{"component": "definition", "props": {"groups": [{"snippet_links": [{"key": "software-program", "type": "definition", "offset": [10, 26]}, {"key": "other-information", "type": "definition", "offset": [134, 151]}, {"key": "executable-code", "type": "clause", "offset": [153, 168]}, {"key": "application-software", "type": "clause", "offset": [172, 192]}, {"key": "knowledge-of", "type": "definition", "offset": [337, 349]}], "samples": [{"hash": "gavcM2hG4S4", "uri": "/contracts/gavcM2hG4S4#malicious-software", "label": "Contract", "score": 35.9968070984, "published": true}, {"hash": "h0yHMmqc6Du", "uri": "/contracts/h0yHMmqc6Du#malicious-software", "label": "Partner Agreement", "score": 35.7651939392, "published": true}, {"hash": "1N7QmC3Uy76", "uri": "/contracts/1N7QmC3Uy76#malicious-software", "label": "Contract for Services", "score": 35.3629722595, "published": true}], "size": 1193, "snippet": "means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.", "hash": "76e653a9fce6ad36747226eb5113f68b", "id": 1}, {"snippet_links": [{"key": "software-or-firmware", "type": "definition", "offset": [15, 35]}, {"key": "adverse-impact", "type": "clause", "offset": [95, 109]}, {"key": "availability-of", "type": "clause", "offset": [148, 163]}, {"key": "information-system", "type": "clause", "offset": [167, 185]}, {"key": "trojan-horse", "type": "definition", "offset": [227, 239]}], "samples": [{"hash": "JrB6thiygQ", "uri": "/contracts/JrB6thiygQ#malicious-software", "label": "Customer Contract", "score": 35.7439117432, "published": true}, {"hash": "88e98gP1Lr", "uri": "/contracts/88e98gP1Lr#malicious-software", "label": "Customer Contract", "score": 35.6815490723, "published": true}, {"hash": "9WV8V7uaDvy", "uri": "/contracts/9WV8V7uaDvy#malicious-software", "label": "Other Transaction Agreement", "score": 35.4151649475, "published": true}], "size": 543, "snippet": "means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. This definition includes a virus, worm, Trojan horse, or other code-based entity that infects a host, as well as spyware and some forms of adware.", "hash": "811db8dd556e670628e8b63232fd5dca", "id": 2}, {"snippet_links": [{"key": "software-or-firmware", "type": "definition", "offset": [15, 35]}, {"key": "adverse-impact", "type": "clause", "offset": [95, 109]}, {"key": "availability-of", "type": "clause", "offset": [148, 163]}, {"key": "trojan-horse", "type": "definition", "offset": [227, 239]}, {"key": "not-limited", "type": "clause", "offset": [401, 412]}, {"key": "magnetic-tapes", "type": "definition", "offset": [417, 431]}, {"key": "covered-defense-information", "type": "definition", "offset": [527, 554]}, {"key": "covered-contractor-information-system", "type": "definition", "offset": [596, 633]}, {"key": "operationally-critical-support", "type": "definition", "offset": [635, 665]}, {"key": "by-the-government", "type": "clause", "offset": [704, 721]}, {"key": "intermodal-transportation-services", "type": "clause", "offset": [756, 790]}, {"key": "logistical-support", "type": "clause", "offset": [795, 813]}, {"key": "armed-forces", "type": "clause", "offset": [887, 899]}, {"key": "contingency-operation", "type": "definition", "offset": [905, 926]}, {"key": "rapidly-report", "type": "definition", "offset": [928, 942]}, {"key": "hours-of", "type": "clause", "offset": [959, 967]}, {"key": "discovery-of", "type": "clause", "offset": [968, 980]}, {"key": "cyber-incident", "type": "definition", "offset": [985, 999]}, {"key": "technical-information", "type": "clause", "offset": [1001, 1022]}, {"key": "those-terms", "type": "clause", "offset": [1069, 1080]}, {"key": "rights-in-technical-data", "type": "clause", "offset": [1130, 1154]}, {"key": "examples-of", "type": "definition", "offset": [1267, 1278]}, {"key": "engineering-data", "type": "clause", "offset": [1322, 1338]}, {"key": "engineering-drawings", "type": "definition", "offset": [1340, 1360]}, {"key": "technical-reports", "type": "definition", "offset": [1436, 1453]}, {"key": "technical-orders", "type": "clause", "offset": [1455, 1471]}, {"key": "data-sets", "type": "definition", "offset": [1503, 1512]}, {"key": "studies-and-analyses", "type": "clause", "offset": [1514, 1534]}, {"key": "related-information", "type": "definition", "offset": [1539, 1558]}, {"key": "executable-code", "type": "clause", "offset": [1582, 1597]}, {"key": "source-code", "type": "definition", "offset": [1602, 1613]}], "samples": [{"hash": "dfsHhbyNNdn", "uri": "/contracts/dfsHhbyNNdn#malicious-software", "label": "Contract", "score": 33.5809402466, "published": true}, {"hash": "jL6BhJL3OT5", "uri": "/contracts/jL6BhJL3OT5#malicious-software", "label": "Solicitation, Offer and Award", "score": 33.0827407837, "published": true}, {"hash": "fxB1OxvXvxZ", "uri": "/contracts/fxB1OxvXvxZ#malicious-software", "label": "Solicitation, Offer and Award", "score": 32.8418502808, "published": true}], "size": 66, "snippet": "means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. This definition includes a virus, worm, Trojan horse, or other code-based entity that infects a host, as well as spyware and some forms of adware. Media means physical devices or writing surfaces including, but is not limited to, magnetic tapes, optical disks, magnetic disks, large-scale integration memory chips, and printouts onto which covered defense information is recorded, stored, or printed within a covered contractor information system. Operationally critical support means supplies or services designated by the Government as critical for airlift, sealift, intermodal transportation services, or logistical support that is essential to the mobilization, deployment, or sustainment of the Armed Forces in a contingency operation. Rapidly report means within 72 hours of discovery of any cyber incident. Technical information means technical data or computer software, as those terms are defined in the clause at DFARS 252.227-7013, Rights in Technical Data--Noncommercial Items, regardless of whether or not the clause is incorporated in this solicitation or contract. Examples of technical information include research and engineering data, engineering drawings, and associated lists, specifications, standards, process sheets, manuals, technical reports, technical orders, catalog-item identifications, data sets, studies and analyses and related information, and computer software executable code and source code.", "hash": "db7537826c33a75aa748f7d52e8aba8e", "id": 3}, {"snippet_links": [{"key": "software-program", "type": "definition", "offset": [10, 26]}, {"key": "disabling-devices", "type": "clause", "offset": [56, 73]}, {"key": "back-door", "type": "definition", "offset": [102, 111]}, {"key": "effect-of", "type": "definition", "offset": [208, 217]}, {"key": "adversely-affecting", "type": "definition", "offset": [248, 267]}, {"key": "access-to", "type": "definition", "offset": [306, 315]}, {"key": "other-information", "type": "definition", "offset": [391, 408]}, {"key": "executable-code", "type": "clause", "offset": [410, 425]}, {"key": "application-software", "type": "clause", "offset": [429, 449]}, {"key": "knowledge-of", "type": "definition", "offset": [580, 592]}], "samples": [{"hash": "hF6WJ3ZUKDr", "uri": "/contracts/hF6WJ3ZUKDr#malicious-software", "label": "Lme Market Data Licence", "score": 33.9342651367, "published": true}, {"hash": "bacMkLBRKVr", "uri": "/contracts/bacMkLBRKVr#malicious-software", "label": "Market Data Licence", "score": 33.5691108704, "published": true}, {"hash": "jH10WPMqIAy", "uri": "/contracts/jH10WPMqIAy#malicious-software", "label": "Market Data Licence", "score": 33.4482498169, "published": true}], "size": 42, "snippet": "means any software program or virus (including malware, disabling devices, trojan horses, time bombs, back door devices or other code) that is harmful, destructive, debilitating or disabling or which has the effect of destroying, interfering with, adversely affecting, corrupting, or enabling unauthorised access to, or causing or assisting other undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the same is introduced wilfully, negligently or without knowledge of its existence;", "hash": "86a24b27554a2943d06ecde803083b30", "id": 4}, {"snippet_links": [{"key": "software-program", "type": "definition", "offset": [10, 26]}, {"key": "other-information", "type": "definition", "offset": [134, 151]}, {"key": "executable-code", "type": "clause", "offset": [153, 168]}, {"key": "application-software", "type": "clause", "offset": [172, 192]}, {"key": "knowledge-of", "type": "definition", "offset": [337, 349]}], "samples": [{"hash": "hSRgSS2xUqy", "uri": "/contracts/hSRgSS2xUqy#malicious-software", "label": "Framework Agreement", "score": 31.3362998962, "published": true}, {"hash": "dypbPPyBARj", "uri": "/contracts/dypbPPyBARj#malicious-software", "label": "Framework Agreement", "score": 24.3661880493, "published": true}, {"hash": "lHS96FaxSsy", "uri": "https://data.gov.uk/data/contracts-finder-archive/download/784238/68aff266-6b11-44a2-84f4-81149922fd4a", "label": "Note", "score": 12.4305267334, "published": false}], "size": 42, "snippet": "means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence", "hash": "0c40c3bdb9022a619eb4eefb20e2236d", "id": 5}, {"snippet_links": [{"key": "harmful-software", "type": "clause", "offset": [76, 92]}], "samples": [{"hash": "fkFdKctrsLd", "uri": "/contracts/fkFdKctrsLd#malicious-software", "label": "Service Agreement", "score": 36.0584335327, "published": true}, {"hash": "lu1oKiaZcp2", "uri": "/contracts/lu1oKiaZcp2#malicious-software", "label": "Master Subscription Agreement", "score": 35.4697570801, "published": true}, {"hash": "gN6bh8BVRnL", "uri": "/contracts/gN6bh8BVRnL#malicious-software", "label": "Main Services Agreement", "score": 35.1275558472, "published": true}], "size": 40, "snippet": "means any viruses, malware, Trojan horses, time bombs, or any other similar harmful software.", "hash": "2ba6cd32f1ca670c8e83e5a71957cce0", "id": 6}, {"snippet_links": [{"key": "software-or-firmware", "type": "definition", "offset": [15, 35]}, {"key": "adverse-impact", "type": "clause", "offset": [95, 109]}, {"key": "availability-of", "type": "clause", "offset": [148, 163]}, {"key": "information-system", "type": "clause", "offset": [167, 185]}], "samples": [{"hash": "ecXuZqtHlrM", "uri": "https://imlive.s3.amazonaws.com/Federal%20Government/ID184249301810636670853614436847958002109/SP4702-20-Q-0016.pdf", "label": "Contract", "score": 19.368188858, "published": false}, {"hash": "4yrqrWsFFYP", "uri": "https://cacicontracts.caci.com/Contracts/NAVSEA/pdf/N0016417F3007P00028FINAL.pdf", "label": "Amendment", "score": 14.173169136, "published": false}, {"hash": "phXXePCQzF", "uri": "https://www.boeingsuppliers.com/idscommon/ccr/2/2018-687-004-CCR-3-24-20_V2.pdf", "label": "Customer Contract", "score": 14.1129360199, "published": false}], "size": 27, "snippet": "means computer software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system.", "hash": "e82013698397ce4231efbecc29fa1b3a", "id": 7}, {"snippet_links": [{"key": "software-program", "type": "definition", "offset": [10, 26]}], "samples": [{"hash": "7DVNJtphZQZ", "uri": "/contracts/7DVNJtphZQZ#malicious-software", "label": "Courier Services Agreement", "score": 23.4613285065, "published": true}, {"hash": "3JRZoHr5i2J", "uri": "/contracts/3JRZoHr5i2J#malicious-software", "label": "Order Form and Call Off Terms", "score": 23.0396995544, "published": true}, {"hash": "fFrhPPqVqcE", "uri": "/contracts/fFrhPPqVqcE#malicious-software", "label": "Order Form and Call Off Terms", "score": 22.9931545258, "published": true}], "size": 21, "snippet": "means any software program or code intended to destroy,", "hash": "f325d196d05517b20858513ee93cfbe9", "id": 8}, {"snippet_links": [{"key": "software-program", "type": "definition", "offset": [4, 20]}, {"key": "other-information", "type": "definition", "offset": [128, 145]}, {"key": "executable-code", "type": "clause", "offset": [147, 162]}, {"key": "application-software", "type": "clause", "offset": [166, 186]}, {"key": "knowledge-of", "type": "definition", "offset": [331, 343]}, {"key": "calendar-month", "type": "definition", "offset": [367, 381]}], "samples": [{"hash": "21QpjZfzQZG", "uri": "/contracts/21QpjZfzQZG#malicious-software", "label": "Framework Agreement", "score": 32.4292411804, "published": true}, {"hash": "eAtdlqISdeU", "uri": "/contracts/eAtdlqISdeU#malicious-software", "label": "Framework Agreement", "score": 32.4259147644, "published": true}, {"hash": "avJGhDw0Wcd", "uri": "/contracts/avJGhDw0Wcd#malicious-software", "label": "Framework Agreement", "score": 32.4259147644, "published": true}], "size": 11, "snippet": "any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence. \u201cMonth\u201d calendar month.", "hash": "ac0dcdc8f5970d170f1ef13b45974257", "id": 9}, {"snippet_links": [{"key": "the-performance", "type": "clause", "offset": [83, 98]}, {"key": "ict-infrastructure", "type": "definition", "offset": [114, 132]}, {"key": "information-without", "type": "clause", "offset": [188, 207]}, {"key": "authority-of-the-state", "type": "clause", "offset": [212, 234]}], "samples": [{"hash": "eEpfrz4RHR0", "uri": "/contracts/eEpfrz4RHR0#malicious-software", "label": "Panel Agreement", "score": 30.6848068237, "published": true}, {"hash": "e548cTgkUjv", "uri": "/contracts/e548cTgkUjv#malicious-software", "label": "Low Risk Ict Projects Agreement", "score": 30.6848068237, "published": true}, {"hash": "gwJ5UpOr01M", "uri": "/contracts/gwJ5UpOr01M#malicious-software", "label": "Panel Agreement", "score": 27.4109153748, "published": true}], "size": 11, "snippet": "means software designed or intended to cause harm either by damaging or disrupting the performance of the State\u2019s ICT Infrastructure or Customers\u2019 ICT Infrastructure or by transmission of information without the authority of the State or a Customer;", "hash": "e173362846032079dffdbb74a671342a", "id": 10}], "next_curs": "Cl8SWWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjsLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIbbWFsaWNpb3VzLXNvZnR3YXJlIzAwMDAwMDBhDKIBAmVuGAAgAA==", "definition": {"title": "Malicious Software", "size": 2128, "snippet": "means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.", "id": "malicious-software", "examples": ["When the PSAH or subcontractors discover and isolate <strong>Malicious Software</strong> in connection with a reported Cyber Incident, submit the <strong>Malicious Software</strong> to DoD Cyber Crime Center (DC3) at this website: \u2587\u2587\u2587\u2587\u2587://\u2587\u2587\u2587.\u2587\u2587\u2587.\u2587\u2587\u2587/ or in accordance with additional instructions provided by DC3 or the AO or the AOR."], "related": [["licensed-software", "Licensed Software", "Licensed Software"], ["hosted-software", "Hosted Software", "Hosted Software"], ["custom-software", "Custom Software", "Custom Software"], ["sap-software", "SAP Software", "SAP Software"], ["oracle-software", "Oracle Software", "Oracle Software"]], "related_snippets": [], "updated": "2026-02-25T05:25:33+00:00"}, "json": true, "cursor": ""}}