Virus Protection, Firewalls and Malicious Software Sample Clauses

Virus Protection, Firewalls and Malicious Software. “Malware”) You are obligated to take security precautions to protect your computer. There are a number of means and mechanisms by which other persons may obtain information from your computer or trick you or other Users in order to gain control of your computer (or any computer used to access your accounts through BOB Advantage). Such unauthorized persons may obtain such access and/or control when you or other individuals use your computer to, among other things, access information on removable or network storage, and/or use the Internet for purposes of sending and receiving emails, browsing various websites, and conducting searches – all things you are likely to do on your computer on a regular basis. Specifically, you may be unwittingly induced to install on your computer malicious software (“malware”), commonly referred to, among other names, as computer viruses, worms, trojan horses, rootkits, backdoors, spyware, and adware, when, for example, you open an email attachment, click on a link in an email, click poisoned links within search results which lead you to other sites controlled by fraudsters, browse websites that have been attacked by viruses, install counterfeit software that appears legitimate but may contain malware, or insert on your computer removable storage devices such as CDs, MP3 players, and other USB memory devices. Once malware is installed on your computer, it is very difficult to detect using traditional antivirus software products running on the infected computer, and financial malware in particular is generally undetectable by all but a few antivirus products and often goes unnoticed until after unauthorized transactions have occurred. We protect our own network and systems with various security protocols, but are under no obligation to determine if your computer (or any computer by which you access BOB Advantage) is secure or if it is or may be compromised or insecure. We encourage you to routinely scan your hardware and software using reliable and current virus, firewall and malware protection products of your choice to protect from, detect and remove any viruses and malware found. We recommend that you access XXX Xxxxxxxxx on a computer dedicated exclusively to performing financial work, such as accessing your accounts at financial institutions, on which only essential security and financial software is installed. If you chose not to dedicate one of your computers exclusively to performing financial work, we especially encourag...
AutoNDA by SimpleDocs

Related to Virus Protection, Firewalls and Malicious Software

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • COMPUTER SOFTWARE The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

Time is Money Join Law Insider Premium to draft better contracts faster.