Suspect Code definition

Suspect Code means any code or set of instructions that contains malicious functionality or serious vulnerabilities, including spyware, malware and other code that installs without the user's consent and/or resists its own removal, and code that can be exploited in ways not intended by its designers to compromise the trustworthiness of the computing environment on which it executes.
Suspect Code means code that contains malicious functionality or serious vulnerabilities, including spyware, malware, and other code that installs without the user’s consent and/or resists its own removal, and code that can be exploited in ways not intended by its designers to compromise the trustworthiness of the platforms on which it executes.

Examples of Suspect Code in a sentence

  • To promptly cease using a Certificate and its associated Private Key and promptly request that the CA revoke the Certificate if the Subscriber believes that (a) any information in the Certificate is, or becomes, incorrect or inaccurate,(b) the Private Key associated with the Public Key contained in the Certificate was misused or compromised, or (c) there is evidence that the Certificate was used to sign Suspect Code.

  • To use the Certificate and associated Private Key only for authorized and legal purposes, including not using the Certificate to sign Suspect Code and to use the Certificate and Private Key solely in compliance with all applicable laws and solely in accordance with the Subscriber Agreement or Terms of Use.

  • The CA SHOULD indicate whether its investigation found that the Suspect Code was a false positive or an inadvertent signing.

  • The CA MUST contractually obligate each Signing Service to inform the CA if the Signing Service becomes aware (by whatever means) that the Signing Service has signed Suspect Code.

  • A CA revoking a Certificate because the Certificate was associated with signed Suspect Code or other fraudulent or illegal conduct SHOULD provide all relevant information and risk indicators to other CAs or industry groups.

  • In addition to the procedures required by BR Section 4.2.1, prior to issuing a Code Signing Certificate, each CA SHOULD check at least one database containing information about known or suspected producers, publishers, or distributors of Suspect Code, as identified or indicated by an Anti-Malware Organization and any database of deceptive names maintained by an Application Software Provider.

  • CAs MUST not issue new or replacement Code Signing Certificates to an entity that the CA determined intentionally signed Suspect Code.

  • End Site to Core Network Connections – the WAN link(s) between local End Sites and its regional POP or NAP.

  • The CA MUST maintain a continuous 24x7 ability to communicate with Anti-Malware Organizations, Application Software Suppliers, and law enforcement agencies and respond to high- priority Certificate Problem Reports, such as reports requesting revocation of Certificates used to sign malicious code, fraud, or other illegal conduct.The CA MUST acknowledge receipt of plausible notices about Suspect Code signed with a certificate issued by the CA or a Subordinate CA.

  • For code signing Certificates, Customer will promptly cease using a Certificate and its associated Private Key and promptly request revocation of the Certificate if Customer believes that (a) any information in the Certificate is, or becomes, incorrect or inaccurate, (b) the Private Key associated with the Public Key contained in the Certificate was misused or compromised, or (c) there is evidence that the Certificate was used to sign Suspect Code.

Related to Suspect Code

  • Source Code for a work means the preferred form of the work for making modifications to it. “Object code” means any non-source form of a work.

  • Licensed Material means the artistic or literary work, database, or other material to which the Licensor applied this Public License.

  • Licensed Materials means any materials that Executive utilizes for the benefit of the Company (or any Subsidiary thereof), or delivers to the Company or the Company’s Customers, which (a) do not constitute Work Product, (b) are created by Executive or of which Executive is otherwise in lawful possession and (c) Executive may lawfully utilize for the benefit of, or distribute to, the Company or the Company’s Customers.

  • Third Party Data has the meaning set forth in Section 9.3(a).

  • IPR means all patents, utility models, identification marks including trade marks, trade names, service marks, domain names, rights to prevent passing off, registered designs, design rights, copyrights, database rights, topography rights, confidential information for any of the aforementioned (including data, know-how and formulations) and any applications for any of the aforementioned and any similar right recognised from time to time with all rights of action for infringement in all countries in the world, together with all renewals and extensions

  • APIs means SAP application programming interface and accompanying or related Documentation, source code, tools, executable applications, libraries, subroutines, widgets and other materials made available by SAP or through SAP tools or SAP Software Development Kit (and all derivative works or modifications thereof) to Provider that allow Provider to integrate the Provider Service with the Cloud Service, including any access code, authentication keys or similar mechanisms to enable access of the APIs.

  • Firmware means software sold or licensed only in conjunction with machines, designed for execution only on a machine with which it is provided, designed only for machines other than a dedicated computer, and embedded into or installed on the machine by the machine’s manufacturer or seller.

  • Specified Materials means the basic materials required on the Site for the execution and completion of Works, which shall include fuel and lubricants; cement; aggregates; steel reinforcement; timber and gravel.

  • Third Party Software means software which is proprietary to any third party (other than an Affiliate of the Contractor) which is or will be used by the Contractor for the purposes of providing the Services.

  • Customer Materials any materials, data, information, software, equipment or other resources owned by or licensed to You and made available to Us pursuant to facilitating Your use of the Services, including Customer Data.