Anti-malware Sample Clauses

Anti-malware. Smartsheet will deploy and use anti-malware software and will keep the anti-malware software up to date. Smartsheet will use such software to mitigate threats from all viruses, spyware, and other malicious code that are or should reasonably be detected.
AutoNDA by SimpleDocs
Anti-malware. Dispatch will deploy and use anti-malware software and will keep the anti- malware software up to date. Dispatch will use such software to mitigate threats from all viruses, spyware, and other malicious code that are or should reasonably be detected.
Anti-malware. Servers and workstations involved with accessing, processing, transmitting or storing the Data Set are protected with up to date anti-malware software. DATA RECIPIENT shall have a process in place for issuing regular updates to anti-malware software and conducting regular scans of the environments containing the Data Set.
Anti-malware. Vendor will deploy and use anti-malware software and will keep the anti-malware software up to date. Vendor will use such software to mitigate threats from all viruses, spyware, and other malicious code that are or should reasonably be detected.
Anti-malware. Rivian will at all times use anti-malware software and will keep the anti- malware software up to date. Rivian will mitigate threats from all viruses, spyware, and other malicious code that are or should reasonably have been detected.

Related to Anti-malware

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Weapons (1) If the Contractor requests that its personnel performing in the USCENTCOM AOR be authorized to carry weapons for individual self-defense, the request shall be made through the Contracting Officer to the Combatant Commander, in accordance with DoD Instruction 3020.41. The Combatant Commander will determine whether to authorize in-theater contractor personnel to carry weapons and what weapons and ammunition will be allowed.

  • Use of School Equipment The association shall have the right to use school facilities and equipment, including typewriters, computers, telecommunications resources, copy machines, other duplicating equipment, calculating machines and all types of audio/visual equipment at reasonable times, when such equipment is not otherwise in use. The Association shall pay for the reasonable cost of all materials, supplies and equipment incident to such use.

  • Technical Safeguards 1. USAC and the Department will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

Time is Money Join Law Insider Premium to draft better contracts faster.