Malicious Software definition

Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.
Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence;
Malicious Software means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. This definition includes a virus, worm, Trojan horse, or other code-based entity that infects a host, as well as spyware and some forms of adware. Media means physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which covered defense information is recorded, stored, or printed within a covered contractor information system. Operationally critical support means supplies or services designated by the Government as critical for airlift, sealift, intermodal transportation services, or logistical support that is essential to the mobilization, deployment, or sustainment of the Armed Forces in a contingency operation. Rapidly report means within 72 hours of discovery of any cyber incident. Technical information means technical data or computer software, as those terms are defined in the clause at DFARS 252.227-7013, Rights in Technical Data--Noncommercial Items, regardless of whether or not the clause is incorporated in this solicitation or contract. Examples of technical information include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code.

Examples of Malicious Software in a sentence

  • E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.

  • The Contractor shall check for and delete Malicious Software and if Malicious Software is found, the parties shall co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Council Data, assist each other to mitigate any losses and to restore the Services to their desired operating efficiency.

  • E13.1 The Contractor shall ensure anti-virus software is updated as frequently as is necessary in order to provide protection against the latest threats and delete Malicious Software from the ICT Environment.

  • For this reason, Leaseweb has established information security requirements for all Leaseweb Services, including standards for the basic configuration of Infrastructure, the use of Authentication Details and the use of effective Malicious Software detection and prevention.

  • Customer is advised (i) to back-up (critical) data and system configurations on a regular basis and store such data in a safe place, and (ii) not to connect its Infrastructure via a wireless connection, (iii) to keep the Software operated or used on the Infrastructure up to date, and accordingly to install updates and patches on a regular basis without undue delay after becoming available, (iv) to operate and/or use adequate measures against Malicious Software on the Infrastructure.


More Definitions of Malicious Software

Malicious Software means any software program or virus (including malware, disabling devices, trojan horses, time bombs, back door devices or other code) that is harmful, destructive, debilitating or disabling or which has the effect of destroying, interfering with, adversely affecting, corrupting, or enabling unauthorised access to, or causing or assisting other undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the same is introduced wilfully, negligently or without knowledge of its existence;
Malicious Software means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
Malicious Software means any viruses, malware, Trojan horses, time bombs, or any other similar harmful software.
Malicious Software means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. This definition includes a virus, worm, Trojan horse, or other code- based entity that infects a host, as well as spyware and some forms of adware.
Malicious Software means software designed or intended to cause harm either by damaging or disrupting the performance of the State’s ICT Infrastructure or Customers’ ICT Infrastructure or by transmission of information without the authority of the State or a Customer;
Malicious Software means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. This definition includes a virus, worm, Trojan
Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence; Man Day means 8 Man Hours, whether or not such hours are worked consecutively and whether or not they are worked on the same day;