Malicious Code. DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.
Malicious Code. You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.
Malicious Code. Transfer Agent shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.
Malicious Code. No Work will contain any Malicious Code. Contractor shall immediately provide to the JBE written notice in reasonable detail upon becoming aware of the existence of any Malicious Code. Without limiting the foregoing, Contractor shall use best efforts and all necessary precautions to prevent the introduction and proliferation of any Malicious Code in the Judicial Branch Entities’ IT Infrastructure or networks or in the Contractor systems used to provide Work. In the event Contractor or the JBE discovers the existence of any Malicious Code, Contractor shall use its best efforts, in cooperation with the JBE, to effect the prompt removal of the Malicious Code from the Work and the Judicial Branch Entities’ IT Infrastructure and the repair of any files or data corrupted thereby, and the expenses associated with the removal of the Malicious Code and restoration of the data shall be borne by Contractor. In no event will Contractor or any Subcontractor invoke any Malicious Code.
Malicious Code. You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (MALICIOUS CODE). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.
Malicious Code. BNY Mellon will deploy industry standard malicious code protection and identification tools across its systems and software used to provide the services.
Malicious Code. No Work will contain any Malicious Code. Contractor shall immediately provide to the Court written notice in reasonable detail upon becoming aware of the existence of any Malicious Code. Without limiting the foregoing, Contractor shall use best efforts and all necessary precautions to prevent the introduction and proliferation of any Malicious Code in the Court’s IT Infrastructure or networks or in the Contractor systems used to provide Work. In the event Contractor or the Court discovers the existence of any Malicious Code, Contractor shall use its best efforts, in cooperation with the Court, to effect the prompt removal of the Malicious Code from the Work and the Court’s IT Infrastructure and the repair of any files or data corrupted thereby, and the expenses associated with the removal of the Malicious Code and restoration of the data shall be borne by Contractor. In no event will Contractor or any Subcontractor invoke any Malicious Code.
Malicious Code. You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services; provided, however, that in no event shall you be liable for any consequential damages as a result of any loss that may result in connection with the provisions of this section (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.
Malicious Code. State Street shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Client Data and implement a process for removing said malicious code from information systems handling or holding Client Data.
Malicious Code. Cisco will use commercially reasonable efforts to deliver the Cisco Technology free of Malicious Code.