Common use of Distribution of Malware Clause in Contracts

Distribution of Malware. The storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by Xinsto, LLC on a case by case basis. Example: Security company using the Services to analyze the latest root kit for new security analysis/software.

Appears in 1 contract

Samples: Hosting Agreement

AutoNDA by SimpleDocs

Distribution of Malware. The storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by Xinsto, LLC SoftLayer on a case by case basis. Example: Security company using the Services to analyze the latest root kit for new security analysis/software.

Appears in 1 contract

Samples: Please Read Carefully

Distribution of Malware. The Company prohibits the storage, distribution, fabrication, fabrication or use of malware, malware including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibitedactivity. The use of such programs Programs used in the normal ordinary course of business, however, may be requested by Customer and approved by Xinsto, LLC on a case by case basisbusiness are deemed acceptable. Example: Security company using the Services to analyze Company hosting that analyzes the latest root kit for new security analysis/analysis software.

Appears in 1 contract

Samples: Internet Service Agreement

AutoNDA by SimpleDocs

Distribution of Malware. The storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by Xinsto, LLC Dakota Cloud on a case by case basis. Example: Security company using the Services to analyze the latest root kit for new security analysis/software.

Appears in 1 contract

Samples: Master Services Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!