Common use of Vulnerability Monitoring Clause in Contracts

Vulnerability Monitoring. Zoommust continuously gather information and analyze vulnerabilities in light of existing and emerging threats and actual attacks. Processes must include vulnerability scans, anti-malware, Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS), logging and security information and event management analysis and correlation.

Appears in 4 contracts

Samples: Wisconsin Student Data Privacy Agreement, Data Processing Addendum, Data Processing Addendum

AutoNDA by SimpleDocs

Vulnerability Monitoring. Zoommust Zoom must continuously gather information and analyze vulnerabilities in light of existing and emerging threats and actual attacks. Processes must include vulnerability scans, anti-malware, Intrusion Detection Systems (IDS)/Intrusion Prevention Systems (IPS), logging and security information and event management analysis and correlation.

Appears in 2 contracts

Samples: Data Processing Addendum, Data Processing Addendum

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!