Common use of Malicious Software Clause in Contracts

Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.

Appears in 33 contracts

Samples: Customer Contract Requirements Atru, Extend Services, Extend Services)

AutoNDA by SimpleDocs

Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3DC#) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.

Appears in 5 contracts

Samples: License Agreement, www.navair.navy.mil, www.navair.navy.mil

Malicious Software. When the Contractor Recipient or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting OfficerAgreements officer. Do not send the malicious software to the Contracting OfficerAgreements officer.

Appears in 2 contracts

Samples: Technology Investment Agreement (Perpetua Resources Corp.), Perpetua Resources Corp.

Malicious Software. When the Contractor Recipient or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Agreements Officer. Do not send the malicious software to the Contracting Agreements Officer.

Appears in 2 contracts

Samples: Technology Investment Agreement, Technology Investment Agreement

AutoNDA by SimpleDocs

Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting OfficerOfficer or Buyer. Do not send the malicious software to the Contracting Officer.

Appears in 1 contract

Samples: Customer Contract Requirements

Time is Money Join Law Insider Premium to draft better contracts faster.