Protections Against Malicious Code Sample Clauses

Protections Against Malicious Code. Supplier will and will require its Providers to:
AutoNDA by SimpleDocs
Protections Against Malicious Code. TrueCar will use detection, prevention, and recovery controls to protect against malicious software and will train TrueCar Workforce on the prevention and detection of malicious software.
Protections Against Malicious Code. Provider will implement detection, prevention, and recovery controls to protect against malicious software (malware), which is no less than current industry best practice and perform appropriate employee and Provider training on the prevention and detection of malicious software.

Related to Protections Against Malicious Code

  • Protections Against Violations of Agreement No purported sale, assignment, mortgage, hypothecation, transfer, pledge, encumbrance, gift, transfer in trust (voting or other) or other disposition of, or creation of a security interest in or lien on, any of the Restricted Stock Units by any holder thereof in violation of the provisions of this Agreement or the Certificate of Incorporation or the Bylaws of the Company, will be valid, and the Company will not transfer any shares resulting from the settlement of Restricted Stock Units on its books nor will any of such shares be entitled to vote, nor will any dividends be paid thereon, unless and until there has been full compliance with such provisions to the satisfaction of the Company. The foregoing restrictions are in addition to and not in lieu of any other remedies, legal or equitable, available to enforce such provisions.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Actions against Parties; Notification Each indemnified party shall give notice as promptly as reasonably practicable to each indemnifying party of any action commenced against it in respect of which indemnity may be sought hereunder, but failure to so notify an indemnifying party shall not relieve such indemnifying party from any liability hereunder to the extent it is not materially prejudiced as a result thereof and in any event shall not relieve it from any liability which it may have otherwise than on account of this indemnity agreement. In the case of parties indemnified pursuant to Section 6(a) above, counsel to the indemnified parties shall be selected by the Representatives, and, in the case of parties indemnified pursuant to Section 6(b) above, counsel to the indemnified parties shall be selected by the Company. An indemnifying party may participate at its own expense in the defense of any such action; provided, however, that counsel to the indemnifying party shall not (except with the consent of the indemnified party) also be counsel to the indemnified party. In no event shall the indemnifying parties be liable for fees and expenses of more than one counsel (in addition to any local counsel) separate from their own counsel for all indemnified parties in connection with any one action or separate but similar or related actions in the same jurisdiction arising out of the same general allegations or circumstances. No indemnifying party shall, without the prior written consent of the indemnified parties, settle or compromise or consent to the entry of any judgment with respect to any litigation, or any investigation or proceeding by any governmental agency or body, commenced or threatened, or any claim whatsoever in respect of which indemnification or contribution could be sought under this Section 6 or Section 7 hereof (whether or not the indemnified parties are actual or potential parties thereto), unless such settlement, compromise or consent (i) includes an unconditional release of each indemnified party from all liability arising out of such litigation, investigation, proceeding or claim and (ii) does not include a statement as to or an admission of fault, culpability or a failure to act by or on behalf of any indemnified party.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • Cybersecurity and Data Protection The Company and its Subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are reasonably believed by the Company to be adequate in all material respects for, and operate and perform as required in connection with, the operation of the business of the Company and its Subsidiaries as currently conducted and, to the Company’s knowledge, are free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants, except as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with the business of the Company and its Subsidiaries as currently conducted, and, to the knowledge of the Company, there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect. The Company and its Subsidiaries are presently in compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except for such failures as would not individually or in the aggregate reasonably be expected to result in a Material Adverse Effect.

  • Environment, Health, and Safety 24.4.1. The Supplier and its staff (and/or any sub-supplier and/or subcontractor) shall comply with the laws and regulations in force related to protection of the environment, the health and safety instructions applicable to the Goods and Services performed pursuant to the Contract and especially, if appropriate, to the Goodsand Services performedon any Site by a third company.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

Time is Money Join Law Insider Premium to draft better contracts faster.