Malicious Software Sample Clauses

Malicious Software. 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.
AutoNDA by SimpleDocs
Malicious Software. 43.1 The Supplier shall, as an enduring obligation throughout the Term and for a period of twelve (12) Months after expiry of the Term, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT Environment (or as otherwise agreed between the Parties).
Malicious Software. The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.
Malicious Software. 42.1The Supplier shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT Environment (or as otherwise agreed between the Parties).
Malicious Software. Each Participant shall ensure that it employs security controls that meet applicable industry or Federal standards so that the information and Message Content being Transacted and any method of Transacting such information and Message Content will not introduce any viruses, worms, unauthorized cookies, trojans, malicious software, “malware,” or other program, routine, subroutine, or data designed to disrupt the proper operation of a System or any part thereof or any hardware or software used by a Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause a System or any part thereof or any hardware, software or data used by a Participant in connection therewith, to be improperly accessed, destroyed, damaged, or otherwise made inoperable. In the absence of applicable industry standards, each Participant shall use all commercially reasonable efforts to comply with the requirements of this Section.
Malicious Software. Please provide details of the anti-virus software you use and how regularly you update it.
AutoNDA by SimpleDocs
Malicious Software. The Contractor shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment. Notwithstanding this clause, if Malicious Software is found, the parties shall co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Authority Data, assist each other to mitigate any losses and to restore the Services to their desired operating efficiency. Any cost arising out of the actions of the parties taken in compliance with the provisions of this clause shall be borne by the parties as follows: by the Contractor where the Malicious Software originates from the Contractor Software, the Third Party Software or the Authority Data (whilst the Authority Data was under the control of the Contractor); and by the Authority if the Malicious Software originates from the Authority Software or the Authority Data (whilst the Authority Data was under the control of the Authority).
Malicious Software. The Supplier shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT Environment (or as otherwise agreed between the Parties). Notwithstanding Clause 43.1, if Malicious Software is found, the Parties shall co operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Customer Data, assist each other to mitigate any losses and to restore the Services to their desired operating efficiency. Any cost arising out of the actions of the Parties taken in compliance with the provisions of Clause 43 shall be borne by the Parties as follows: by the Supplier, where the Malicious Software originates from the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body when provided to the Supplier; and by the Contracting Body if the Malicious Software originates from the Contracting Body’s Software or the Customer Data (whilst the Customer Data was under the control of the Contracting Body).
Malicious Software. 8.8. The Contractor shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the Authority‟s and the Contractor‟s ICT systems.
Time is Money Join Law Insider Premium to draft better contracts faster.