Common use of Systems and Software Upgrades Clause in Contracts

Systems and Software Upgrades. Requests for upgrades to systems and software are considered Standard Service Requests unless otherwise specified and agreed upon. They are initiated as Standard Service Requests with an accompanying Change Management Form (Appendix B). ITS will regularly perform system upgrades to prevent system security vulnerabilities. If an upgrade has not been applied and is determined to create a potential security vulnerability, either the system will be upgraded or both parties will agree upon the acceptable business risk to the University and this decision will be documented in the ITS Risk Assessment for auditors.

Appears in 1 contract

Sources: Service Level Agreement

Systems and Software Upgrades. Requests for upgrades to systems and software are considered Standard Service Requests unless otherwise specified and agreed upon. They are initiated as Standard Service Requests with an accompanying Change Management Form (Appendix B)Request Form. ITS will regularly perform system upgrades to prevent system security vulnerabilities. If an upgrade has not been applied and is determined to create a potential security vulnerability, either the system will be upgraded or both parties will agree upon the acceptable business risk to the University and this decision will be documented in the ITS Risk Assessment Network Audit Known Vulnerabilities Report for auditors.

Appears in 1 contract

Sources: Service Level Agreement

Systems and Software Upgrades. Requests for upgrades to systems and software are considered Standard Service Requests unless otherwise specified and agreed upon. They are initiated as Standard Service Requests with an accompanying Change Management Form (Appendix B). ITS will regularly perform system upgrades to prevent system security vulnerabilities. If an upgrade has not been applied and is determined to create a potential security vulnerability, either the system will be upgraded or both parties will agree upon the acceptable business risk to the University and this decision will be documented in the ITS Risk Assessment Network Audit Known Vulnerabilities Report for auditors.

Appears in 1 contract

Sources: Service Level Agreement