Malicious Attacks Sample Clauses

Malicious Attacks. If a third party not associated with Servers Australia initiates a "Denial of Service" or other form of disabling attack against your hosting or major portions of the Servers Australia core network, Servers Australia will do everything in its power to stop the attack, but cannot guarantee a resolution time.
AutoNDA by SimpleDocs
Malicious Attacks. If a third party not associated with Nine Virtual Technologies, Inc. initiates a “Denial of Service” or other form of attack designed to disable our network availability/server availability and/or the availability of your vOffice desktop, we will do everything in our power to stop the attack, but cannot guarantee a resolution time. Any downtime associated will not be eligible for a Service Credit. Service Definitions The following definitions apply to our 99.9% Uptime Guarantee:  Unavailability – the total unavailability for the relevant Nine Virtual Technologies vOffice Service. For the avoidance of doubt, customer outages and Planned Maintenance are excluded from this definition.  Customer Outages/Unavailability – any outage caused by any of the Customer’s Hardware, Network Equipment, or any change, modification, or action taken by the Customer’s personnel.
Malicious Attacks. If a third party not associated with Cloud Inspire and ahome cloud initiate a «Denial of Service» or other form of disabling attack against a customer’s managed server or major portions of our network, we will do everything in our power to stop the attack, but cannot guarantee a resolution time. Cumulative Downtime per City/Location per Month Silver tier 3 Best Effort* tier 5 Hardware replacement When does the SLA starts ? 5%/hour 12 hours N/A N/A Network failure When does the SLA starts ? 5%/hour 4 hours N/A N/A Extended scheduled mainte- xxxxx When does the SLA starts ? 5%/hour 2 hours N/A N/A Act of God/Regional Instability 0 % 0 % Region Johannesburg Lagos % definition: The «%» for each Tier is the refund on the base monthly fee for a single server, up to 50% of your monthly bill as per your paid plan. Time definition: After Cloud Inspire has confirmed a hardware failure, Cloud Inspire has this *time* to proceed with the replacement. A reboot attempt has to be requested, and performed before concluding it’s a hardware issue. It starts after the *time* of a confirmed network wide failure. The *time* counts past the initial estimated and announced downtime, or for unscheduled and unan- nounced maintenance ie: if Cloud Inspire planned a 2 hours maintenance in Tier 3, Cloud Inspire is allowed to take an additional hour without having to issue compensation. *Best Effort/Tier 5 No SLA applies in these locations. This is often due to a location being one of our emerging markets, or loca- tions in which network, hardware and resolution standards are not up to par with the rest of the world. It is important to note that this SLA does not reflect, or affect the ticket and phone support hours or E.T.A.’s, and is subject to change at Cloud Inspire’s sole discretion.
Malicious Attacks if a third party not associated with Licensor initiates a "Denial of Service" or other form of disabling attack against our network or services, Licensor, will take all reasonable commercial steps to stop the attack, but cannot guarantee a resolution time. SLA Credits In the event that Licensor does not meet this SLA, Licensee will become eligible to request compensation for downtime. If Licensor is directly responsible for causing the downtime, Licensee will receive a credit for 2 times the actual amount of downtime. This means that if your server is unreachable for 1 hour outside of the regularly scheduled maintenance times and beyond the 1% allowed, the Licensee will receive 2 hours of credit. If Licensor is not directly responsible for causing the downtime, Licensee will not receive a credit for downtime. All requests for compensation for such downtime credits must be received within five (5) business days of the incident in question. The amount of compensation shall not exceed the cost of one month’s subscription. Appendix 3
Malicious Attacks if a third party not associated with SysAid initiates a disabling attack against Our Xxxxxx, SysAid will do everything in its power to stop the attack, but cannot guarantee a resolution time.
Malicious Attacks if a third party not associated with Xxxx initiates a disabling attack against Our Servers, Nubo will do everything in its power to stop the attack, but cannot guarantee a resolution time.

Related to Malicious Attacks

  • Malicious Code You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.

  • Vandalism Vandalism will result in cancellation of privileges. Vandalism is defined as any malicious attempt to harm or destroy data of another user, Internet, or any of the above listed agencies or other networks that are connected to any of the Internet backbones. This includes, but not limited to, the uploading or creation of computer viruses.

  • Violence (a) The parties agree that violence shall be defined as any incident in which an employee is abused, threatened or assaulted while performing his or her work. The parties agree it includes the application of force, threats with or without weapons and severe verbal abuse. The parties agree that such incidents will not be condoned. Any employee who believes he/she has been subjected to such incident shall report this to a supervisor who will make every reasonable effort to rectify the situation. For purposes of sub- article (a) only, employees as referred to herein shall mean all employees of the Employer.

  • Windstorm or hail This peril does not include loss to the property contained in a building caused by rain, snow, sleet, sand or dust unless the direct force of wind or hail damages the building causing an opening in a roof or wall and the rain, snow, sleet, sand or dust enters through this opening. This peril includes loss to watercraft and their trailers, furnishings, equipment, and outboard engines or motors, only while inside a fully enclosed building.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Intercept Devices 26.1.1.1 Local and federal law enforcement agencies periodically request information or assistance from local telephone service providers. When either Party receives a request associated with an End User of the other Party, it shall refer such request to the Party that serves such End User, unless the request directs the receiving Party to attach a pen register, trap-and-trace or form of intercept on the Party's facilities, in which case that Party shall comply with any valid request.

Time is Money Join Law Insider Premium to draft better contracts faster.