Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
IBM Credit may in its sole discretion from time to time decide the amount of credit IBM Credit extends to Customer, notwithstanding any prior course of conduct between IBM Credit and Customer. IBM Credit may combine all of its advances to make one debt owed by Customer.
Incorporation of Software Code I agree that I will not incorporate into any Company software or otherwise deliver to Company any software code licensed under the GNU General Public License or Lesser General Public License or any other license that, by its terms, requires or conditions the use or distribution of such code on the disclosure, licensing, or distribution of any source code owned or licensed by Company except in strict compliance with Company’s policies regarding the use of such software.
Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Disabling Code Contractor represents and warrants that the SaaS Application and Services, and any information, reports or other materials provided to Authorized Users as a result of the operation of the SaaS Application and Services, including future enhancements and modifications thereto, shall be free of any Disabling Code.
Blue Pencil Doctrine If the duration of, the scope of or any business activity covered by any provision of this Section 7 is in excess of what is determined to be valid and enforceable under applicable law, such provision shall be construed to cover only that duration, scope or activity that is determined to be valid and enforceable. Executive hereby acknowledges that this Section 7 shall be given the construction that renders its provisions valid and enforceable to the maximum extent, not exceeding its express terms, possible under applicable law.
By Microsoft Microsoft will defend Customer against any third-party claim to the extent it alleges that a Product or Fix made available by Microsoft for a fee and used within the scope of the license granted under this agreement (unmodified from the form provided by Microsoft and not combined with anything else), misappropriates a trade secret or directly infringes a patent, copyright, trademark or other proprietary right of a third party. If Microsoft is unable to resolve a claim of infringement under commercially reasonable terms, it may, as its option, either: (1) modify or replace the Product or fix with a functional equivalent; or (2) terminate Customer’s license and refund any prepaid license fees (less depreciation on a five-year, straight-line basis) for perpetual licenses and any amount paid for Online Services for any usage period after the termination date. Microsoft will not be liable for any claims or damages due to Customer’s continued use of a Product or Fix after being notified to stop due to a third- party claim.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.
Motorola s sole obligation to Licensee and Licensee’s exclusive remedy under this warranty is to use reasonable efforts to remedy any material Software defect covered by this warranty. These efforts will involve either replacing the media or attempting to correct significant, demonstrable program or documentation errors or Security Vulnerabilities. If Motorola cannot correct the defect within a reasonable time, then at Motorola’s option, Motorola will replace the defective Software with functionally-equivalent Software, license to Licensee substitute Software which will accomplish the same objective, or terminate the license and refund the Licensee’s paid license fee.