Processing Environment definition

Processing Environment means the combination of software and hardware on which the Application runs. “Application” shall mean the computer code that supports and accomplishes the State’s requirements as set forth in this Contract. “Penetration Tests” shall be in the form of attacks on the Contractor’s computer system, with the purpose of discovering security weaknesses which have the potential to gain access to the Processing Environment’s features and data. The “Vulnerability Assessment” shall be designed and executed to define, identify, and classify the security holes (vulnerabilities) in the Processing Environment. The Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Processing Environment.
Processing Environment means the combination of software and hardware on which the Application runs. “Application” shall mean the
Processing Environment means the combination of software and hardware on which the Application runs. “

Examples of Processing Environment in a sentence

  • The written statement of Deficiencies shall be entered into the CMS Automated Survey Processing Environment (ASPEN) system and sent to HCPF to the designated email address.

  • The Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Processing Environment.

  • The written statement of Deficiencies shall be entered into the CMS Automated Survey Processing Environment (ASPEN) system.

  • The Cycle E Processing Environment shall include *** (*) ******* ********* (“****”), ***** (*)**** *********** (** ******** ****** ** ******* *** *******), *** (*) *******® ********** ***********, *** (*) ****** ************** ******** *********** *** ******* ************ **** *********** (“******”).

  • The audit report shall include at least one audit type that ascertains the Processing Environment uses FIPS 1402 encryption technologies to encrypt data at rest and date in motion and will report any findings if DRC is not appropriately using these technologies.

  • The IMS Processing Environment will be protected against the risks of intrusion through the use of suitable software, the effectiveness and updating of which must be checked periodically, in accordance with industry standards.

  • Upon expiration or termination of this Agreement, TSI shall have the option to purchase the Hardware from the Initial Distributed Processing Environment as set forth in Exhibit C hereto, in an "as is" condition at that time, for the amount of One Dollar ($1.00).

  • Service Provider must develop, implement and enforce reasonable written policies and procedures designed to ensure that Service Provider furnishes and maintains physical and electronic security for the IMS Processing Environment in compliance with this Exhibit, including standards for physical security as described in this subsection (g).

  • The procedure for reporting and managing security incidents regarding the IMS Processing Environment must include a record of each incident, including the time at which it occurred, the person reporting it, to whom it was reported, and the effects thereof.

  • If the annual system audit report contains any findings in the Processing Environment that are deemed critical in nature by the assessor, those critical findings will be remediated within 30 days of the issuance of the report.


More Definitions of Processing Environment

Processing Environment means the combination of software and hardware on which the Application runs. “Application” shall mean the computer code that supports and accomplishes the State’s requirements as set forth in this Contract. “Penetration Tests” shall be in the form of attacks on the Contractor’s computer system, with the purpose of discovering security weaknesses which have the potential to gain access to the Processing Environment’s features and data. The “Vulnerability Assessment” shall be designed and executed to define, identify, and classify the security holes (vulnerabilities) in the Processing Environment. The Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Processing Environment. The Contractor shall provide a letter of attestation on its processing environment that penetration tests and vulnerability assessments has been performed on an annual basis and taken corrective action to evaluate and address any findings. In the event of an unauthorized disclosure or unauthorized access to State data, the State Strategic Technology Solutions (STS) Security Incident Response Team (SIRT) must be notified and engaged by calling the State Customer Care Center (CCC) at ▇▇▇-▇▇▇-▇▇▇▇. Any such event must be reported by the Contractor within twenty-four (24) hours after the unauthorized disclosure has come to the attention of the Contractor.
Processing Environment means the combination of software and hardware on which the Application runs. “Application” shall mean the computer code that supports and accomplishes the State’s requirements as set forth in this Contract. “Penetration Tests” shall be in the form of attacks on Contractor’s computer system, with the purpose of discovering security weaknesses that have the potential to gain access to the Processing Environment’s features and data. The “Vulnerability Assessment” shall be designed and executed to define, identify, and classify the security holes (vulnerabilities) in the Processing Environment. Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Processing Environment. Upon State request, Contractor shall provide a copy of all Confidential State Data it holds. The Contractor shall provide such data on media and in a format determined by the State. Upon expiration of the Agreement, and in consultation with the State, Contractor shall destroy all Confidential State Data it holds in accordance with the current version of the National Institute of Standards and Technology (“NIST”) Special Publication 800-88. Contractor shall provide a written confirmation of destruction to the State within ten (10) business days after destruction. Contractor may maintain Confidential State Data it holds in its archives or backups, and such Confidential State Data shall be purged in accordance with Contractor’s backup lifecycle policies, provided that the requirements of this Section shall survive for as long as the Contractor holds State Data.
Processing Environment means the combination of software and hardware on which the Application runs. “Penetration Tests” shall be in the form of software attacks on the Contractor’s computer system, with the purpose of discovering security weaknesses, and potentially gaining access to the computer's features and data. The “Vulnerability Assessment” shall have the goal of defining, identifying, and classifying the security holes (vulnerabilities) in the Contractor’s computer, network, or communications infrastructure. The Contractor shall allow the State, at its option, to perform Penetration Tests and Vulnerability Assessments on the Contractor’s Processing Environment.