Viruses and Malware Sample Clauses

Viruses and Malware. The Software Services, Work Product, and to the extent applicable the Services, will not contain any security defect, including any malware, vulnerability, virus or any mechanism, including any worm, lock, drop-dead device, Trojan horse routine, trap door, time bomb, or any similar code or instruction that will (a) delete, disable, interfere with, or otherwise harm the software (or Company’s hardware, data, or other programs or products); or (b) make the Software Services, Work Product, or Company Data or systems inaccessible to Company; or (c) permit any third party to access Company’s data or systems or take any of the actions described in subsections (a) or (b) of this Section 4 (Viruses and Malware).
AutoNDA by SimpleDocs
Viruses and Malware. XX-Xxxxx.xxx does not represent or warrant that software, content or materials on the Website, or any Third Party Applications, Software, or Content are accurate, complete, reliable, current or error-free or that the Website, its servers, or any Third Party Applications, Software or Content are free of viruses or other harmful components. Therefore, you should exercise caution in the use and downloading of any such software, content or materials and use industry-recognized software to detect and disinfect viruses.
Viruses and Malware. 1. All externally supplied removable storage media, computer-readable files, software programs, databases, word processing documents, and spreadsheets shall be subjected to a virus checking process.
Viruses and Malware. Licensee agrees to use, and ensure that their users and systems, care and diligence to avoid introducing any software virus or other contaminant (including any adware, bugs, cracks, worms, logic bombs, trojan horses or any other self-propagating or other such program) that may infect or cause damage to the Software, the Services, or the Licensor's systems, or otherwise disrupt the Licensor's Service or operations.

Related to Viruses and Malware

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Latent Defects Notwithstanding anything to the contrary set forth herein, no acceptance, or deemed acceptance, by City pursuant to this Section shall be applicable with respect to any Latent Defects. An acceptance, or deemed acceptance, by City pursuant to this Section shall not mean that City has accepted, or the other party has been relieved of, responsibility for: (i) compliance with the Laws; (ii) the proper application of construction means or methods; or (iii) correcting any portion of the Project if it later is determined that any portion of the Project is inconsistent with the Final Documents and Drawings.

  • Fungible Goods and Materials For purposes of determining whether a good is an originating good:

  • The Software The End User shall be granted to receive one copy of the Software and the Documentation and to load, install and properly use the Software for the maximum number of servers and users or workflows determined in the Form of Agreement and under the terms and conditions of this XXXX and the ELP. The Form of Agreement contains specific conditions valid for the agreement between the Licensor and the End User for the specific license. References to this XXXX within the present document include the reference to the Form of Agreement concluded with the End User. The Software Licenses defined, described in this document give the rights solely for the Eventus software and no other software or hardware or any other kind of components, unless otherwise stated.

Time is Money Join Law Insider Premium to draft better contracts faster.