Vulnerability Assessment Sample Clauses

Vulnerability Assessment. Based on the potential current and future climate change impacts to sustainable forest management, a workshop will be held with the Woodlands Staff facilitating discussions to identify where the NFMC forest management system is vulnerable to climate change (adaptation is needed), and where opportunities for positive impacts could occur (enhanced by adaptation). Each impact will be ranked based on the potential effect (exposure and sensitivity) on the system and whether the system is resilient17 and has the adaptive capacity18 to cope with the impact. Uncertainties19 and knowledge gaps are considered vulnerabilities. The vulnerability rankings will be subjective and based on the information and knowledge available (including engagement feedback) to the Woodlands Staff at that time. Once the climate change impacts have been ranked based on vulnerability, the Woodlands Staff will narrow down which impacts are most vulnerable and require adaptations. The vulnerability assessment allows the Woodlands Staff to focus on impacts where they can influence the most change.
AutoNDA by SimpleDocs
Vulnerability Assessment. Consultant shall ensure all cloud applications are securely coded, vetted and scanned. Consultant shall: (i) conduct a third-party independent vulnerability assessment annually or sooner if due to compliance regulations or other requirements, or upon a major change to the solution; (ii) provide vulnerability assessment results to Board on an annual basis during the period the Consultant is subject to the terms of this Addendum; (iii) identify and validate vulnerabilities required for remediation; and iv) ensure patching is up to date.
Vulnerability Assessment. The supplier must use commercial products or freeware (e.g., Nessus) for vulnerability assessment and/or penetration testing of the segment(s) on which servers hosting Symantec information are logically located. The supplier must specify the name and version of the network-based vulnerability assessment tool(s) used. The supplier must conduct vulnerability assessment and/or penetration testing at least twice a year. The supplier must submit the vulnerability assessment and/or penetration testing report(s) to Symantec’s Information Security upon request. The supplier must agree to Symantec-conducted vulnerability assessment scans of the portion of its extranet to be used to service Symantec.
Vulnerability Assessment. The final phase (the “Vulnerability Assessment”) evaluates the most exposed assets and considers their on their intersection with inundation and shore recession layers and the basis for the highest vulnerability assets were described. This analysis points to assets or parts of assets that should be prioritized for management and adaptation actions, and which may need engineering analysis and future design work/retrofits to maintain access and operation.
Vulnerability Assessment any penetration test or vulnerability assessment conducted by Secure Schools as part of the Services.
Vulnerability Assessment. 2.7.1. A process must be established to identify and assess the vulnerabilities and relevant controls in the environment to be assessed (e.g. penetration testing, red team testing). 2.7.2. Continuous vulnerability scanning must be utilised to identify security and patch deficiencies.
Vulnerability Assessment. Based on the previous information, the Consultant will develop an overview of the City’s vulnerability to specific hazards. Electronic maps and GIS data (provided by the Consultant) will be developed that identify local assets that are located within known hazard areas. HAZUS*, CalOES MyHazards and similar reputable resources will be used to model losses as appropriate. This vulnerability assessment will include (as the data allows): a. Types and numbers of buildings, infrastructure, and critical facilities located within the planning area and within identified hazard areas b. An inventory of all repetitive flood loss structures, as defined by FEMA, if applicable c. Potential dollar losses from identified hazards will be estimated through a process that utilizes HAZUS-MH or GIS analysis of County assessor’s data with hazard locations d. Description of land uses and development trends to advise future land use decisions e. HAZUS is a nationally applicable standardized methodology that contains models for estimating potential losses from earthquakes, floods, and hurricanes.
AutoNDA by SimpleDocs
Vulnerability Assessment. Broker shall ensure all cloud applications are securely coded, vetted and scanned. Broker shall: (i) conduct a third-party independent vulnerability assessment annually or sooner if due to compliance regulations or other requirements, or upon a major change to the solution; (ii) provide vulnerability assessment results to PSERS on an annual basis during the period the Broker is subject to the terms of this Addendum; (iii) identify and validate vulnerabilities required for remediation; and iv) ensure patching is up to date.
Vulnerability Assessment. Contractor should provide any vulnerability assessment results revealing medium or higher rated vulnerabilities in accordance with industry accepted vulnerability rating services, obtained during the product development process, that have not been or will not be remediated within 30 calendar days for Medium rated vulnerabilities or 14 calendar days for High or Critical rated vulnerabilities.
Vulnerability Assessment. DOL will agree to implement automated vulnerability scanning tools that cover its systems and will set policies for prompt remediation.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!