Security Vulnerabilities definition
Examples of Security Vulnerabilities in a sentence
While no software can be guaranteed to be free from Security Vulnerabilities, if a Security Vulnerability is discovered, Motorola will take the steps set forth in Section 6 of this Agreement.
Motorola uses reasonable means in the design and writing of its own Software and the acquisition of third party Software to limit Security Vulnerabilities.
Motorola does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.
These efforts will involve either replacing the media or attempting to correct significant, demonstrable program or documentation errors or Security Vulnerabilities.
Motorola does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error- free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.
IDEMIA does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.
Supplier complies with general industry practices regarding the detection and correction of Security Vulnerabilities.
NIST SAMATE Includes rules that find issues identified in the NIST SAMATE standard OWASP Top 10 Security Vulnerabilities Includes rules that find issues identified in OWASP’s Top 10 standard PCI Data Security Standard Includes rules that find issues identified in PCI Data Security Standard Security Assessment General test configuration that finds security issues IEC 62304 (Template) A template test configuration for applying the IEC 62304 Medical standard.
Motorola does not warrant that Licensee's use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee's particular requirements.
Seller shall follow the process for investigation and remediation of Security Vulnerabilities as set forth below.