{"component": "clause", "props": {"groups": [{"samples": [{"hash": "f90J1Q4NqDT", "uri": "/contracts/f90J1Q4NqDT#malware", "label": "Master Services Agreement", "score": 36.2146377563, "published": true}, {"hash": "d1P9nX9pAaC", "uri": "/contracts/d1P9nX9pAaC#malware", "label": "Master Services Agreement", "score": 36.2128944397, "published": true}, {"hash": "gLeuZVwbdEc", "uri": "/contracts/gLeuZVwbdEc#malware", "label": "Master Services Agreement", "score": 36.1803283691, "published": true}], "snippet": "An anti-malware solution must be in place, and updated with valid update subscription. Provider is not responsible for any harm that may be caused by Client\u2019s access to third-party application programming interfaces or the execution or transmission of malicious code or similar occurrences, including without limitation, disabling devices, drop dead devices, time bombs, trap doors, Trojan horses, worms, viruses, and similar mechanisms. Any costs or fees to rebuild or service machines are provided and sold separately by Provider.", "size": 22, "snippet_links": [{"key": "in-place", "type": "clause", "offset": [33, 41]}, {"key": "responsible-for", "type": "clause", "offset": [103, 118]}, {"key": "caused-by-client", "type": "clause", "offset": [140, 156]}, {"key": "access-to", "type": "definition", "offset": [159, 168]}, {"key": "application-programming-interfaces", "type": "definition", "offset": [181, 215]}, {"key": "the-execution", "type": "clause", "offset": [219, 232]}, {"key": "malicious-code", "type": "clause", "offset": [252, 266]}, {"key": "including-without-limitation", "type": "clause", "offset": [291, 319]}, {"key": "disabling-devices", "type": "clause", "offset": [321, 338]}, {"key": "by-provider", "type": "clause", "offset": [520, 531]}], "hash": "c458f74c18c8e046fd4a16c5c73aa0a4", "id": 2}, {"samples": [{"hash": "j4iVMtTBI1N", "uri": "/contracts/j4iVMtTBI1N#malware", "label": "Master Services Agreement", "score": 36.0559921265, "published": true}, {"hash": "beWeytRlAMp", "uri": "/contracts/beWeytRlAMp#malware", "label": "Master Services Agreement", "score": 35.8646888733, "published": true}, {"hash": "bSUTwgnq8FE", "uri": "/contracts/bSUTwgnq8FE#malware", "label": "Master Services Agreement", "score": 35.7367362976, "published": true}], "snippet": "An anti-malware solution must be in place, and updated with valid update subscription. Provider is not responsible for any harm that may be caused by Client\u2019s access to third-party application programming interfaces or the execution or transmission of malicious code or similar occurrences, including without limitation, disabling devices, drop dead devices, time bombs, trap doors, Trojan horses, worms, viruses, and similar mechanisms. Any costs or fees to rebuild or service machines are provided and sold separately by Provider. Hardware and Software Configurations All Hardware and Software Configurations implemented by Provider shall belong to Provider, and shall constitute Provider\u2019s Confidential Information. Client Data Security & Privacy In addition to its other confidentiality obligations under an applicable Service Attachment, Provider shall not use, edit, or disclose to any party other than Client any Client Data (defined below), except as otherwise requested by Client, or required by court order or applicable law. For purposes of this provision, all data stored on the virtualized machines assigned to Client, including locally stored personal data of individual employees, will be considered Client Data by Provider. As between Provider and Client, all Client Data is owned exclusively by Client. Client Data constitutes Confidential Information subject to the Terms. Provider may access Client's User accounts, including Client Data, solely to respond to service or technical problems or otherwise at Client's request. Security and Regulatory Recommendations Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding regulatory compliance, safety, and security related to Client\u2019s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client\u2019s refusal to implement the recommended protocols. Password-Management Services If Provider provides password management services to Client, Client shall be responsible and liable for any unauthorized use of passwords. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY, OR DAMAGE TO CLIENT OR ANY THEFT OF PASSWORDS CAUSED BY SUCH USE OF THE PASSWORD SERVICES BY CLIENT. PROVIDER REPRESENTATIONS AND WARRANTY Internal Network Security Compromise Policy Provider monitors the availability and performance of its internal firewall and network security. This process involves monitoring for intrusion attempts and potential security breaches. In order to minimize a possible compromise of security, all services and applications exposed to the Internet on Provider's servers are updated with all commonly available security hotfixes and best practices. As appropriate, Provider proactively evaluates, investigates, and reports security-related incidents to the appropriate authorities. Provider also monitors and proactively manages the anti-virus protection of its servers and applications using industry-recognized anti- virus software systems. Service Warranty We warrant that the Services will be performed in a professional and workmanlike manner and as described in an applicable Service Attachment or Schedule of Services. All Services will be deemed to be accepted unless Client notifies Provider in writing within ten (10) working days after performance that the Services did not conform to this warranty. Provider promptly will correct any non-conformities and will notify Client in writing that the non-conformities have been corrected. DISCLAIMER OF WARRANTY PROVIDER DOES NOT WARRANT THAT THE SERVICES WILL BE PERFORMED ERROR- FREE OR UNINTERRUPTED, THAT PROVIDER WILL CORRECT ALL SERVICES ERRORS, OR THAT THE SERVICES WILL MEET CLIENT\u2019S REQUIREMENTS OR EXPECTATIONS, OR THAT THE SERVICE WILL BE COMPLETELY SECURE. THERE ARE RISKS INHERENT IN INTERNET CONNECTIVITY THAT COULD RESULT IN THE TEMPORARY LOSS OF SERVICE AVAILABILITY. PROVIDER IS NOT RESPONSIBLE FOR ANY ISSUES RELATED TO THE PERFORMANCE, OPERATION, OR SECURITY OF THE SERVICES THAT ARISE FROM CLIENT\u2019S CONTENT OR THIRD-PARTY CONTENT, OR SERVICES PROVIDED BY THIRD PARTIES. PROVIDER SHALL HAVE NO OBLIGATION WITH RESPECT TO A WARRANTY CLAIM (i) IF NOTIFIED OF SUCH A CLAIM AFTER THE WARRANTY PERIOD OR (ii) IF THE CLAIM IS THE RESULT OF THIRD-PARTY HARDWARE OR SOFTWARE FAILURES, OR THE ACTIONS OF CLIENT OR A THIRD PARTY. FOR ANY BREACH OF THE SERVICES WARRANTY, CLIENT\u2019S EXCLUSIVE REMEDY AND PROVIDER\u2019S ENTIRE LIABILITY SHALL BE THE CORRECTION OF THE DEFICIENT SERVICES THAT CAUSED THE BREACH OF WARRANTY, OR, IF PROVIDER CANNOT SUBSTANTIALLY CORRECT THE DEFICIENCY IN A COMMERCIALLY REASONABLE MANNER, CLIENT MAY END THE DEFICIENT SERVICES AND PROVIDER WILL REFUND TO CLIENT THE FEES FOR THE TERMINATED SERVICES THAT CLIENT PRE-PAID TO PROVIDER FOR THE PERIOD FOLLOWING THE EFFECTIVE DATE OF TERMINATION. TO THE EXTENT NOT PROHIBITED BY LAW, CLIENT ACKNOWLEDGES THESE WARRANTIES ARE EXCLUSIVE AND THERE ARE NO OTHER EXPRESS OR IMPLIED WARRANTIES OR CONDITIONS BY THE PROVIDER OR ANY THIRD-PARTY VENDORS INCLUDING FOR SOFTWARE, HARDWARE, SYSTEMS, NETWORKS OR ENVIRONMENTS, OR FOR MERCHANTABILITY, SATISFACTORY QUALITY, AND FITNESS FOR A PARTICULAR PURPOSE, AND THAT THOSE THIRD-PARTY VENDORS DISCLAIM ANY AND ALL LIABILITY, WHETHER DIRECT, INDIRECT, OR CONSEQUENTIAL, ARISING FROM THE SERVICES. PROVIDER MAY LINK TO OR OFFER THIRD-PARTY SERVICES FOR RESALE. ANY PURCHASE, ENABLING, OR ENGAGEMENT OF THIRD-PARTY SERVICES, INCLUDING BUT NOT LIMITED TO IMPLEMENTATION, CUSTOMIZATION, CONSULTING SERVICES, E-MAIL, WEB HOSTING, SERVER HOSTING, PHONE SERVICE, AND ANY EXCHANGE OF DATA BETWEEN CLIENT AND ANY THIRD-PARTY SERVICE, IS SOLELY BETWEEN CLIENT AND THE APPLICABLE THIRD-PARTY SERVICE PROVIDER AND IS SUBJECT TO THE TERMS AND CONDITIONS OF SUCH THIRD-PARTY PROVIDER. PROVIDER DOES NOT WARRANT THIRD-PARTY SERVICES AND IS NOT RESPONSIBLE OR LIABLE FOR SUCH SERVICES OR ANY LOSSES OR ISSUES THAT RESULT FROM CLIENT\u2019S USE OF SUCH SERVICES. IF CLIENT PURCHASES, ENABLES, OR ENGAGES ANY THIRD-PARTY SERVICE FOR USE IN CONNECTION WITH THE SERVICES, CLIENT ACKNOWLEDGES THAT PROVIDER MAY ALLOW THIRD-PARTY SERVICES PROVIDERS TO ACCESS CLIENT DATA USED IN CONNECTION WITH THE SERVICES AS REQUIRED FOR THE INTEROPERATION OF SUCH THIRD-PARTY SERVICES WITH THE SERVICES. CLIENT REPRESENTS AND WARRANTS THAT CLIENT\u2019S USE OF ANY THIRD-PARTY SERVICE SIGNIFIES CLIENT\u2019S INDEPENDENT CONSENT TO THE ACCESS AND USE OF CLIENT\u2019S DATA BY THE THIRD-PARTY SERVICE PROVIDER, AND THAT SUCH CONSENT, USE, AND ACCESS IS OUTSIDE OF PROVIDERS\u2019S CONTROL. PROVIDER WILL NOT BE RESPONSIBLE OR LIABLE FOR ANY DISCLOSURE, MODIFICATION, OR DELETION OF DATA RESULTING FROM ANY SUCH ACCESS BY THIRD-PARTY SERVICE PROVIDERS. COMPLIANCE WITH LAWS Provider shall comply with all laws applicable to Provider in its role as a Managed IT Provider. For the avoidance of doubt, unless otherwise provided in an Order, Provider is not responsible for complying with the laws applicable to Client or Client\u2019s industry. Client shall comply with all laws applicable to Client or in Client\u2019s industry. Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding legal requirements and regulatory compliance protocols related to Client\u2019s network and practices. If Client fails to adopt or implement the recommended legal requirements or regulatory compliance protocols, Client is responsible for any and all damages related to legal and regulatory compliance. Even if Client does take Provider\u2019s advice regarding legal requirements and regulatory compliance protocols, Provider does not take responsibility for any legal requirements and regulatory compliance protocols or audits. NO HIRING Neither party shall solicit, recruit, hire, or otherwise pay any employee or contractor of the other party during the Term of this Agreement and for twelve (12) months following termination of this Agreement. Each party acknowledges that injury resulting from any breach of this provision would be significant and irreparable and that it would be extremely difficult to ascertain the actual amount of damages resulting from such breach. Therefore, in the event of a violation of this provision, in addition to any other right the non-hiring party may have at law or in equity, the hiring party shall make a one-time payment to the non-hiring party in the amount of one hundred percent (100%) of the affected employee's or contractor\u2019s payments from the non-hiring party for the preceding one year, which accurately reflects the reasonable value of the employee\u2019s time and costs. The parties agree that such amount is not intended as a penalty and is reasonably calculated based upon the projected costs the injured party would incur to identify, recruit, hire, and train suitable replacements for such personnel. DISPUTE RESOLUTION", "size": 20, "snippet_links": [{"key": "in-place", "type": "clause", "offset": [33, 41]}, {"key": "responsible-for", "type": "clause", "offset": [103, 118]}, {"key": "caused-by-client", "type": "clause", "offset": [140, 156]}, {"key": "access-to", "type": "definition", "offset": [159, 168]}, {"key": "application-programming-interfaces", "type": "definition", "offset": [181, 215]}, {"key": "the-execution", "type": "clause", "offset": [219, 232]}, {"key": "malicious-code", "type": "clause", "offset": [252, 266]}, {"key": "including-without-limitation", "type": "clause", "offset": [291, 319]}, {"key": "disabling-devices", "type": "clause", "offset": [321, 338]}, {"key": "by-provider", "type": "clause", "offset": [520, 531]}, {"key": "hardware-and-software-configurations", "type": "clause", "offset": [533, 569]}, {"key": "provider-shall", "type": "clause", "offset": [626, 640]}, {"key": "to-provider", "type": "definition", "offset": [648, 659]}, {"key": "confidential-information", "type": "clause", "offset": [693, 717]}, {"key": "security-privacy", "type": "clause", "offset": [731, 749]}, {"key": "in-addition-to", "type": "clause", "offset": [750, 764]}, {"key": "other-confidentiality-obligations", "type": "clause", "offset": [769, 802]}, {"key": "service-attachment", "type": "clause", "offset": [823, 841]}, {"key": "requested-by", "type": "clause", "offset": [969, 981]}, {"key": "by-court-order", "type": "clause", "offset": [1002, 1016]}, {"key": "applicable-law", "type": "clause", "offset": [1020, 1034]}, {"key": "for-purposes-of-this", "type": "clause", "offset": [1036, 1056]}, {"key": "personal-data", "type": "definition", "offset": [1157, 1170]}, {"key": "subject-to-the-terms", "type": "clause", "offset": [1369, 1389]}, {"key": "user-accounts", "type": "definition", "offset": [1420, 1433]}, {"key": "respond-to", "type": "definition", "offset": [1468, 1478]}, {"key": "technical-problems", "type": "clause", "offset": [1490, 1508]}, {"key": "security-and-regulatory-recommendations", "type": "clause", "offset": [1543, 1582]}, {"key": "no-obligation-to", "type": "clause", "offset": [1604, 1620]}, {"key": "from-time-to-time", "type": "clause", "offset": [1628, 1645]}, {"key": "make-recommendations", "type": "clause", "offset": [1660, 1680]}, {"key": "and-security", "type": "clause", "offset": [1722, 1734]}, {"key": "related-to", "type": "definition", "offset": [1735, 1745]}, {"key": "data-protection", "type": "definition", "offset": [1972, 1987]}, {"key": "not-limited", "type": "clause", "offset": [2003, 2014]}, {"key": "data-breach-notification", "type": "clause", "offset": [2025, 2049]}, {"key": "forensic-investigation", "type": "clause", "offset": [2093, 2115]}, {"key": "other-costs", "type": "definition", "offset": [2143, 2154]}, {"key": "management-services", "type": "clause", "offset": [2243, 2262]}, {"key": "password-management", "type": "clause", "offset": [2284, 2303]}, {"key": "services-to-client", "type": "clause", "offset": [2304, 2322]}, {"key": "client-shall", "type": "clause", "offset": [2324, 2336]}, {"key": "be-responsible", "type": "clause", "offset": [2337, 2351]}, {"key": "use-of-passwords", "type": "clause", "offset": [2384, 2400]}, {"key": "client-agrees-to", "type": "clause", "offset": [2413, 2429]}, {"key": "any-loss", "type": "definition", "offset": [2458, 2466]}, {"key": "services-by-client", "type": "clause", "offset": [2557, 2575]}, {"key": "provider-representations-and-warranty", "type": "clause", "offset": [2577, 2614]}, {"key": "security-compromise", "type": "clause", "offset": [2632, 2651]}, {"key": "policy-provider", "type": "definition", "offset": [2652, 2667]}, {"key": "availability-and-performance", "type": "clause", "offset": [2681, 2709]}, {"key": "security-breaches", "type": "clause", "offset": [2827, 2844]}, {"key": "in-order-to", "type": "clause", "offset": [2846, 2857]}, {"key": "compromise-of-security", "type": "clause", "offset": [2878, 2900]}, {"key": "services-and", "type": "clause", "offset": [2906, 2918]}, {"key": "exposed-to", "type": "definition", "offset": [2932, 2942]}, {"key": "the-internet", "type": "clause", "offset": [2943, 2955]}, {"key": "best-practices", "type": "definition", "offset": [3040, 3054]}, {"key": "related-incidents", "type": "definition", "offset": [3139, 3156]}, {"key": "appropriate-authorities", "type": "definition", "offset": [3164, 3187]}, {"key": "protection-of", "type": "definition", "offset": [3251, 3264]}, {"key": "software-systems", "type": "clause", "offset": [3332, 3348]}, {"key": "service-warranty", "type": "definition", "offset": [3350, 3366]}, {"key": "professional-and-workmanlike-manner", "type": "clause", "offset": [3419, 3454]}, {"key": "schedule-of-services", "type": "clause", "offset": [3511, 3531]}, {"key": "in-writing", "type": "clause", "offset": [3608, 3618]}, {"key": "days-after", "type": "definition", "offset": [3643, 3653]}, {"key": "any-non", "type": "clause", "offset": [3749, 3756]}, {"key": "the-non", "type": "clause", "offset": [3809, 3816]}, {"key": "warranty-provider", "type": "definition", "offset": [3865, 3882]}, {"key": "internet-connectivity", "type": "clause", "offset": [4159, 4180]}, {"key": "service-availability", "type": "clause", "offset": [4224, 4244]}, {"key": "the-performance", "type": "clause", "offset": [4300, 4315]}, {"key": "security-of-the-services", "type": "clause", "offset": [4331, 4355]}, {"key": "arise-from", "type": "definition", "offset": [4361, 4371]}, {"key": "party-content", "type": "clause", "offset": [4398, 4411]}, {"key": "services-provided-by-third-parties", "type": "clause", "offset": [4416, 4450]}, {"key": "with-respect-to", "type": "clause", "offset": [4486, 4501]}, {"key": "warranty-claim", "type": "clause", "offset": [4504, 4518]}, {"key": "warranty-period", "type": "definition", "offset": [4561, 4576]}, {"key": "the-claim", "type": "definition", "offset": [4588, 4597]}, {"key": "the-actions", "type": "clause", "offset": [4661, 4672]}, {"key": "a-third-party", "type": "clause", "offset": [4686, 4699]}, {"key": "breach-of-the", "type": "clause", "offset": [4709, 4722]}, {"key": "services-warranty", "type": "clause", "offset": [4723, 4740]}, {"key": "exclusive-remedy", "type": "clause", "offset": [4751, 4767]}, {"key": "entire-liability", "type": "clause", "offset": [4783, 4799]}, {"key": "correction-of", "type": "clause", "offset": [4813, 4826]}, {"key": "deficient-services", "type": "clause", "offset": [4831, 4849]}, {"key": "breach-of-warranty", "type": "clause", "offset": [4866, 4884]}, {"key": "commercially-reasonable-manner", "type": "clause", "offset": [4951, 4981]}, {"key": "the-fees", "type": "clause", "offset": [5056, 5064]}, {"key": "terminated-services", "type": "definition", "offset": [5073, 5092]}, {"key": "the-period", "type": "clause", "offset": [5130, 5140]}, {"key": "effective-date-of-termination", "type": "clause", "offset": [5155, 5184]}, {"key": "to-the-extent", "type": "clause", "offset": [5186, 5199]}, {"key": "prohibited-by-law", "type": "clause", "offset": [5204, 5221]}, {"key": "warranties-are-exclusive", "type": "clause", "offset": [5249, 5273]}, {"key": "implied-warranties", "type": "clause", "offset": [5308, 5326]}, {"key": "by-the-provider", "type": "clause", "offset": [5341, 5356]}, {"key": "party-vendors", "type": "clause", "offset": [5370, 5383]}, {"key": "for-software", "type": "clause", "offset": [5394, 5406]}, {"key": "satisfactory-quality", "type": "definition", "offset": [5477, 5497]}, {"key": "and-fitness-for-a-particular-purpose", "type": "clause", "offset": [5499, 5535]}, {"key": "link-to", "type": "clause", "offset": [5688, 5695]}, {"key": "services-for", "type": "clause", "offset": [5717, 5729]}, {"key": "engagement-of", "type": "clause", "offset": [5765, 5778]}, {"key": "consulting-services", "type": "definition", "offset": [5861, 5880]}, {"key": "web-hosting", "type": "definition", "offset": [5890, 5901]}, {"key": "server-hosting", "type": "clause", "offset": [5903, 5917]}, {"key": "phone-service", "type": "definition", "offset": [5919, 5932]}, {"key": "exchange-of-data", "type": "clause", "offset": [5942, 5958]}, {"key": "the-applicable", "type": "clause", "offset": [6032, 6046]}, {"key": "terms-and-conditions-of", "type": "clause", "offset": [6098, 6121]}, {"key": "party-provider", "type": "definition", "offset": [6133, 6147]}, {"key": "in-connection-with", "type": "clause", "offset": [6392, 6410]}, {"key": "services-providers", "type": "clause", "offset": [6481, 6499]}, {"key": "as-required", "type": "clause", "offset": [6559, 6570]}, {"key": "consent-to", "type": "clause", "offset": [6749, 6759]}, {"key": "use-of-client", "type": "definition", "offset": [6775, 6788]}, {"key": "deletion-of-data", "type": "clause", "offset": [6987, 7003]}, {"key": "resulting-from", "type": "definition", "offset": [7004, 7018]}, {"key": "party-service-providers", "type": "clause", "offset": [7044, 7067]}, {"key": "compliance-with-laws", "type": "clause", "offset": [7069, 7089]}, {"key": "applicable-to", "type": "definition", "offset": [7126, 7139]}, {"key": "it-provider", "type": "definition", "offset": [7174, 7185]}, {"key": "for-the-avoidance-of-doubt", "type": "clause", "offset": [7187, 7213]}, {"key": "an-order", "type": "definition", "offset": [7244, 7252]}, {"key": "complying-with", "type": "clause", "offset": [7286, 7300]}, {"key": "the-laws", "type": "definition", "offset": [7301, 7309]}, {"key": "client-or-client", "type": "definition", "offset": [7324, 7340]}, {"key": "legal-requirements", "type": "definition", "offset": [7541, 7559]}, {"key": "legal-and-regulatory-compliance", "type": "clause", "offset": [7805, 7836]}, {"key": "responsibility-for", "type": "clause", "offset": [7970, 7988]}, {"key": "no-hiring", "type": "clause", "offset": [8059, 8068]}, {"key": "neither-party-shall", "type": "clause", "offset": [8069, 8088]}, {"key": "any-employee", "type": "clause", "offset": [8130, 8142]}, {"key": "other-party", "type": "clause", "offset": [8164, 8175]}, {"key": "during-the-term-of-this-agreement", "type": "clause", "offset": [8176, 8209]}, {"key": "following-termination-of-this-agreement", "type": "clause", "offset": [8237, 8276]}, {"key": "each-party", "type": "clause", "offset": [8278, 8288]}, {"key": "breach-of-this", "type": "clause", "offset": [8333, 8347]}, {"key": "amount-of-damages", "type": "clause", "offset": [8460, 8477]}, {"key": "in-the-event-of-a", "type": "clause", "offset": [8517, 8534]}, {"key": "hiring-party", "type": "definition", "offset": [8603, 8615]}, {"key": "payment-to-the", "type": "clause", "offset": [8685, 8699]}, {"key": "affected-employee", "type": "definition", "offset": [8768, 8785]}, {"key": "one-year", "type": "definition", "offset": [8857, 8865]}, {"key": "reasonable-value", "type": "clause", "offset": [8897, 8913]}, {"key": "the-employee", "type": "clause", "offset": [8917, 8929]}, {"key": "the-parties-agree-that", "type": "clause", "offset": [8948, 8970]}, {"key": "projected-costs", "type": "clause", "offset": [9056, 9071]}, {"key": "dispute-resolution", "type": "clause", "offset": [9182, 9200]}], "hash": "a18aad866cd48397630fc6157f4bced6", "id": 3}, {"samples": [{"hash": "csO9WbF9et0", "uri": "/contracts/csO9WbF9et0#malware", "label": "Power Purchase Agreement", "score": 35.9222602844, "published": true}, {"hash": "22b5mP1D6dX", "uri": "/contracts/22b5mP1D6dX#malware", "label": "Facility Agreement", "score": 31.7893104553, "published": true}, {"hash": "bzH8vNv9mWm", "uri": "/contracts/bzH8vNv9mWm#malware", "label": "Power Purchase Agreement (Hawaiian Electric Co Inc)", "score": 31.1574268341, "published": true}], "snippet": "Seller shall (consistent with the following sentence) ensure that no malware or similar items are coded or introduced into any aspect of the Facility, Interconnection Facilities, the Company Systems interfacing with the Facility and Interconnection Facilities, and any of Seller's critical control systems or processes used by Seller to provide energy, including the information, data and other materials delivered by or on behalf of Seller to Company, (collectively, the \"Environment\"). Seller will continue to review, analyze and implement improvements to and upgrades of its Malware prevention and correction programs and processes that are commercially reasonable and consistent with the then current technology industry's standards and, in any case, not less robust than the programs and processes implemented by Seller with respect to its own information systems. If Malware is found to have been introduced into the Environment, Seller will promptly notify Company and Seller shall take immediate action to eliminate and remediate the effects of the Malware, at Seller's expense. Seller shall not modify or otherwise take corrective action with respect to the Company Systems except at Company's request. Seller will promptly report to Company the nature and status of all Malware elimination and remediation efforts.", "size": 40, "snippet_links": [{"key": "seller-shall", "type": "clause", "offset": [0, 12]}, {"key": "consistent-with-the", "type": "clause", "offset": [14, 33]}, {"key": "no-malware", "type": "clause", "offset": [66, 76]}, {"key": "similar-items", "type": "definition", "offset": [80, 93]}, {"key": "the-facility", "type": "clause", "offset": [137, 149]}, {"key": "interconnection-facilities", "type": "definition", "offset": [151, 177]}, {"key": "company-systems", "type": "clause", "offset": [183, 198]}, {"key": "of-seller", "type": "clause", "offset": [269, 278]}, {"key": "control-systems", "type": "clause", "offset": [290, 305]}, {"key": "by-seller", "type": "clause", "offset": [324, 333]}, {"key": "to-provide", "type": "clause", "offset": [334, 344]}, {"key": "the-information", "type": "clause", "offset": [363, 378]}, {"key": "other-materials", "type": "definition", "offset": [389, 404]}, {"key": "by-or-on-behalf-of", "type": "definition", "offset": [415, 433]}, {"key": "to-company", "type": "definition", "offset": [441, 451]}, {"key": "seller-will", "type": "clause", "offset": [488, 499]}, {"key": "malware-prevention", "type": "clause", "offset": [578, 596]}, {"key": "commercially-reasonable", "type": "clause", "offset": [644, 667]}, {"key": "current-technology", "type": "definition", "offset": [697, 715]}, {"key": "the-programs", "type": "clause", "offset": [776, 788]}, {"key": "information-systems", "type": "definition", "offset": [849, 868]}, {"key": "the-environment", "type": "clause", "offset": [919, 934]}, {"key": "notify-company", "type": "clause", "offset": [957, 971]}, {"key": "immediate-action", "type": "definition", "offset": [994, 1010]}, {"key": "at-seller", "type": "definition", "offset": [1066, 1075]}, {"key": "not-modify", "type": "clause", "offset": [1100, 1110]}, {"key": "corrective-action", "type": "definition", "offset": [1129, 1146]}, {"key": "with-respect-to-the-company", "type": "clause", "offset": [1147, 1174]}, {"key": "report-to", "type": "definition", "offset": [1233, 1242]}, {"key": "the-nature", "type": "clause", "offset": [1251, 1261]}, {"key": "status-of", "type": "clause", "offset": [1266, 1275]}, {"key": "remediation-efforts", "type": "definition", "offset": [1304, 1323]}], "hash": "b1a9a978f3aee7657aa6805e9b463ec9", "id": 1}, {"samples": [{"hash": "2VpJZyqHDOX", "uri": "/contracts/2VpJZyqHDOX#malware", "label": "Adobe Developer Terms of Use", "score": 34.196521759, "published": true}, {"hash": "6syZ1Mykb6x", "uri": "/contracts/6syZ1Mykb6x#malware", "label": "Adobe Developer Terms of Use", "score": 33.5453567505, "published": true}, {"hash": "lXKrQrOK7yN", "uri": "/contracts/lXKrQrOK7yN#malware", "label": "Adobe Developer Terms of Use", "score": 33.3510017395, "published": true}], "snippet": "You may not knowingly, willfully, or negligently incorporate any malicious or harmful code, viruses, Trojan Horses, worms, time bombs, cancelbots, or other malware in your Developer Software.", "size": 8, "snippet_links": [{"key": "harmful-code", "type": "definition", "offset": [78, 90]}, {"key": "developer-software", "type": "definition", "offset": [172, 190]}], "hash": "e30a7832a1e28c3de9a72dfd42634e07", "id": 5}, {"samples": [{"hash": "7LbSYO0nZB1", "uri": "/contracts/7LbSYO0nZB1#malware", "label": "Call Off Contract", "score": 36.325138092, "published": true}, {"hash": "8xipgZIs9yP", "uri": "/contracts/8xipgZIs9yP#malware", "label": "Master Subscription Agreement", "score": 34.1420631409, "published": true}, {"hash": "5jG92AHu5uu", "uri": "/contracts/5jG92AHu5uu#malware", "label": "Data Processing Agreement", "score": 33.153049469, "published": true}], "snippet": "In production, Zoom must employ tools to detect, log, and disposition malware.", "size": 12, "snippet_links": [], "hash": "74bccbdc8cea69e38001bec7083c5351", "id": 4}, {"samples": [{"hash": "7PDYsA3hzuS", "uri": "/contracts/7PDYsA3hzuS#malware", "label": "Purchase Order Terms and Conditions", "score": 34.5290944822, "published": true}, {"hash": "9sABcWbw75h", "uri": "/contracts/9sABcWbw75h#malware", "label": "Purchase Order Terms and Conditions", "score": 33.5140266418, "published": true}, {"hash": "bCjMeOSg7x5", "uri": "/contracts/bCjMeOSg7x5#malware", "label": "Purchase Order Terms and Conditions", "score": 33.1549263, "published": true}], "snippet": "Supplier represents, warrants and guarantees that any Merchandise, if applicable, and any deliverables resulting from the Services do not include, and that any method of transmitting said deliverables to University will not introduce, any program, routine, subroutine, known vulnerability, or data (including malicious software or \u201cmalware,\u201d viruses, ransomware, worms or Trojan Horses) that are designed to disrupt the proper operation of the Merchandise or deliverables or any other software or system used by University, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause the deliverables resulting from the Services or any system, software or data used in connection therewith to be destroyed, damaged or rendered inoperable or inaccessible.", "size": 8, "snippet_links": [{"key": "and-guarantees", "type": "clause", "offset": [30, 44]}, {"key": "if-applicable", "type": "clause", "offset": [67, 80]}, {"key": "the-services", "type": "definition", "offset": [118, 130]}, {"key": "method-of", "type": "clause", "offset": [160, 169]}, {"key": "to-university", "type": "clause", "offset": [201, 214]}, {"key": "known-vulnerability", "type": "definition", "offset": [269, 288]}, {"key": "malicious-software", "type": "clause", "offset": [309, 327]}, {"key": "operation-of-the", "type": "clause", "offset": [427, 443]}, {"key": "other-software", "type": "definition", "offset": [479, 493]}, {"key": "by-university", "type": "clause", "offset": [509, 522]}, {"key": "passage-of-time", "type": "clause", "offset": [578, 593]}, {"key": "failure-to-take", "type": "definition", "offset": [615, 630]}, {"key": "any-action", "type": "definition", "offset": [631, 641]}, {"key": "the-deliverables", "type": "clause", "offset": [654, 670]}, {"key": "in-connection", "type": "definition", "offset": [736, 749]}, {"key": "rendered-inoperable", "type": "definition", "offset": [788, 807]}], "hash": "ba33934026081e433ea8e5e9edb2241f", "id": 6}, {"samples": [{"hash": "5qp8RtJpdhp", "uri": "/contracts/5qp8RtJpdhp#malware", "label": "Terms of Use", "score": 33.0563812256, "published": true}, {"hash": "bH537Rwrx5z", "uri": "/contracts/bH537Rwrx5z#malware", "label": "Terms of Use", "score": 32.9824752808, "published": true}, {"hash": "13RxHmxNvfw", "uri": "/contracts/13RxHmxNvfw#malware", "label": "Terms of Use", "score": 32.8921394348, "published": true}], "snippet": "You agree not to knowingly or recklessly introduce a virus or other harmful component, or otherwise tamper with, impair or damage the Platform.", "size": 4, "snippet_links": [{"key": "you-agree", "type": "clause", "offset": [0, 9]}, {"key": "tamper-with", "type": "definition", "offset": [100, 111]}, {"key": "the-platform", "type": "definition", "offset": [130, 142]}], "hash": "dfaece657e4905b3bf0a2d4cbd56bb29", "id": 9}, {"samples": [{"hash": "8lCMvKmF5gF", "uri": "/contracts/8lCMvKmF5gF#malware", "label": "Supplemental Contract for Gis Professional Services", "score": 31.9719352722, "published": true}, {"hash": "eVsrnFDHz5k", "uri": "/contracts/eVsrnFDHz5k#malware", "label": "Contract for Paging System", "score": 31.8787403107, "published": true}], "snippet": "Any type of Software that is designed to harm, impact, or access the Software or any other Authority systems.", "size": 7, "snippet_links": [{"key": "type-of-software", "type": "clause", "offset": [4, 20]}, {"key": "the-software", "type": "clause", "offset": [65, 77]}, {"key": "other-authority", "type": "clause", "offset": [85, 100]}], "hash": "1f1e9c2b80e238495978e5ace700e4c9", "id": 7}, {"samples": [{"hash": "9hg3IoismPy", "uri": "/contracts/9hg3IoismPy#malware", "label": "Master Services Agreement", "score": 36.0040359497, "published": true}, {"hash": "845jKh5TNtD", "uri": "/contracts/845jKh5TNtD#malware", "label": "Master Services Agreement", "score": 35.7455482483, "published": true}, {"hash": "fyf6wuvp1tE", "uri": "/contracts/fyf6wuvp1tE#malware", "label": "Master Services Agreement", "score": 35.6851158142, "published": true}], "snippet": "An anti-malware solution must be in place, and updated with valid update subscription. Provider is not responsible for any harm that may be caused by Client\u2019s access to third-party application programming interfaces or the execution or transmission of malicious code or similar occurrences, including without limitation, disabling devices, drop dead devices, time bombs, trap doors, Trojan horses, worms, viruses, and similar mechanisms. Any costs or fees to rebuild or service machines are provided and sold separately by Provider. Hardware and Software Configurations All Hardware and Software Configurations implemented by Provider shall belong to Provider, and shall constitute Provider\u2019s Confidential Information. Client Data Security & Privacy In addition to its other confidentiality obligations under an applicable Service Attachment, Provider shall not use, edit, or disclose to any party other than Client any Client Data (defined below), except as otherwise requested by Client, or required by court order or applicable law. For purposes of this provision, all data stored on the virtualized machines assigned to Client, including locally stored personal data of individual employees, will be considered Client Data by Provider. As between Provider and Client, all Client Data is owned exclusively by Client. Client Data constitutes Confidential Information subject to the Terms. Provider may access Client's User accounts, including Client Data, solely to respond to service or technical problems or otherwise at Client's request.", "size": 5, "snippet_links": [{"key": "in-place", "type": "clause", "offset": [33, 41]}, {"key": "responsible-for", "type": "clause", "offset": [103, 118]}, {"key": "caused-by-client", "type": "clause", "offset": [140, 156]}, {"key": "access-to", "type": "definition", "offset": [159, 168]}, {"key": "application-programming-interfaces", "type": "definition", "offset": [181, 215]}, {"key": "the-execution", "type": "clause", "offset": [219, 232]}, {"key": "malicious-code", "type": "clause", "offset": [252, 266]}, {"key": "including-without-limitation", "type": "clause", "offset": [291, 319]}, {"key": "disabling-devices", "type": "clause", "offset": [321, 338]}, {"key": "by-provider", "type": "clause", "offset": [520, 531]}, {"key": "hardware-and-software-configurations", "type": "clause", "offset": [533, 569]}, {"key": "provider-shall", "type": "clause", "offset": [626, 640]}, {"key": "to-provider", "type": "definition", "offset": [648, 659]}, {"key": "confidential-information", "type": "clause", "offset": [693, 717]}, {"key": "security-privacy", "type": "clause", "offset": [731, 749]}, {"key": "in-addition-to", "type": "clause", "offset": [750, 764]}, {"key": "other-confidentiality-obligations", "type": "clause", "offset": [769, 802]}, {"key": "service-attachment", "type": "clause", "offset": [823, 841]}, {"key": "requested-by", "type": "clause", "offset": [969, 981]}, {"key": "by-court-order", "type": "clause", "offset": [1002, 1016]}, {"key": "applicable-law", "type": "clause", "offset": [1020, 1034]}, {"key": "for-purposes-of-this", "type": "clause", "offset": [1036, 1056]}, {"key": "to-client", "type": "clause", "offset": [1121, 1130]}, {"key": "personal-data", "type": "definition", "offset": [1157, 1170]}, {"key": "subject-to-the-terms", "type": "clause", "offset": [1369, 1389]}, {"key": "user-accounts", "type": "definition", "offset": [1420, 1433]}, {"key": "respond-to", "type": "definition", "offset": [1468, 1478]}, {"key": "technical-problems", "type": "clause", "offset": [1490, 1508]}], "hash": "826509a2f1eee597ef916c03d6b5efd9", "id": 8}, {"samples": [{"hash": "b7QpEq7Zdef", "uri": "/contracts/b7QpEq7Zdef#malware", "label": "Contract for Project Information Management System", "score": 34.0052337646, "published": true}, {"hash": "e4qhjreJ5sa", "uri": "/contracts/e4qhjreJ5sa#malware", "label": "Contract Ma 017 20011143", "score": 31.2076435089, "published": true}, {"hash": "jpOZgD2Pkbj", "uri": "/contracts/jpOZgD2Pkbj#malware", "label": "Contract for Project Information Management System", "score": 29.7797527313, "published": true}], "snippet": "The term \u201cMalware\u201d shall mean software designed to infiltrate or damage a computer system without the owner's informed consent. Software is considered Malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, Trojan horses, most rootkits, spyware, dishonest adware, crime ware and other malicious and unwanted software.", "size": 4, "snippet_links": [{"key": "the-term", "type": "definition", "offset": [0, 8]}, {"key": "computer-system", "type": "definition", "offset": [74, 89]}, {"key": "the-owner", "type": "clause", "offset": [98, 107]}, {"key": "informed-consent", "type": "definition", "offset": [110, 126]}, {"key": "based-on", "type": "definition", "offset": [159, 167]}, {"key": "computer-viruses", "type": "clause", "offset": [258, 274]}], "hash": "57bef44cc0f10e9036bf5adcc28f209c", "id": 10}], "next_curs": "ClASSmoVc35sYXdpbnNpZGVyY29udHJhY3RzciwLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhBtYWx3YXJlIzAwMDAwMDBhDKIBAmVuGAAgAA==", "clause": {"children": [], "size": 211, "title": "Malware", "parents": [["critical-infrastructure-protection", "Critical Infrastructure Protection"], ["certain-specifications-for-the-facility", "Certain Specifications for the Facility"], ["parallel-operation", "PARALLEL OPERATION"], ["reports-studies-and-assessment", "Reports, Studies and Assessment"], ["representations-and-warranties", "Representations and Warranties"]], "id": "malware", "related": [["antivirus-software", "Antivirus software", "Antivirus software"], ["viruses", "Viruses", "Viruses"], ["malicious-software", "Malicious Software", "Malicious Software"], ["functionality", "Functionality", "Functionality"], ["compatibility", "Compatibility", "Compatibility"]], "related_snippets": [], "updated": "2025-07-24T06:49:03+00:00", "also_ask": ["What minimum security standards should be mandated to address malware risks?", "How can liability for malware incidents be fairly allocated between parties?", "What are the most effective remedies and notification requirements for malware breaches?", "How do malware clauses in this contract compare to industry best practices and legal requirements?", "What evidentiary hurdles exist in proving a malware breach in court?"], "drafting_tip": "Define 'malware' precisely to avoid ambiguity; specify parties' obligations to detect and report malware to ensure prompt response; allocate liability for malware incidents to clarify responsibility.", "explanation": "The Malware clause establishes the responsibilities and procedures related to the prevention, detection, and management of malicious software within the scope of an agreement. Typically, it requires parties to implement reasonable security measures to prevent the introduction of malware and to promptly notify the other party if malware is detected. This clause helps protect both parties from the risks associated with malware, such as data breaches or system disruptions, by ensuring clear protocols and accountability for cybersecurity threats."}, "json": true, "cursor": ""}}