Malicious Code/Virus Protection Warranty Sample Clauses

Malicious Code/Virus Protection Warranty. Contractor hereby warrants and represents that, any time the Licensed Software, Hosted Services, or any Maintenance Release(s) are delivered to the JBE, whether delivered via electronic media or the internet, no portion of the Licensed Software, Hosted Services, or Maintenance Release(s), or the media upon which it is stored or delivered, will have any type of software routine or other element which is designed to facilitate or is capable of facilitating: (a) unauthorized access to or intrusion upon; (b) disabling or erasure of; or (c) unauthorized interference with, the operation of any hardware, software, data or peripheral equipment of or utilized by the JBE, or any contamination which might impact the JBE’s network or data.
AutoNDA by SimpleDocs

Related to Malicious Code/Virus Protection Warranty

  • Malicious Code You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • E1 Data Protection Act E1.1 For the purposes of this Clause E1, the terms “Data Controller”, “Data Processor”, “Data Subject”, “Personal Data”, “Process” and “Processing shall have the meaning prescribed under the DPA.

  • Xxxxx Disaster Protection In accordance with the requirements of the Flood Disaster Protection Act of 1973 (42 U.S.C. 4001), the Subrecipient shall assure that for activities located in an area identified by the Federal Emergency Management Agency (FEMA) as having special flood hazards, flood insurance under the National Flood Insurance Program is obtained and maintained as a condition of financial assistance for acquisition or construction purposes (including rehabilitation).

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Trafficking Victims Protection Act of 2000 Subrecipient hereby acknowledges and agrees that it must comply with the requirements of the government-wide award term which implements Section 106(g) of the Trafficking Victims Protection Act (TVPA) of 2000, as amended (22 U.S.C. 7104). The award term is located at 2 C.F.R. Part 175.15, the full text of which is incorporated here by reference.

  • Access Codes Tenant shall provide Landlord/Broker with all access codes to all entrance gates and security systems located on the Property.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Illicit Code Except for the functions and features expressly disclosed in Supplier's documentation made available to Accenture, Deliverables will be free of any programs, subroutines, code, instructions, data or functions, (including but not limited to viruses, malware, worms, date bombs, time bombs, shut-down devices, keys, authorization codes, back doors or passwords allowing Supplier access) that may result in any inoperability, damage, interruption, or interference of the Deliverables or any equipment on which the Deliverables reside or with which the Deliverables are capable of communicating.

Time is Money Join Law Insider Premium to draft better contracts faster.