Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.
Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.
Vandalism Vandalism will result in cancellation of privileges. Vandalism is defined as any malicious attempt to harm or destroy data of another user, Internet, or any of the above listed agencies or other networks that are connected to any of the Internet backbones. This includes, but not limited to, the uploading or creation of computer viruses.
Violence (a) The parties agree that violence shall be defined as any incident in which an employee is abused, threatened or assaulted while performing his or her work. The parties agree it includes the application of force, threats with or without weapons and severe verbal abuse. The parties agree that such incidents will not be condoned. Any employee who believes he/she has been subjected to such incident shall report this to a supervisor who will make every reasonable effort to rectify the situation. For purposes of sub- article (a) only, employees as referred to herein shall mean all employees of the Employer. (b) The Employer agrees to develop formalized policies and procedures in consultation with the Joint Health and Safety Committee to deal with workplace violence. The policy will address the prevention of violence and the management of violent situations and support to employees who have faced workplace violence. These policies and procedures shall be communicated to all employees. (c) The Employer will report all incidents of violence as defined herein to the Joint Health and Safety Committee for review. (d) The Employer agrees to provide training and information on the prevention of violence to all employees who come into contact with potentially aggressive persons. This training will be done during a new employee’s orientation and updated as required. (e) Subject to appropriate legislation, and with the employee’s consent, the Employer will inform the Union within three (3) days of any employee who has been subjected to violence while performing his/her work. Such information shall be submitted in writing to the Union as soon as practicable.
Windstorm or hail This peril does not include loss to the property contained in a building caused by rain, snow, sleet, sand or dust unless the direct force of wind or hail damages the building causing an opening in a roof or wall and the rain, snow, sleet, sand or dust enters through this opening. This peril includes loss to watercraft and their trailers, furnishings, equipment, and outboard engines or motors, only while inside a fully enclosed building.
Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.
Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.
Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.
Intercept Devices 26.1.1.1 Local and federal law enforcement agencies periodically request information or assistance from local telephone service providers. When either Party receives a request associated with an End User of the other Party, it shall refer such request to the Party that serves such End User, unless the request directs the receiving Party to attach a pen register, trap-and-trace or form of intercept on the Party's facilities, in which case that Party shall comply with any valid request.