Protection from Malicious Code Sample Clauses

Protection from Malicious Code. For cloud hosted solutions, vendors must utilize antivirus/antispyware software on servers and monitor to prevent malicious code which may lead to a compromise of OCHCA’s data. • For local hosted solutions, vendors must ensure that the application appropriately supports the use of antivirus/antispyware software.
AutoNDA by SimpleDocs
Protection from Malicious Code. 10 Provider will reveal potential compatibility issues with Commercial Off The Shelf (COTS) virus 11 scanning software.

Related to Protection from Malicious Code

  • Protection from Unauthorized Use Licensee shall secure that Participating Institutions will use reasonable efforts to restrict access to the Licensed Materials to Authorized Users.

  • Malicious Code You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Freedom from Discrimination 9.01 The Union, the Employer, and the employees agree that there shall be no discrimination, interference, restriction, or coercion exercised or practiced with respect to any employee by reason of race, ethnic origin, colour, ancestry, citizenship, place of origin, creed, religion, age, sex, sexual orientation, marital status, family status, pregnancy, disability, lawful source of income, conviction for an offence for which a pardon has been granted, or union membership or activity or for exercising their rights under the Agreement.

  • Privacy Protection Each of the Corporation and the Subsidiaries have security measures and safeguards in place to protect personal information it collects from registered patients and customers and other parties from illegal or unauthorized access or use by its personnel or third parties or access or use by its personnel or third parties in a manner that violates the privacy rights of third parties. The Corporation and the Subsidiaries have complied, in all material respects, with all applicable privacy and consumer protection legislation and neither has collected, received, stored, disclosed, transferred, used, misused or permitted unauthorized access to any information protected by privacy laws, whether collected directly or from third parties, in an unlawful manner. The Corporation and the Subsidiaries have taken all reasonable steps to protect personal information against loss or theft and against unauthorized access, copying, use, modification, disclosure or other misuse.

  • Protection of Human Subjects The Recipient agrees to comply with the requirements of the National Research Act, as amended, 42 U.S.C. §§ 289 et seq., and U.S. DOT regulations, “Protection of Human Subjects,” 49 C.F.R. Part 11, pertaining to protections for human subjects participating in or involved in research, development, and activities related to the Project.

  • Xxxx Protection 23.1With respect to the Parties' rights and obligations under this Framework Agreement, the Parties agree that the Authority is the Data Controller and that the Supplier is the Data Processor.

  • PERSONAL DATA PROTECTION ACT 7.1. PAH is committed to protecting the privacy, confidentiality and security of all personal data to which it is entrusted. It has been our policy to ensure your personal information are protected. With the introduction of the Malaysian Personal Data Protection Act 2010 ("PDPA"), we are even committed to ensure the privacy and confidentiality and security of all personal data are protected in line with the PDPA. We process personal data which you have provided to us voluntarily through our website upon your registration and this includes personal data such as your name, address, NRIC and contact details. In this regards, you have expressly consent to our processing of your personal data. If you give us personal data or information about another person, you must first confirm that he/she has appointed you to act for him/her, to consent to the processing of his/her personal data and to receive on his/her behalf any data protection notices. We may request your assistance to procure the consent of such persons whose personal data is provided by you to us and you agree to do so. You shall indemnify us in the event we suffer loss and damage as a result of your failure to comply with the same. We will only retain your personal data for as long as necessary for the fulfilment of the specified purposes or as legislated

  • Age Discrimination Act of 1975 The Contractor shall comply with the Age Discrimination Act of 1975 (42 U.S.C. § 6101 et seq.), as amended, and any applicable regulations. No person in the United States shall, on the basis of age, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under, any program or activity receiving Federal financial assistance.

  • E1 Data Protection Act E1.1 For the purposes of this Clause E1, the terms “Data Controller”, “Data Processor”, “Data Subject”, “Personal Data”, “Process” and “Processing shall have the meaning prescribed under the DPA.

Time is Money Join Law Insider Premium to draft better contracts faster.