Application Software Security Clause Samples

Application Software Security. Manage the security life cycle of all in-house developed and acquired software in order to prevent, detect, and correct security weaknesses.
Application Software Security. For all software and applications developed in-house or procured from third party developers ensure software is developed and tested secure software development lifecycle practices pursuant to a documented development processes that explicitly addresses security requirements and identifies the standards and tools used in the development process.
Application Software Security. Web application firewalls (WAFs) must be deployed to protect internet-accessible web applications. For vendors that store, process, transmit or handle cardholder data: ● Comply with and provide Hyatt with Payment Card Industry Data Security Standard (PCI DSS) Attestation of Compliance (AOC) on an annual basis. This Schedule provides a summary of the OTA Insight security controls and policies. These controls and policies are aligned with the ISO 27001 standard for information security. OTA Insight is ISO 27001 certified. A copy of this certificate is available upon request. OTA Insight is a cloud-based data intelligence platform for the hospitality industry. We provide hoteliers with a suite of revenue management solutions that empower them to make smarter revenue and distribution decisions. Our products are: ● Rate Insight ● Parity Insight ● Revenue Insight ● Market Insight These products are web applications which communicate over a secure channel (HTTPS, TLSv1.2) - and are subject to a yearly penetration test to assess the effectiveness of the security controls that are in place. The applications do not interact with any guests and are targeted at customer usage only. The applications provide authentication capabilities (e.g. a login portal) to access the web application functionality. The registered accounts will be linked to the subscription to the application. Currently, the applications do not support a single sign-on capability. The web applications require an up-to-date browser. The supported browser versions* are: ○ Chrome 67 ○ Firefox 52 ○ Edge 14 ○ Safari 9 ○ Opera 50 *or any later versions of the aforementioned browsers. *or any later versions of the aforementioned browsers. The OTA Insight products are developed using a Secure SDLC process with several controls in place (e.g. Four-eyed coding principle for any change, automated testing, etc.) Furthermore, the OTA Insight applications are subject to a yearly penetration test to find and remediate any potential security flaws within the application. Employees working for OTA Insight are made aware of their responsibilities in terms of information security. Before employment, they are vetted based on the position and level of system access they will have within the company. The OTA Insight Products (including any customer and app data) are Cloud based and stored within the European Union, using Google Cloud infrastructure for hosting the applications. The OTA Insight applications are monitored 24...

Related to Application Software Security

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/E-Verify.

  • Mobile Application If Red Hat offers products and services through applications available on your wireless or other mobile Device (such as a mobile phone) (the "Mobile Application Services"), these Mobile Application Services are governed by the applicable additional terms governing such Mobile Application Service. Red Hat does not charge for these Mobile Application Services unless otherwise provided in the applicable additional terms. However, your wireless carrier's standard messaging rates and other messaging, data and other rates and charges will apply to certain Mobile Application Services. You should check with your carrier to find out what plans your carrier offers and how much the plans cost. In addition, the use or availability of certain Mobile Application Services may be prohibited or restricted by your wireless carrier, and not all Mobile Application Services may work with all wireless carriers or Devices. Therefore, you should check with your wireless carrier to find out if the Mobile Application Services are available for your wireless Device, and what restrictions, if any, may be applicable to your use of such Mobile Application Services.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Server Software Subject to the terms and conditions of this ▇▇▇▇, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.