1by the Supplier. where the Malicious Software originates from the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body when provided to the Supplier; and
Appears in 11 contracts
Samples: Government Courier Services Framework Agreement, Framework Agreement, Framework Agreement
1by the Supplier. where the Malicious Software originates from the Supplier Software or the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body Customer when provided to the Supplier; and
Appears in 7 contracts
Samples: Order Form and Call Off Terms, Order Form and Call Off Terms, Framework Agreement
1by the Supplier. where the Malicious Software originates from the Supplier Software, the Specially Written Software or the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body Customer when provided to the Supplier; and
Appears in 3 contracts
Samples: Call Off Contract, Call Off Contract, Call Off Contract
1by the Supplier. where the Malicious Software originates from or via the Supplier (or any of it’s Sub-Contractors) or the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Contracting Body Customer when provided to the Supplier; and
23.3.1. 2by the Customer if the Malicious Software originates from the Customer Software or the Customer Data (whilst the Customer Data was under the control of the Customer).
Appears in 1 contract
Samples: Order Form and Call Off Terms