Protections Against Malicious Code Sample Clauses

Protections Against Malicious Code. Supplier will and will require its Providers to:
AutoNDA by SimpleDocs
Protections Against Malicious Code. Provider will implement detection, prevention, and recovery controls to protect against malicious software (malware), which is no less than current industry best practice and perform appropriate employee and Provider training on the prevention and detection of malicious software.
Protections Against Malicious Code. TrueCar will use detection, prevention, and recovery controls to protect against malicious software and will train TrueCar Workforce on the prevention and detection of malicious software.

Related to Protections Against Malicious Code

  • Actions against Parties; Notification Each indemnified party shall give notice as promptly as reasonably practicable to each indemnifying party of any action commenced against it in respect of which indemnity may be sought hereunder, but failure to so notify an indemnifying party shall not relieve such indemnifying party from any liability hereunder to the extent it is not materially prejudiced as a result thereof and in any event shall not relieve it from any liability which it may have otherwise than on account of this indemnity agreement. In the case of parties indemnified pursuant to Section 6(a) above, counsel to the indemnified parties shall be selected by the Representatives, and, in the case of parties indemnified pursuant to Section 6(b) above, counsel to the indemnified parties shall be selected by the Company. An indemnifying party may participate at its own expense in the defense of any such action; provided, however, that counsel to the indemnifying party shall not (except with the consent of the indemnified party) also be counsel to the indemnified party. In no event shall the indemnifying parties be liable for fees and expenses of more than one counsel (in addition to any local counsel) separate from their own counsel for all indemnified parties in connection with any one action or separate but similar or related actions in the same jurisdiction arising out of the same general allegations or circumstances. No indemnifying party shall, without the prior written consent of the indemnified parties, settle or compromise or consent to the entry of any judgment with respect to any litigation, or any investigation or proceeding by any governmental agency or body, commenced or threatened, or any claim whatsoever in respect of which indemnification or contribution could be sought under this Section 6 or Section 7 hereof (whether or not the indemnified parties are actual or potential parties thereto), unless such settlement, compromise or consent (i) includes an unconditional release of each indemnified party from all liability arising out of such litigation, investigation, proceeding or claim and (ii) does not include a statement as to or an admission of fault, culpability or a failure to act by or on behalf of any indemnified party.

  • Cybersecurity; Data Protection To the best knowledge of the Company after due inquiry, the Company’s and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform as required in connection with the operation of the business of the Company and its Subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any Governmental Entity, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Environment, Health, and Safety 24.4.1. The Supplier and its staff (and/or any sub-supplier and/or subcontractor) shall comply with the laws and regulations in force related to protection of the environment, the health and safety instructions applicable to the Goods and Services performed pursuant to the Contract and especially, if appropriate, to the Goodsand Services performedon any Site by a third company.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!