Distribution of Malware. The storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by Xinsto, LLC on a case by case basis. Example: Security company using the Services to analyze the latest root kit for new security analysis/software.
Appears in 1 contract
Samples: Hosting Agreement
Distribution of Malware. The storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by Xinsto, LLC SoftLayer on a case by case basis. Example: Security company using the Services to analyze the latest root kit for new security analysis/software.
Appears in 1 contract
Samples: Please Read Carefully
Distribution of Malware. The Company prohibits the storage, distribution, fabrication, fabrication or use of malware, malware including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibitedactivity. The use of such programs Programs used in the normal ordinary course of business, however, may be requested by Customer and approved by Xinsto, LLC on a case by case basisbusiness are deemed acceptable. Example: Security company using the Services to analyze Company hosting that analyzes the latest root kit for new security analysis/analysis software.
Appears in 1 contract
Samples: Internet Service Agreement
Distribution of Malware. The storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by Xinsto, LLC Dakota Cloud on a case by case basis. Example: Security company using the Services to analyze the latest root kit for new security analysis/software.
Appears in 1 contract
Samples: Master Services Agreement