by the Supplier. where the Malicious Software originates from the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body when provided to the Supplier; and
Appears in 51 contracts
Samples: Framework Agreement, Framework Agreement, Framework Agreement
by the Supplier. where the Malicious Software originates from the Customer Data customer data (whilst the Customer Data customer data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body when provided to the Supplier; and
Appears in 9 contracts
Samples: Framework Agreement, Framework Agreement, Framework Agreement
by the Supplier. where the Malicious Software originates from the Supplier Software or the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body Customer when provided to the Supplier; and
Appears in 5 contracts
Samples: Framework Agreement, Framework Agreement, Framework Agreement
by the Supplier. where the Malicious Software originates from rom the Supplier Software or the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body Customer when provided to the Supplier; and
Appears in 1 contract
Samples: in-tendhost.co.uk
by the Supplier. where the Malicious Software originates from the Customer Supplier software or the Buyer Data (whilst while the Customer Buyer Data was under the control of the Supplier) , unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body Buyer when provided to the Supplier; and
Appears in 1 contract
by the Supplier. where the Malicious Software originates from or via the Customer Supplier (or any of its Sub- Contractors) or the Contracting Body Data (whilst the Customer Contracting Body Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body when provided to the Supplier; and
Appears in 1 contract
Samples: data.gov.uk