Harmful Computer Code Sample Clauses

Harmful Computer Code. Azenta conducts and will continue to conduct industry-standard screenings of the Software or Subscription Services and Azenta Systems using anti-virus and other security protection tools from reputable providers. Azenta warrants that neither the Software or Subscription Services contain or incorporate any: viruses; worms; Trojan horses; logic bombs; or computer code, procedures, mechanisms, or programming devices that are designed to or reasonably may (i) allow Azenta or any third party to disrupt, modify, delete, damage, corrupt, deactivate, disable, or access without authorization the Software or Subscription Services, Customer Content, or Customer’s systems (e.g., back- door devices, trap doors) or (ii) disable, impair, or interfere with the operation of the Software or Subscription Services or any Customer networks, hardware, software, or other systems, including those based on the elapsing of a period of time (together, “Harmful Code”). Neither Azenta nor its employees or contractors will introduce or incorporate any Harmful Code into the Software or Subscription Services or Azenta Systems.
AutoNDA by SimpleDocs

Related to Harmful Computer Code

  • COMPUTER SOFTWARE The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Computer Equipment No computers and/or personal electronic devices, such as tablets and laptop computers, or any component thereof, may be purchased with funds provided under this Contract, regardless of purchase price, without prior written approval of ADMINISTRATOR. Any such purchase shall be in accordance with specifications provided by ADMINISTRATOR, be subject to the same inventory control conditions specified above in Subparagraphs 18.1.1 to 18.1.4, and, at the sole discretion of ADMINISTRATOR, become the property of COUNTY upon termination of this Contract.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • MOBILE DATA COMPUTERS 23 1. As part of the law enforcement services to be provided to CITY, COUNTY 24 has provided, or will provide, mobile data computers (hereinafter called 25 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 26 designated by COUNTY for use within CITY limits.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!