Viruses from your System Sample Clauses

Viruses from your System. You will ensure that no computer viruses, worms, software bombs or similar items are introduced into our computer system or network and will indemnify us on demand for any loss that we suffer arising as a result of any such introduction.
AutoNDA by SimpleDocs
Viruses from your System. You will ensure that no computer viruses, worms, software bombs, or similar items are introduced into our computer system or network and will indemnify us on demand for any loss that we suffer arising as a result of any such introduction. o UNAUTHORISED USE We shall not be liable for any loss, liability or cost whatsoever arising from any unauthorized use of the Electronic Service. You shall on demand indemnify, protect and hold us harmless from and against all losses, liabilities, judgments, suits, actions, proceedings, claims, damages and costs resulting from or arising out of any act or omission by any person using an Electronic Service by using your designated passwords, whether or not you authorized such use.
Viruses from your System. You will ensure that no computer viruses, worms, software bombs or similar items are introduced into our Educational Training Platform or network and will indemnify us on demand for any loss that we suffer arising as a result of any such introduction.
Viruses from your System. You must ensure that no computer viruses, worms, software bombs or similar items are introduced into our computer system or network and will indemnify Trademax Global Limited VFSC: 40356 Client Agreement us on demand for any loss, damage or cost that we suffer arising as a result of any such introduction.

Related to Viruses from your System

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing CSTC traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to CSTC, the subtending arrangements between CSTC Tandem Switches and CSTC End Office Switches shall be the same as the Tandem/End Office subtending arrangements that CSTC maintains for the routing of its own or other carriers’ traffic.

  • Virus detection You will be responsible for the installation and proper use of any virus detection/scanning program we require from time to time.

  • Malware Seller shall (consistent with the following sentence) ensure that no malware or similar items are coded or introduced into any aspect of the Facility, Interconnection Facilities, the Company Systems interfacing with the Facility and Interconnection Facilities, and any of Seller's critical control systems or processes used by Seller to provide energy, including the information, data and other materials delivered by or on behalf of Seller to Company, (collectively, the "Environment"). Seller will continue to review, analyze and implement improvements to and upgrades of its Malware prevention and correction programs and processes that are commercially reasonable and consistent with the then current technology industry's standards and, in any case, not less robust than the programs and processes implemented by Seller with respect to its own information systems. If Malware is found to have been introduced into the Environment, Seller will promptly notify Company and Seller shall take immediate action to eliminate and remediate the effects of the Malware, at Seller's expense. Seller shall not modify or otherwise take corrective action with respect to the Company Systems except at Company's request. Seller will promptly report to Company the nature and status of all Malware elimination and remediation efforts.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Virus any thing or device (including any software, code, file or programme) which may: prevent, impair or otherwise adversely affect the operation of any computer software, hardware or network, any telecommunications service, equipment or network or any other service or device; prevent, impair or otherwise adversely affect access to or the operation of any programme or data, including the reliability of any programme or data (whether by re-arranging, altering or erasing the programme or data in whole or part or otherwise); or adversely affect the user experience, including worms, trojan horses, viruses and other similar things or devices.

  • INTERNET-BASED SERVICES Microsoft provides Internet-based services with the software. It may change or cancel them at any time.

Time is Money Join Law Insider Premium to draft better contracts faster.