Common use of by the Supplier Clause in Contracts

by the Supplier. where the Malicious Software originates from the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body when provided to the Supplier; and

Appears in 51 contracts

Samples: Framework Agreement, Framework Agreement, Framework Agreement

AutoNDA by SimpleDocs

by the Supplier. where the Malicious Software originates from the Customer Data customer data (whilst the Customer Data customer data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body when provided to the Supplier; and

Appears in 9 contracts

Samples: Framework Agreement, Framework Agreement, Framework Agreement

by the Supplier. where the Malicious Software originates from the Supplier Software or the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body Customer when provided to the Supplier; and

Appears in 5 contracts

Samples: Framework Agreement, Framework Agreement, Framework Agreement

by the Supplier. where the Malicious Software originates from rom the Supplier Software or the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body Customer when provided to the Supplier; and

Appears in 1 contract

Samples: in-tendhost.co.uk

AutoNDA by SimpleDocs

by the Supplier. where the Malicious Software originates from the Customer Supplier software or the Buyer Data (whilst while the Customer Buyer Data was under the control of the Supplier) , unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body Buyer when provided to the Supplier; and

Appears in 1 contract

Samples: Outcomes and Specialist Framework Agreement

by the Supplier. where the Malicious Software originates from or via the Customer Supplier (or any of its Sub- Contractors) or the Contracting Body Data (whilst the Customer Contracting Body Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body when provided to the Supplier; and

Appears in 1 contract

Samples: data.gov.uk

Time is Money Join Law Insider Premium to draft better contracts faster.