by the Supplier where the Malicious Software originates from the Supplier’s Software, the Third Party Software or the DFID Data. (whilst the DFID Data was under the control of the Contractor); and
Appears in 46 contracts
Samples: Contract for Supplier Services, Supplier Services Agreement, Contract for Supplier Services
by the Supplier where the Malicious Software originates from the Supplier’s Software, the Third Party Software or the DFID Data. (whilst the DFID Data was under the control of the ContractorSupplier); and
Appears in 1 contract
Samples: Framework Agreement