Vulnerability Scans Sample Clauses

Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for PC, IP enabled terminal, or integrated ECR merchants. Here are the steps to receive your Scan: 1. Once you have completed your SAQ, the system will guide you to schedule a Scan, if applicable. 2. The Scan will identify vulnerabilities or gaps that may allow unauthorized or malicious users to gain access to your network and potentially compromise cardholder data. The Scan does not require you to install any software, and no denial-of-service attacks will be performed. 3. Upon completion of the Scan, you will receive a link to your full compliance report. A network vulnerability review failure means that the Scan discovered areas of severe vulnerability. The report describes the issues found and provides you with recommendations for scan resources to begin fixing the problems. The tool will guide you to remediate the failed Scan and work toward achieving compliance. Once you have addressed the vulnerabilities, simply schedule a follow-up Scan to ensure your remediation of the problem meets the PCI DSS requirements.
AutoNDA by SimpleDocs
Vulnerability Scans. Vendor shall perform internal and external host/network vulnerability scans at least quarterly and after any material change in the host/network configuration, and suspected or substantiated IT security or privacy incidents.
Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for any merchant with Internet accessible I/P addresses connected to or that could allow access to their cardholder data environment. This includes, but is not limited to internet connected terminals, internet connected registers, and ecommerce environments. Here are the steps to receive your Scan: 1. Once you have completed your SAQ, the system will guide you to schedule a Scan, if applicable. 2. The Scan will identify vulnerabilities or gaps that may allow unauthorized or malicious users to gain access to your network and potentially compromise cardholder data. The Scan does not require you to install any software, and no denial-of-service attacks will be performed. 3. Upon completion of the Scan, you will receive a link to your full compliance report. A network vulnerability review failure means that the Scan discovered areas of severe vulnerability. The report describes the issues found and provides you with recommendations for scan resources to begin fixing the problems. The tool will guide you to remediate the failed Scan and work toward achieving compliance. Once you have addressed the vulnerabilities, simply schedule a follow-up Scan to ensure your remediation of the problem meets the PCI DSS requirements.
Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for PC, IP enabled terminal, or integrated ECR merchants (SAQ A-EP, SAQ B-IP, SAQ C or SAQ D Merchants). Here are the steps to receive Merchant’s Scan: 1. Once Merchant has completed Merchant’s SAQ, the system will guide Merchant to schedule Merchant’s Scan, if applicable. 2. The Scan will identify vulnerabilities or gaps that may allow unauthorized or malicious users to gain access to Merchant’s network and potentially compromise cardholder data. The Scan does not require Merchant to install any software, and no denial-of-service attacks will be performed. 3. Upon completion of the Scan, Merchant will receive a link to Merchant’s full compliance report. If Merchant fails network vulnerability review, this means that the Scan discovered areas of severe vulnerability. The TrustKeeper report describes the issues found and provides Merchant with recommendations for scan resources to begin fixing the problems. The tool will guide Merchant to remediate the failed Scan and work toward achieving compliance. Once Merchant has addressed the vulnerabilities, simply schedule a follow-up Scan to ensure Merchant’s remediation of the problem meets the PCI DSS requirements.
Vulnerability Scans. Pearson has a single, global vulnerability scanning and management program for its entire server/hosting estate. Coverage includes co-located and cloud-based servers, as well as all of the data centers managed directly by Pearson. Scanning is executed on an ongoing periodic basis for all servers/networks in scope, with critical applications and services are scanned more frequently depending upon the severity and necessity. Vulnerabilities discovered as part of Pearson vulnerability management program are assessed, collated and presented to individual application and system owners for remediation. Pearson then tracks the risk represented by vulnerabilities, and identifies where remediation requires additional attention or escalation through a Risk Exception process. When highly critical vulnerabilities are released, or threats are assessed as being high priority, Pearson executes a global remediation plan independent of vulnerability scanning to ensure the gap between vulnerability and closure is as small as possible. ● Pearson does not authorize customers to perform vulnerability scans or penetration scans against Pearson products which are shared with other customers. ● Pearson may share the results of our security assessments with our customers ● We will provide high level summaries via email under NDA. ● We will share actual vulnerability data on site and in person.
Vulnerability Scans. The Service Provider shall ensure that the Hosted Infrastructure, Platform Components and Application(s) are subjected to an OWASP-compliant vulnerability scan at least quarterly.
Vulnerability Scans. Centercode (either directly or through third parties) shall scan all internet-accessible sites related to Customer’s Services at least annually and at any time a major change is made to a hosted site that could introduce vulnerabilities using industry standard scanning tools such as Nessus.
AutoNDA by SimpleDocs
Vulnerability Scans. A vulnerability scan (“Scan”) is necessary for may not waive, forgive, release, assign or in any manner fail to insist on strict performance of Sections 2.B, 2.D, 5.B.iii, 6.A, and 14.X.
Vulnerability Scans. External and internal vulnerability scans are performed at least quarterly. Internal scans are also performed after major changes.

Related to Vulnerability Scans

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Safety Measures Awarded vendor shall take all reasonable precautions for the safety of employees on the worksite, and shall erect and properly maintain all necessary safeguards for protection of workers and the public. Awarded vendor shall post warning signs against all hazards created by the operation and work in progress. Proper precautions shall be taken pursuant to state law and standard practices to protect workers, general public and existing structures from injury or damage.

  • Abuse and Neglect of Children and Vulnerable Adults: Abuse Registry Party agrees not to employ any individual, to use any volunteer or other service provider, or to otherwise provide reimbursement to any individual who in the performance of services connected with this agreement provides care, custody, treatment, transportation, or supervision to children or to vulnerable adults if there has been a substantiation of abuse or neglect or exploitation involving that individual. Party is responsible for confirming as to each individual having such contact with children or vulnerable adults the non-existence of a substantiated allegation of abuse, neglect or exploitation by verifying that fact though (a) as to vulnerable adults, the Adult Abuse Registry maintained by the Department of Disabilities, Aging and Independent Living and (b) as to children, the Central Child Protection Registry (unless the Party holds a valid child care license or registration from the Division of Child Development, Department for Children and Families). See 33 V.S.A. §4919(a)(3) and 33 V.S.A. §6911(c)(3).

  • Loop Testing/Trouble Reporting 2.1.6.1 Telepak Networks will be responsible for testing and isolating troubles on the Loops. Telepak Networks must test and isolate trouble to the BellSouth portion of a designed/non-designed unbundled Loop (e.g., UVL-SL2, UCL-D, UVL-SL1, UCL-ND, etc.) before reporting repair to the UNE Customer Wholesale Interconnection Network Services (CWINS) Center. Upon request from BellSouth at the time of the trouble report, Telepak Networks will be required to provide the results of the Telepak Networks test which indicate a problem on the BellSouth provided Loop. 2.1.6.2 Once Telepak Networks has isolated a trouble to the BellSouth provided Loop, and had issued a trouble report to BellSouth on the Loop, BellSouth will take the actions necessary to repair the Loop if a trouble actually exists. BellSouth will repair these Loops in the same time frames that BellSouth repairs similarly situated Loops to its End Users. 2.1.6.3 If Telepak Networks reports a trouble on a non-designed or designed Loop and no trouble actually exists, BellSouth will charge Telepak Networks for any dispatching and testing (both inside and outside the CO) required by BellSouth in order to confirm the Loop’s working status. 2.1.6.4 In the event BellSouth must dispatch to the end-user’s location more than once due to incorrect or incomplete information provided by Telepak Networks (e.g., incomplete address, incorrect contact name/number, etc.), BellSouth will xxxx Xxxxxxx Networks for each additional dispatch required to repair the circuit due to the incorrect/incomplete information provided. BellSouth will assess the applicable Trouble Determination rates from BellSouth’s FCC or state tariffs.

  • Searchability Offering searchability capabilities on the Directory Services is optional but if offered by the Registry Operator it shall comply with the specification described in this section. 1.10.1 Registry Operator will offer searchability on the web-­‐based Directory Service. 1.10.2 Registry Operator will offer partial match capabilities, at least, on the following fields: domain name, contacts and registrant’s name, and contact and registrant’s postal address, including all the sub-­‐fields described in EPP (e.g., street, city, state or province, etc.). 1.10.3 Registry Operator will offer exact-­‐match capabilities, at least, on the following fields: registrar id, name server name, and name server’s IP address (only applies to IP addresses stored by the registry, i.e., glue records). 1.10.4 Registry Operator will offer Boolean search capabilities supporting, at least, the following logical operators to join a set of search criteria: AND, OR, NOT. 1.10.5 Search results will include domain names matching the search criteria. 1.10.6 Registry Operator will: 1) implement appropriate measures to avoid abuse of this feature (e.g., permitting access only to legitimate authorized users); and 2) ensure the feature is in compliance with any applicable privacy laws or policies.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Human Leukocyte Antigen Testing This plan covers human leukocyte antigen testing for A, B, and DR antigens once per member per lifetime to establish a member’s bone marrow transplantation donor suitability in accordance with R.I. General Law §27-20-36. The testing must be performed in a facility that is: • accredited by the American Association of Blood Banks or its successors; and • licensed under the Clinical Laboratory Improvement Act as it may be amended from time to time. At the time of testing, the person being tested must complete and sign an informed consent form that also authorizes the results of the test to be used for participation in the National Marrow Donor program.

  • Animals The Hirer shall ensure that no animals (including birds) except guide dogs are brought into the premises, other than for a special event agreed to by the Village Hall. No animals whatsoever are to enter the kitchen at any time.

  • Disturbance Analysis Data Exchange The Parties will cooperate with one another and the NYISO in the analysis of disturbances to either the Large Generating Facility or the New York State Transmission System by gathering and providing access to any information relating to any disturbance, including information from disturbance recording equipment, protective relay targets, breaker operations and sequence of events records, and any disturbance information required by Good Utility Practice.

  • Start-Up and Synchronization Consistent with the mutually acceptable procedures of the Developer and Connecting Transmission Owner, the Developer is responsible for the proper synchronization of the Large Generating Facility to the New York State Transmission System in accordance with NYISO and Connecting Transmission Owner procedures and requirements.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!