Vulnerabilities definition
Examples of Vulnerabilities in a sentence
Grantee agrees to protect and maintain the security of data with protection security measures that include maintaining secure environments that are patched and up to date with all appropriate security updates as designated by a relevant authority (e.g. Microsoft notifications, Common Vulnerabilities and Exposures (CVE) database, etc.) Grantee agrees that PII shall be appropriately destroyed based on the format stored upon the expiration of any applicable retention schedules.
While no software can be guaranteed to be free from Security Vulnerabilities, if a Security Vulnerability is discovered, Motorola will take the steps set forth in Section 6 of this Agreement.
Motorola uses reasonable means in the design and writing of its own Software and the acquisition of third party Software to limit Security Vulnerabilities.
Motorola does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.
Subrecipient agrees to protect and maintain the security of data with protection security measures that include maintaining secure environments that are patched and up to date with all appropriate security updates as designated by a relevant authority (e.g. Microsoft notifications, Common Vulnerabilities and Exposures (CVE) database, etc.) Subrecipient agrees that PII shall be appropriately destroyed based on the format stored upon the expiration of any applicable retention schedules.
These efforts will involve either replacing the media or attempting to correct significant, demonstrable program or documentation errors or Security Vulnerabilities.
The Contractor agrees to protect and maintain the security of data with protection security measures that include maintaining secure environments that are patched and up-to-date with all appropriate security updates as designated by a relevant authority (e.g. Microsoft notifications, Common Vulnerabilities and Exposures (CVE) database, etc.) The Contractor agrees that PII shall be appropriately destroyed based on the format stored upon the expiration of any applicable retention schedules.
Vulnerabilities identified and rated as high risk by Convercent will be remediated within ninety (90) days of discovery.
Vulnerabilities are remediated on a risk basis, with Critical, High and Medium security patches for all components installed as soon as commercially possible.
Vulnerabilities will be reported to the Supplier for remediation.