Anti-Malware Protections Sample Clauses

Anti-Malware Protections. The Vendor’s data center shall have strong access controls and secure practices, such as specialized authorization system(s), in effect at all times to prevent unauthorized physical and virtual access to hosted County systems. Vendor servers and network equipment hosted at the data center shall be properly secured from the threat of cyber hackers and viruses through appropriate intrusion detection tools, proactive 24x7x365 monitoring and prompt installation of new Software updates, hot fixes and security patches. Vendor shall use industry best practices regularly to identify, screen, and prevent any Disabling Device in resources utilized by Vendor in connection with the provision or receipt of the Services and shall not itself knowingly or intentionally install (and shall prevent its Subcontractors from knowingly and intentionally installing) any Disabling Device in resources utilized by Vendor, the County, or any Subcontractor, in connection with the provision or receipt of the Services. A “Disabling Device” is a virus, timer, clock, counter, time lock, time bomb, or other limiting design, instruction, or routine that would purposely and inappropriately erase data or programming or cause any resource to become inoperable or otherwise incapable of being used in the full manner for which such resource was intended to be used, and any device that may be used as a host to access County Data or launch attacks on the Software Products. Vendor shall assist the County in reducing and mitigating the effects of any Disabling Device discovered in any resource related to the provision or receipt of the Services, especially if such Disabling Device is causing a loss of operating efficiency or data. Timers, clocks, counters, and time locks included as part of any Commercial Software, used by the County, by the manufacturer of that Software shall not be considered Disabling Devices for purposes of this Paragraph.
AutoNDA by SimpleDocs
Anti-Malware Protections. Contractor’s data center shall have strong access controls and secure practices, such as specialized authorization system(s), in effect at all times to prevent unauthorized physical and virtual access to hosted County Data. Contractor servers and network equipment hosted at its data center shall be properly secured from the threat of cyber hackers and viruses through appropriate intrusion detection tools, proactive 24x7x365 monitoring and prompt installation of new software updates, hot fixes and security patches. Orange County Information Technology Page 40 of 122 Redline_MA-017-18010489 AssetWorks, LLC Folder No.:C003855 Computerized Maintenance Management System Contractor shall use industry standard practices regularly to identify, screen, and prevent any Disabling Device in resources utilized by Contractor in connection with the provision or receipt of the Services and shall not itself knowingly or intentionally install (and shall prevent its subcontractors from knowingly and intentionally installing) any Disabling Device in resources utilized by Contractor, County, or any subcontractor, in connection with the provision or receipt of the Services. A “Disabling Device” is a computer virus, timer, clock, counter, time lock, time bomb, or other limiting design, instruction, or routine that would purposely and inappropriately erase data or programming or cause any resource to become inoperable or otherwise incapable of being used in the full manner for which such resource was intended to be used, and any device that may be used as a host to access County Data or launch attacks on the CMMS. Contractor shall assist County in reducing and mitigating the effects of any Disabling Device discovered in any resource related to the provision or receipt of the Services, especially if such Disabling Device is causing a loss of operating efficiency or data. Timers, clocks, counters, and time locks included as part of any Commercial Software, used by County, by the manufacturer of that Software shall not be considered Disabling Devices for purposes of this Article.

Related to Anti-Malware Protections

  • Whistleblower Protections The Party shall not discriminate or retaliate against one of its employees or agents for disclosing information concerning a violation of law, fraud, waste, abuse of authority or acts threatening health or safety, including but not limited to allegations concerning the False Claims Act. Further, the Party shall not require such employees or agents to forego monetary awards as a result of such disclosures, nor should they be required to report misconduct to the Party or its agents prior to reporting to any governmental entity and/or the public.

Time is Money Join Law Insider Premium to draft better contracts faster.