Vulnerability Scans Sample Clauses

Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for PC, IP enabled terminal, or integrated ECR merchants. Here are the steps to receive your Scan:
AutoNDA by SimpleDocs
Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for any merchant with Internet accessible I/P addresses connected to or that could allow access to their cardholder data environment. This includes, but is not limited to internet connected terminals, internet connected registers, and ecommerce environments. Here are the steps to receive your Scan:
Vulnerability Scans. Vendor shall perform internal and external host/network vulnerability scans at least quarterly and after any material change in the host/network configuration, and suspected or substantiated IT security or privacy incidents.
Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for may not waive, forgive, release, assign or in any manner fail to insist on strict performance of Sections 2.B, 2.D, 5.B.iii, 6.A, and 14.X.
Vulnerability Scans. Centercode (either directly or through third parties) shall scan all internet-accessible sites related to Customer’s Services at least annually and at any time a major change is made to a hosted site that could introduce vulnerabilities using industry standard scanning tools such as Nessus.
Vulnerability Scans. The Service Provider shall ensure that the Hosted Infrastructure, Platform Components and Application(s) are subjected to an OWASP-compliant vulnerability scan at least quarterly.
Vulnerability Scans. Pearson has a single, global vulnerability scanning and management program for its entire server/hosting estate. Coverage includes co-located and cloud-based servers, as well as all of the data centers managed directly by Pearson. Scanning is executed on an ongoing periodic basis for all servers/networks in scope, with critical applications and services are scanned more frequently depending upon the severity and necessity. Vulnerabilities discovered as part of Pearson vulnerability management program are assessed, collated and presented to individual application and system owners for remediation. Pearson then tracks the risk represented by vulnerabilities, and identifies where remediation requires additional attention or escalation through a Risk Exception process. When highly critical vulnerabilities are released, or threats are assessed as being high priority, Pearson executes a global remediation plan independent of vulnerability scanning to ensure the gap between vulnerability and closure is as small as possible. ● Pearson does not authorize customers to perform vulnerability scans or penetration scans against Pearson products which are shared with other customers. ● Pearson may share the results of our security assessments with our customers ● We will provide high level summaries via email under NDA. ● We will share actual vulnerability data on site and in person.
AutoNDA by SimpleDocs

Related to Vulnerability Scans

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Geological and Archeological Specimens If, during the execution of the Work, the Contractor, any Subcontractor, or any servant, employee, or agent of either should uncover any valuable material or materials, such as, but not limited to, treasure trove, geological specimens, archival material, archeological specimens, or ore, the Contractor acknowledges that title to the foregoing is vested in the Owner. The Contractor shall notify the Owner upon the discovery of any of the foregoing, shall take reasonable steps to safeguard it, and seek further instruction from the Design Professional. Any additional cost incurred by the Contractor shall be addressed under the provision for changed conditions. The Contractor agrees that the Geological and Water Resources Division and the Historic Preservation Division of the Georgia Department of Natural Resources may inspect the Work at reasonable times.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!