Freedom from Computer Viruses Clause Samples

Freedom from Computer Viruses. Trading Partners shall use reasonable efforts to ensure that electronic transactions are free of, but not limited to, the following: computer viruses or other computer software code or routine designed to disable, damage, impair or electronically repossess or erase programs or data files which can cause damage to a Trading Partner’s computer systems and/or operations. Either Trading Partner will promptly notify the other if such destructive logic is detected in Electronic Transactions that it transmits or receives.
Freedom from Computer Viruses. Trade Partners shall use reasonable efforts to ensure that Documents are free of computer software code or routines which are designed to disable, damage, impair or electronically repossess or erase programs or data files and which can cause damage to a Trade Partner's computer systems and/or operations, including but not limited to, computer viruses, "back doors" or other destructive logic. Either Trade Partner will promptly notify the other if such destructive logic is detected in and/or transmitted from any computer system involving Documents.
Freedom from Computer Viruses. Each Party shall use reasonable efforts to ensure that electronic transactions are free of, but not limited to, the following: computer viruses or other computer software code or routine designed to disable, damage, impair or electronically repossess or erase programs or data files which can cause damage to a Party's computer systems and/or operations. Either Party will promptly notify the other if such destructive logic is detected in and/or transmitted from any computer system involving electronic transactions.

Related to Freedom from Computer Viruses

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Incorporation of Software Code I agree that I will not incorporate into any Company software or otherwise deliver to Company any software code licensed under the GNU General Public License or Lesser General Public License or any other license that, by its terms, requires or conditions the use or distribution of such code on the disclosure, licensing, or distribution of any source code owned or licensed by Company except in strict compliance with Company’s policies regarding the use of such software.

  • Certification Regarding Prohibition of Certain Terrorist Organizations (Tex Gov. Code 2270) Certification Regarding Prohibition of Boycotting Israel (Tex. Gov. Code 2271) 5 Certification Regarding Prohibition of Contracts with Certain Foreign-Owned Companies (Tex. Gov. 5 Code 2274) 5 Certification Regarding Prohibition of Discrimination Against Firearm and Ammunition Industries (Tex.