Security Patches definition

Security Patches mean a software or computer system patch that is intended to correct a Vulnerability in that software or system. “Service Account” means an account used for servicing a computer system that may be used by more than one User.

Examples of Security Patches in a sentence

  • IBM may, however, apply Security Patches IBM deems necessary to fix significant vulnerabilities and exposures to the application and infrastructure layer of the Production Environment with no notice or Client testing period.IBM will provide Client a 60 day period to test in all Non-Production Environments prior to promoting the IBM-Initiated Update to the Pre-Production and Production Environment.

  • If a Security Patch cannot be promptly applied due to requirements for testing, then effective risk mitigation controls will be implemented until such time as Security Patches can be applied.

  • IBM performs the required maintenance and updates of the Cloud Service which includes implementing upgrades, patches, and Security Patches (collectively, "IBM-Initiated Updates").

  • Contractor shall not hide or provide un-documented Security Patches in any type of change to their Product or Service.

  • For the avoidance of doubt, Contractor is not responsible for creation of Security Patches for Vulnerabilities in the Product that is caused solely by the Off- the-Shelf Software installed by Metro Government.

  • Unless otherwise expressly agreed by Metro Government and Contractor, for Products that are no longer under performance warranty, Contractor shall provide no less than standard maintenance and support service for the Products, which service includes providing Security Patches for the Products, for as long as Metro Government is using the Products.

  • Contractor shall publish whether the Security Patches are generally compatible with each related Product.

  • Unless otherwise requested by Metro Government, Security Patches shall be applied within fourteen (14) days from its release for Critical Security Patches, thirty (30) days for Important Security Patches, and twelve (12) months for all other applicable Security Patches.

  • For Security Patches for Off-the-Shelf Software (OTS), Contractor shall Certify General Compatibility of a Critical Security Patch within five (5) days and Certify General Compatibility of an Important Security Patch within thirty (30) days from its release.

  • IBM performs the required maintenance and updates of the Cloud Service which includes implementing infrastructure patches, Application patches, and Security Patches (collectively, "IBM-Initiated Updates").IBM-Initiated Updates are performed on a routine basis or during scheduled maintenance windows.

Related to Security Patches

  • Security Party means the Borrowers, the Corporate Guarantor, the Shareholder or any other person who may at any time be a party to any of the Security Documents (other than the Banks);

  • Ship means a vessel of any type whatsoever operating in the marine environment and includes hydrofoil boats, air-cushion vehicles, submersibles, floating craft and fixed or floating platforms.

  • Security Parties means at any relevant time, the Borrower, the Guarantor, the Pledgor, the Target, the Vessel Owners and any other person who may at any time during the Facility Period be liable for, or provide security for, all or any part of the Indebtedness, and “Security Party” means any one of them.

  • Security alarm system means a device or series of devices, intended to summon law enforcement personnel during, or as a result of, an alarm condition. Devices may include hard- wired systems and systems interconnected with a radio frequency method such as cellular or private radio signals that emit or transmit a remote or local audible, visual, or electronic signal; motion detectors, pressure switches, duress alarms (a silent system signal generated by the entry of a designated code into the arming station to indicate that the user is disarming under duress); panic alarms (an audible system signal to indicate an emergency situation); and hold-up alarms (a silent system signal to indicate that a robbery is in progress).

  • Security Provider means a person which, in accordance with the provisions of this Agreement, provides or is to provide any guarantee or other surety or security in respect of that Party’s obligations under this Agreement;

  • Information Security Program means the administrative, technical, and physical safeguards that a licensee uses to access, collect, distribute, process, protect, store, use, transmit, dispose of, or otherwise handle nonpublic information.

  • Security procedure means a procedure employed for the purpose of verifying that an electronic signature, record, or performance is that of a specific person or for detecting changes or errors in the information in an electronic record. The term includes a procedure that requires the use of algorithms or other codes, identifying words or numbers, encryption, or callback or other acknowledgment procedures.

  • Mortgaged Ship means a Ship which is subject to a Mortgage at the relevant time and, in the plural, means all of them;

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Vessel means the vessel/craft belonging to the Contractor for carrying out the work.

  • Security Plan means the Contractor’s security plan prepared pursuant to paragraph 3 of Schedule (Security Requirements & Plan)

  • Security freeze means a notice, at the request of the consumer and subject to certain exceptions,

  • Security Policy Framework means the Cabinet Office Security Policy Framework (available from the Cabinet Office Security Policy Division);

  • Security Tests means conduct tests of the processes and countermeasures contained in the Security Plan.

  • ISM Code Documentation includes, in respect of a Ship:

  • Security Procedures means rules and regulations governing access to, and health and safety procedures while on, Government premises; and information technology security protocols;

  • Engines means, as of any date of determination, all Engines then leased hereunder.

  • Security Property means all right, title and interest in, to and under any Security Document, including:

  • Security Bond means an amount payable by a tenant as security for the performance of his obligations under a residential tenancy agreement, including an amount referred to in section 29(1)(b)(ii);

  • Aerial applicator means aircraft or rotorcraft used exclusively for the purpose of

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Security Policy means the Authority’s Security Policy annexed to Schedule (Security Requirements and Plan) as updated from time to time.

  • Request regarding a list of collateral means a record authenticated by a debtor requesting that the recipient approve or correct a list of what the debtor believes to be the collateral securing an obligation and reasonably identifying the transaction or relationship that is the subject of the request.

  • Vessels shall have the meaning set forth in the recitals.

  • Access Application means an application for Access Rights as described in section 3.7;

  • Ships means, together, Ship A and Ship B and, in the singular, means either of them;