Security Vulnerabilities definition

Security Vulnerabilities means flaws or weaknesses in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.
Security Vulnerabilities means a weakness at the network services, operating system, or application level, or within associated functions of networks, computer systems, or software, or physical vulnerabilities to the premises containing or permitting access to Company Information, that could allow a Security Incident to occur.
Security Vulnerabilities means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in an security breach such that data is compromised, manipulated or stolen or the system damaged. Xxxxx’x sole obligation to the City and the City’s exclusive remedy under this warranty is to use reasonable efforts to remedy any material Software defect covered by this warranty. These efforts will involve either replacing the media or attempting to correct significant, demonstrable program or documentation errors or Security Vulnerabilities. If Xxxxx cannot correct the defect within a reasonable time, then at Xxxxx’x option, Xxxxx will replace the defective Software with functionally-equivalent Software, license to the City substitute Software which will accomplish the same objective, or terminate the license and refund the City’s paid license fee. THE EXPRESS WARRANTIES SET FORTH IN THIS SECTION 8.1 ARE IN LIEU OF, AND XXXXX DISCLAIMS, ANY AND ALL OTHER WARRANTIES (EXPRESS OR IMPLIED, ORAL OR WRITTEN) WITH RESPECT TO THE SOFTWARE OR DOCUMENTATION INCLUDING, WITHOUT LIMITATION, ANY AND ALL IMPLIED WARRANTIES OF CONDITION, TITLE, NON-INFRINGEMENT, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE OR USE BY THE CITY (WHETHER OR NOT XXXXX KNOWS, HAS REASON TO KNOW, HAS BEEN ADVISED, OR IS OTHERWISE AWARE OF ANY SUCH PURPOSE OR USE), WHETHER ARISING BY LAW, BY REASON OF CUSTOM OR USAGE OF TRADE, OR BY COURSE OF DEALING. IN ADDITION, XXXXX DISCLAIMS ANY WARRANTY TO ANY PERSON OTHER THAN THE CITY WITH RESPECT TO THE SOFTWARE OR DOCUMENTATION. FOR PURPOSES OF CLARITY ONLY, AND WITHOUT LIMITING ANY PROVISION OF THIS AMENDMENT, XXXXX MAKES NO WARRANTY AND SPECIFICALLY DISCLAIMS ANY WARRANTY THAT THE LICENSED SOFTWARE AND/OR ANY SERVICES PROVIDED HEREUNDER, AND ANY USE THEREOF, SHALL MEET OR COMPLY WITH THE CITY’S REPORTING REQUIREMENTS UNDER ANY APPLICABLE LAW OR REGULATION. ANY THIRD PARTY SOFTWARE OR HARDWARE PROVIDED BY XXXXX TO OR FOR THE CITY UNDER THIS AMENDMENT IS PROVIDED “AS IS.” XXXXX MAKES NO WARRANTY UNDER THIS AMENDMENT WITH RESPECT TO THIRD PARTY SOFTWARE OR HARDWARE. MANUFACTURERS OR DISTRIBUTORS OF THIRD PARTY SOFTWARE AND HARDWARE MAY PROVIDE WARRANTIES OF THEIR PRODUCTS THAT WILL EXTEND TO THE CITY, BUT IT IS THE CITY’S RESPONSIBILITY TO ACQUIRE AND IMPLEMENT SUCH WARRANTIES.

Examples of Security Vulnerabilities in a sentence

  • Motorola uses reasonable means in the design and writing of its own Software and the acquisition of third party Software to limit Security Vulnerabilities.

  • While no software can be guaranteed to be free from Security Vulnerabilities, if a Security Vulnerability is discovered, Motorola will take the steps set forth in Section 6 of this Agreement.

  • Motorola does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.

  • These efforts will involve either replacing the media or attempting to correct significant, demonstrable program or documentation errors or Security Vulnerabilities.

  • Motorola does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error- free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.

  • Items listed under Section A of the South Dakota Security Vulnerabilities document may not be present in the software.

  • Invited Talk — Automated Detection and Mitigation of Inter-Application Security Vulnerabilities in Android.

  • However, as reflected in our research questions, we maintain that our set of desirable characteristics of off-screen target cuing hold in most cases: (1) make the user more successful at target acquisition while inducing low cognitive load at the “optimal” speed, (2) not be impacted by the visual complexity of a scene, and (3) provide a good subjective user experience.

  • A Tool for Automated Detection of Inter-Application Security Vulnerabilities in Android.

  • IDEMIA does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.


More Definitions of Security Vulnerabilities

Security Vulnerabilities meaning: (i) self-destruction mechanisms; (ii) illicit code; (iii) copy protection schemes that interfere with the use of the Products or Zebra's or an end user's ability to exercise its rights and privileges under this Order; and/or (iv) security vulnerabilities, including any vulnerabilities that allow unauthorized destruction of, access to or control of Product(s) or Zebra product(s), other elements of a system that include Product(s) or Zebra product(s), or any information residing on Product(s), on Zebra product(s), on an end user's system that includes Product(s). Supplier further represents and warrants that it complies with general industry practices regarding the detection and correction of Security Vulnerabilities. Supplier shall promptly notify Zebra if Supplier becomes aware of any actual or potential Security Vulnerability. Supplier shall provide Zebra with a complete and accurate disclosure and description of any third-party software (including open source software) included in any Products along with the corresponding open source software license terms. Supplier represents and warrants it has complied and shall continue to comply with all obligations, terms, and conditions imposed under any applicable open source software license terms and that no Zebra software shall be subject to an obligation to be disclosed or published to the open source community as a result of Supplier's activities. Supplier warrants to Zebra that it shall observe and comply strictly with all Information Protection Law, regulations and requirements which arise in connection with this Order. Supplier shall not use or disclose any information that may identify an individual (e.g., Personal Data) that is processed for or on behalf of Zebra, except to the extent it is required to perform under this Order and in strict compliance with this Order, in particular Section 27 (Personal Data). To the extent Supplier processes Personal Data, Supplier warrants it shall comply with all instructions issued by Zebra relating to Personal Data and implement and maintain appropriate technical and organizational measures and other protections for Personal Data to protect Personal Data against unauthorized or unlawful processing, and against accidental loss or destruction of, or damage to, any such Personal Data. Supplier shall promptly report to Zebra any breaches of security of Personal Data. To the extent that Supplier provides to Zebra, or otherwise allows Zebra to obtain, Personal Da...

Related to Security Vulnerabilities

  • Security Vulnerability means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.

  • Vulnerability means a weakness of an asset or mitigation that can be exploited by one or more threats.

  • Vulnerable means a condition in which an adult is unable to protect himself or herself from abuse, neglect, or exploitation because of a mental or physical impairment or because of advanced age.

  • Security Measures has the meaning given in Section 7.1.1 (Google’s Security Measures).

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Vulnerable adult means any person 18 years of age or older who: (1) is a resident or inpatient of a facility; (2) receives services required to be licensed under Minn. Stat. Ch. 245A, except as excluded under Minn. Stat. § 626.5572, Subd. 21(a)(2); (3) receives services from a licensed home care provider or person or organization that offers, provides, or arranges for personal care assistance services under the medical assistance program; or (4) regardless of residence or type of service received possesses a physical or mental infirmity or other physical, mental, or emotional dysfunction that impairs the individual’s ability to adequately provide the person’s own care without assistance or supervision and, because of the dysfunction or infirmity and need for care or services, has an impaired ability to protect the individual’s self from maltreatment.

  • Visibility impairment means any humanly perceptible change in visual range, contrast, or coloration from that which would have existed under natural visibility conditions.

  • Severity 3 means the unavailability of an individual resource and automated redundancy is fulfilling demand.

  • Baseline Personnel Security Standard means the pre-employment controls for all civil servants, members of the Armed Forces, temporary staff and government contractors generally.

  • Extreme Vetting means data mining, threat modeling, predictive risk analysis, or other similar services." Extreme Vetting does not include:

  • Measures means any measures proposed by the Supplier or any Sub-contractor within the meaning of regulation 13(2)(d) of TUPE;

  • technical and organizational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.

  • Visual impairment including blindness means an impairment in vision that, even with correction, adversely affects a student's educational performance. The term includes both partial sight and blindness.

  • Severity 2 means the unavailability of an individual resource and redundant capability is not available or exhausted.

  • Severity means the dollar amount of losses on claims.

  • Technological safeguards means the technology and the policy and procedures for use of the technology to protect and control access to personal information.

  • Case characteristics means demographic or other objective characteristics of a small employer that are considered by the small employer carrier in the determination of premium rates for the small employer, provided that claim experience, health status and duration of coverage shall not be case characteristics for the purposes of the Small Employer Health Insurance Reform Act. A small employer carrier shall not use case characteristics, other than age, gender, industry, geographic area, family composition and group size, without prior approval of the Insurance Commissioner;

  • COVID-19 Measures means any quarantine, “shelter in place,” “stay at home,” workforce reduction, social distancing, shut down, closure, sequester or any other Law, directive, guidelines or recommendations by any Governmental Authority (including the Centers for Disease Control and the World Health Organization) in each case in connection with, related to or in response to COVID-19, including the Coronavirus Aid, Relief, and Economic Security Act (CARES) or any changes thereto.

  • COVID-19 symptoms means fever of 100.4 degrees Fahrenheit or higher, chills, cough, shortness of breath or difficulty breathing, fatigue, muscle or body aches, headache, new loss of taste or smell, sore throat, congestion or runny nose, nausea or vomiting, or diarrhea, unless a licensed health care professional determines the person’s symptoms were caused by a known condition other than COVID-19.

  • Security Standards means the final rule implementing HIPAA’s Security Standards for the Protection of Electronic PHI, as amended.

  • Severity 1 means the unavailability of multiple service resources and redundant capability is not available or has been exhausted.

  • Infection means the entry and development or multiplication of an infectious agent in the body of humans and animals that may constitute a public health risk;

  • Functional impairment means both of the following:

  • Latency means the additional time, beyond that of the basic perceivable response time of the aircraft due to the response time of the FSTD.

  • Severity Level means the actual impact of a Defect on a user’s operational environment as further described in the table below.

  • Outcomes means the Health and Wellbeing Outcomes prescribed by the Scottish Ministers in Regulations under section 5(1) of the Act;