Security Vulnerabilities definition

Security Vulnerabilities means flaws or weaknesses in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a security breach such that data is compromised, manipulated or stolen or the system damaged.
Security Vulnerabilities means a weakness at the network services, operating system, or application level, or within associated functions of networks, computer systems, or software, or physical vulnerabilities to the premises containing or permitting access to Company Information, that could allow a Security Incident to occur.
Security Vulnerabilities meaning: (i) self-destruction mechanisms; (ii) illicit code; (iii) copy protection schemes that interfere with the use of the Products or Zebra's or an end user's ability to exercise its rights and privileges under this Order; and/or (iv) security vulnerabilities, including any vulnerabilities that allow unauthorized destruction of, access to or control of Product(s) or Zebra product(s), other elements of a system that include Product(s) or Zebra product(s), or any information residing on Product(s), on Zebra product(s), on an end user's system that includes Product(s). Supplier further represents and warrants that it complies with general industry practices regarding the detection and correction of Security Vulnerabilities. Supplier shall promptly notify Zebra if Supplier becomes aware of any actual or potential Security Vulnerability. Supplier shall provide Zebra with a complete and accurate disclosure and description of any third-party software (including open source software) included in any Products along with the corresponding open source software license terms. Supplier represents and warrants it has complied and shall continue to comply with all obligations, terms, and conditions imposed under any applicable open source software license terms and that no Zebra software shall be subject to an obligation to be disclosed or published to the open source community as a result of Supplier's activities. Supplier warrants to Zebra that it shall observe and comply strictly with all Information Protection Law, regulations and requirements which arise in connection with this Order. Supplier shall not use or disclose any information that may identify an individual (e.g., Personal Data) that is processed for or on behalf of Zebra, except to the extent it is required to perform under this Order and in strict compliance with this Order, in particular Section 27 (Personal Data). To the extent Supplier processes Personal Data, Supplier warrants it shall comply with all instructions issued by Zebra relating to Personal Data and implement and maintain appropriate technical and organizational measures and other protections for Personal Data to protect Personal Data against unauthorized or unlawful processing, and against accidental loss or destruction of, or damage to, any such Personal Data. Supplier shall promptly report to Zebra any breaches of security of Personal Data. To the extent that Supplier provides to Zebra, or otherwise allows Zebra to obtain, Personal Da...

Examples of Security Vulnerabilities in a sentence

  • While no software can be guaranteed to be free from Security Vulnerabilities, if a Security Vulnerability is discovered, Motorola will take the steps set forth in Section 6 of this Agreement.

  • Motorola uses reasonable means in the design and writing of its own Software and the acquisition of third party Software to limit Security Vulnerabilities.

  • Motorola does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.

  • These efforts will involve either replacing the media or attempting to correct significant, demonstrable program or documentation errors or Security Vulnerabilities.

  • Motorola does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error- free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.

  • IDEMIA does not warrant that Licensee’s use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee’s particular requirements.

  • Supplier complies with general industry practices regarding the detection and correction of Security Vulnerabilities.

  • NIST SAMATE Includes rules that find issues identified in the NIST SAMATE standard OWASP Top 10 Security Vulnerabilities Includes rules that find issues identified in OWASP’s Top 10 standard PCI Data Security Standard Includes rules that find issues identified in PCI Data Security Standard Security Assessment General test configuration that finds security issues IEC 62304 (Template) A template test configuration for applying the IEC 62304 Medical standard.

  • Motorola does not warrant that Licensee's use of the Software or the Designated Products will be uninterrupted, error-free, completely free of Security Vulnerabilities, or that the Software or the Designated Products will meet Licensee's particular requirements.

  • Seller shall follow the process for investigation and remediation of Security Vulnerabilities as set forth below.


More Definitions of Security Vulnerabilities

Security Vulnerabilities means a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in an security breach such that data is compromised, manipulated or stolen or the system damaged. ▇▇▇▇▇’▇ sole obligation to the City and the City’s exclusive remedy under this warranty is to use reasonable efforts to remedy any material Software defect covered by this warranty. These efforts will involve either replacing the media or attempting to correct significant, demonstrable program or documentation errors or Security Vulnerabilities. If ▇▇▇▇▇ cannot correct the defect within a reasonable time, then at ▇▇▇▇▇’▇ option, ▇▇▇▇▇ will replace the defective Software with functionally-equivalent Software, license to the City substitute Software which will accomplish the same objective, or terminate the license and refund the City’s paid license fee. THE EXPRESS WARRANTIES SET FORTH IN THIS SECTION 8.1 ARE IN LIEU OF, AND ▇▇▇▇▇ DISCLAIMS, ANY AND ALL OTHER WARRANTIES (EXPRESS OR IMPLIED, ORAL OR WRITTEN) WITH RESPECT TO THE SOFTWARE OR DOCUMENTATION INCLUDING, WITHOUT LIMITATION, ANY AND ALL IMPLIED WARRANTIES OF CONDITION, TITLE, NON-INFRINGEMENT, MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE OR USE BY THE CITY (WHETHER OR NOT ▇▇▇▇▇ KNOWS, HAS REASON TO KNOW, HAS BEEN ADVISED, OR IS OTHERWISE AWARE OF ANY SUCH PURPOSE OR USE), WHETHER ARISING BY LAW, BY REASON OF CUSTOM OR USAGE OF TRADE, OR BY COURSE OF DEALING. IN ADDITION, ▇▇▇▇▇ DISCLAIMS ANY WARRANTY TO ANY PERSON OTHER THAN THE CITY WITH RESPECT TO THE SOFTWARE OR DOCUMENTATION. FOR PURPOSES OF CLARITY ONLY, AND WITHOUT LIMITING ANY PROVISION OF THIS AMENDMENT, ▇▇▇▇▇ MAKES NO WARRANTY AND SPECIFICALLY DISCLAIMS ANY WARRANTY THAT THE LICENSED SOFTWARE AND/OR ANY SERVICES PROVIDED HEREUNDER, AND ANY USE THEREOF, SHALL MEET OR COMPLY WITH THE CITY’S REPORTING REQUIREMENTS UNDER ANY APPLICABLE LAW OR REGULATION. ANY THIRD PARTY SOFTWARE OR HARDWARE PROVIDED BY ▇▇▇▇▇ TO OR FOR THE CITY UNDER THIS AMENDMENT IS PROVIDED “AS IS.” ▇▇▇▇▇ MAKES NO WARRANTY UNDER THIS AMENDMENT WITH RESPECT TO THIRD PARTY SOFTWARE OR HARDWARE. MANUFACTURERS OR DISTRIBUTORS OF THIRD PARTY SOFTWARE AND HARDWARE MAY PROVIDE WARRANTIES OF THEIR PRODUCTS THAT WILL EXTEND TO THE CITY, BUT IT IS THE CITY’S RESPONSIBILITY TO ACQUIRE AND IMPLEMENT SUCH WARRANTIES.

Related to Security Vulnerabilities

  • Security Vulnerability means a weakness in software code, a product or a system that leaves it open to the potential for exploitation in the form of unauthorized access or malicious behavior.

  • Vulnerability means a weakness of an asset or mitigation that can be exploited by one or more threats.

  • Security Measures has the meaning given in Section 7.1.1 (Google’s Security Measures).

  • technical and organisational security measures means those measures aimed at protecting personal data against accidental or unlawful destruction or accidental loss, alteration, unauthorised disclosure or access, in particular where the processing involves the transmission of data over a network, and against all other unlawful forms of processing.