Computer Problems, Viruses, and Attacks Sample Clauses

Computer Problems, Viruses, and Attacks. You acknowledge and understand that computer systems are vulnerable to computer viruses, bugs, power disruptions, communication line disruptions, Internet access failures, Internet content failures, date-related problems, and attacks by hackers and other unauthorized intruders. We have taken reasonable steps so that these problems will not materially affect the System. We do not guarantee that information or communication systems supplied by Us or Our suppliers will not be vulnerable to these problems. You acknowledge and agree that You are solely responsible for protecting Yourself from these problems. You must also take reasonable steps to verify that Your suppliers, lenders, landlords, customers, and governmental agencies on which You rely, are reasonably protected. This may include taking reasonable steps to secure Your systems, including, but not limited to, firewalls, access code protection, anti-virus systems, and use of backup systems.
AutoNDA by SimpleDocs

Related to Computer Problems, Viruses, and Attacks

  • Hurricane Information During a hurricane, BellSouth will make every effort to keep CLECs updated on the status of our network. Information centers will be set up throughout BellSouth Telecommunications. These centers are not intended to be used for escalations, but rather to keep the CLEC informed of network related issues, area damages and dispatch conditions, etc. Hurricane-related information can also be found on line at xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/network/disaster/dis_resp.htm. Information concerning Mechanized Disaster Reports can also be found at this website by clicking on CURRENT MDR REPORTS or by going directly to xxxx://xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/network/disaster/mdrs.htm. BST Disaster Management Plan BellSouth maintenance centers have geographical and redundant communication capabilities. In the event of a disaster removing any maintenance center from service another geographical center would assume maintenance responsibilities. The contact numbers will not change and the transfer will be transparent to the CLEC. Attachment 6‌ Bona Fide Request and New Business Requests Process

  • DISASTER OR EMERGENCY REPORTS Any disaster or emergency situation, natural or man-made, such as fire or severe weather, shall be reported telephonically within 72 hours, followed by a comprehensive written report within seven days to DHA.

  • COMPUTER SOFTWARE The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • COMPUTER GRAPHICS FILES The Engineer agrees to comply with Attachment G, Computer Graphics Files for Document and Information Exchange, if determined by the State to be applicable to this contract.

  • Contractor Certification regarding Business with Certain Countries and Organizations Pursuant to Subchapter F, Chapter 2252, Texas Government Code], Contractor certifies Contractor is not engaged in business with Iran, Sudan, or a foreign terrorist organization. Contractor acknowledges this Agreement may be terminated and payment withheld if this certification is inaccurate.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

Time is Money Join Law Insider Premium to draft better contracts faster.