Software Integrity Clause Samples

The Software Integrity clause establishes requirements to ensure that the software provided is free from unauthorized code, malware, or vulnerabilities that could compromise its operation or security. Typically, this clause obligates the software provider to implement industry-standard security measures, conduct regular testing, and promptly address any discovered issues. Its core practical function is to protect users and organizations from risks associated with compromised or defective software, thereby maintaining trust and reducing potential liability.
POPULAR SAMPLE Copied 1 times
Software Integrity. The Contractor must ensure the integrity of installed software by ensuring they are regularly checking for all viruses, worms, Trojan horses, and other malicious software and eradicating them in a timely manner.
Software Integrity. The installed base of software on each Host is and will be kept as small as possible by Synacor. Software packages that have been deemed unnecessary or redundant have been eliminated so as to minimize the potential number of access points on any given Server. Only necessary software packages will be used by Synacor on a going-forward basis. When an advisory for installed software is released from sources including CERT, SecurityFocus/BugTraq, and Synacor vendors, Synacor will immediately perform an evaluation of the relative risk. Highest priority (e.g., Priority 1) will be given where a known exploit is published that affects services accessible to public networks. Depending on the nature of the advisory, a given service may be further restricted or shut down as Synacor prepares an update. The time frames between an advisory, triage, testing and patching will differ, as appropriate, based on the severity of the advisory. A critical patch will be applied by Synacor as soon as it has been staged and tested, and will receive the highest level of attention from Synacor staff; Client will be notified either while the patch is being evaluated, or as soon afterward as possible, when relevant to Client’s or the User’s service. Non-critical patches will be applied by Synacor as part of the Maintenance Window; however, to prevent potential security breaches, Synacor may not reveal all details (other than affected services) to Client or User until after the patch has been applied. With few exceptions, such as a fundamental design issue that necessitates changes that cannot be easily ported to installed versions, Synacor will apply any updates related to security to the existing version of the software, even if the fix is released by an upstream source in new release. Such process will be followed in order to avoid ancillary changes that may result in undesired behavior or even new security risks. Regardless of source, Synacor will test any updates independently for suitability before general deployment, in order to test both the correctness of the fix itself as well as its general functionality. Synacor will expedite such review process in the case of a serious risk. Such review process will involve the following steps: apply patch, build package, install on a test host, review by Synacor’s QA and System Administration personnel with an attempt to run any known exploit if one exists, install on a pilot machine, review again, and general deployment.
Software Integrity. If the licensed content can be delivered to a device which has any outputs (either digital or analogue), the Content Protection System must ensure that the hardware and software (e.g. device drivers) providing output functionality has not been tampered with or replaced with non-compliant versions. Digital Outputs. If the licensed content can be delivered to a device which has digital outputs, the Content Protection System shall prohibit digital output of decrypted protected content. Notwithstanding the foregoing, a digital signal may be output if it is protected and encrypted by High-Bandwidth Digital Copy Protection (“HDCP”) or Digital Transmission Copy Protection (“DTCP”). Exception Clause for Standard Definition, Uncompressed Digital Outputs on Windows-based PCs and Macs running OS X or higher). HDCP must be enabled on all uncompressed digital outputs (e.g. HDMI, Display Port), unless the customer’s system cannot support HDCP (e.g., the content would not be viewable on such customer’s system if HDCP were to be applied) Upscaling: Device may scale Included Programs in order to fill the screen of the applicable display; provided that Licensee’s marketing of the Device shall not state or imply to consumers that the quality of the display of any such upscaled content is substantially similar to a higher resolution to the Included Program’s original source profile (i.e. SD content cannot be represented as HD content).
Software Integrity. GCH provides technical support of the software enabling the GIN Service. This includes fixing any bugs and updating the software in response to requests made by users. Updates/repairs will be immediately available to [AGENCY].
Software Integrity. C OSI represents and warrants that no component of the New ALICOMP Software or the COSI Software shall include any feature or function which may enable COSI to: (i) discontinue at any time during the term of this Agreement or thereafter ALICOMP's effective use of the same; (ii) erase, destroy, corrupt, or modify without the consent of ALICOMP of any ALICOMP Data or other date stored on Computer Equipment used by ALICOMP; or (iii) bypass any internal or external software security measure without the consent or knowledge of ALICOMP to obtain access to such ALICOMP Data or other data. COSI ▇▇▇▇ ▇▇▇▇ 15 advise ALICOMP if it learns that a third party may accomplish any of the foregoing
Software Integrity. Software Package Development
Software Integrity. Not to nor to attempt to copy or emulate the System or software in whole or in part and not to cause any third party to do so.

Related to Software Integrity

  • Software The Software is licensed to you subject to any terms and conditions presented when you downloaded it from a source authorized by NCR Voyix, as well as those contained in this Agreement. If there is a conflict, this Agreement will control. You are licensed to use the Software only with the Service and with Hardware purchased or subscribed from NCR Voyix or its Resellers. Your license to any Software will end when your subscription to the Service ends. The Software is copyrighted and licensed, not sold, and is NCR Voyix’s confidential and unpublished information. You will retain any copyright notices and proprietary legends on all copies of the Software and the media on which it is delivered. Any attempt to transfer the Software is void and will automatically cause your license to end.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • Software Installation The AGENCY shall request approval in writing from the COUNTY prior to installation of any software on COUNTY computer equipment. All software installations must be supervised by COUNTY technical support staff and proof of licensing is required. Upon completion, the AGENCY is responsible for reconfiguring the computers back to the original state.

  • Hardware and Software In order to use the Services, you must obtain and maintain, at your expense, compatible mobile hardware and software as specified by Credit Union from time to time. Credit Union is not responsible for any third party software you may need to use the Services. Any such software is accepted by you as is and is subject to the terms and conditions of the software agreement you enter into directly with the third party software provider at time of download and installation.