Common use of System and Software Protection Clause in Contracts

System and Software Protection. (i) All system and applications must utilize secure authentication and authorization mechanisms (ii) All KnowBe4-developed applications must be designed and implemented using secure coding standards and design principles (e.g., OWASP) (iii) Operating systems must be hardened appropriately according to industry standard practices (iv) Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible

Appears in 3 contracts

Sources: Master Subscription Agreement, Master Subscription Agreement, Services Agreement

System and Software Protection. (i) All system and applications must utilize secure authentication and authorization mechanisms (ii) i. All KnowBe4-developed applications must be designed and implemented using secure coding standards and design principles (e.g., OWASP) (iii) ii. Operating systems must be hardened appropriately according to industry standard practices (iv) iii. Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible

Appears in 2 contracts

Sources: Terms of Service, Terms of Service

System and Software Protection. (i) i. All system and applications must utilize secure authentication and authorization mechanisms (ii) . All KnowBe4-developed applications must be designed and implemented using secure coding standards and design principles (e.g., OWASP) (iii) . Operating systems must be hardened appropriately according to industry standard practices (iv) . Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible

Appears in 1 contract

Sources: Terms of Service

System and Software Protection. (i) All system and applications must utilize secure authentication and authorization mechanisms (ii) All KnowBe4-developed applications must be designed and implemented using secure coding standards and design principles (e.g., e.g. OWASP) (iii) Operating systems must be hardened appropriately according to industry standard practices. (iv) Systems must be inspected for known vulnerabilities and all identified known vulnerabilities must be patched as soon as reasonably possible.

Appears in 1 contract

Sources: Terms of Service