Computer Problems, Viruses, and Attacks Sample Clauses

Computer Problems, Viruses, and Attacks. You acknowledge and understand that computer systems are vulnerable to computer viruses, bugs, power disruptions, communication line disruptions, Internet access failures, Internet content failures, date-related problems, and attacks by hackers and other unauthorized intruders. We have taken reasonable steps so that these problems will not materially affect the System. We do not guarantee that information or communication systems supplied by Us or Our suppliers will not be vulnerable to these problems. You acknowledge and agree that You are solely responsible for protecting Yourself from these problems. You must also take reasonable steps to verify that Your suppliers, lenders, landlords, customers, and governmental agencies on which You rely, are reasonably protected. This may include taking reasonable steps to secure Your systems, including, but not limited to, firewalls, access code protection, anti-virus systems, and use of backup systems.
AutoNDA by SimpleDocs

Related to Computer Problems, Viruses, and Attacks

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • COMPUTER GRAPHICS FILES The Engineer agrees to comply with Attachment G, Computer Graphics Files for Document and Information Exchange, if determined by the State to be applicable to this contract.

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • Utilities and Appliances (1) The owner must provide all utilities needed to comply with the HQS. (2) The owner is not responsible for a breach of the HQS caused by the tenant’s failure to: (a) Pay for any utilities that are to be paid by the tenant. (b) Provide and maintain any appliances that are to be provided by the tenant.

  • Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!