from third party entities who provide service to the County. INFORMATION SECURITY AND PRIVACY PROGRAMS
AutoNDA by SimpleDocs
Vulnerability. Please describe how vulnerability factors are being addressed in this project and how the project is enhancing social cohesion defined as "the capacity of a society to ensure the well-being of all its members, minimising disparities and avoiding marginalisation"4 ------------
Vulnerability. As studied in deliverable 2.6 (“Methodology for evaluation of the socio-economic impact of landslides (societal vulnerability)”), the age demographic, and other features (such as wealth, employment) of the population may have an effect upon the vulnerabilities to the landslide hazard. The young, old and disabled may all be less mobile than others and such mobility issues must be dealt with during the evacuation. In addition, such demographic groups may also be more vulnerable to the physical effects exerted by the hazard although this is considered to be an issue somewhat too detailed for the present study
Vulnerability. The impacts of damage to linear infrastructure can have an impact much more widespread than the limited footprint of the hazard as the vulnerability shadow often extends across a much wider area. The severance of electricity lines for example can deprive many thousands of households of power often during periods of heightened vulnerability due to other hazards such as adverse weather conditions and/or earthquakes. Damage to, or destruction of, linear transport infrastructure can sever the access of populations to social and economic activities: these activities might include access to education, healthcare, leisure and employment opportunities; tourism; and the import and export of goods. The geographic extent of such populations can be significant casting an extensive vulnerability shadow from a relatively small landslide hazard footprint. A real-world example of a small event footprint casting a large vulnerability shadow can be found in Jamaica. A relatively small landslide event destroyed a short length of the B1 road which severed the most direct route for the transport of high value Blue Mountain C of fee from its source to its point of export. This clearly demonstrates how a single, isolated event can cast a large vulnerability shadow and have a far greater than anticipated impact. (Winter and Bromhead, 2008).
Time is Money Join Law Insider Premium to draft better contracts faster.