Vulnerability Management. Incident reporting and response policies and procedures are in place to guide ▇▇▇▇▇▇ personnel in reporting the information technology incident. Vulnerabilities meeting defined risk criteria trigger alerts and are prioritized for remediation based on their potential impact to the Services.
Appears in 6 contracts
Sources: Data Processing Agreement, Data Processing Agreement, Data Processing Agreement