Malicious Software. The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Malicious Software. 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.
12.2 Notwithstanding clause 12.1 if Malicious Software is found, the parties shall co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of DFID Data, assist each other to mitigate any losses and to restore the Services to their desired operating efficiency.
12.3 Any cost arising out of the actions of the parties taken in compliance with the provisions of clause 12.2 shall be borne by the parties as follows:
Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.
Malicious Software. 43.1 The Supplier shall, as an enduring obligation throughout the Term and for a period of twelve (12) Months after expiry of the Term, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT Environment (or as otherwise agreed between the Parties).
43.2 Notwithstanding Clause 43.1, if Malicious Software is found, the Parties shall cooperate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Customer Data, assist each other to mitigate any losses and to restore the Services to their desired operating efficiency.
43.3 Any cost arising out of the actions of the Parties taken in compliance with the provisions of Clause 43 (Malicious Software) shall be borne by the Parties as follows:
Malicious Software. 1The Supplier shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT Environment (or as otherwise agreed between the Parties).
Malicious Software. 20.2.1 The Supplier shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT Environment (or as otherwise agreed between the parties).
20.2.2 Notwithstanding clause 20.2.1, if Malicious Software is found, the Parties shall co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of Customer Data, assist each other to mitigate any losses and to restore the Services to their desired operating efficiency.
20.2.3 Any cost arising out of the actions of the parties taken in compliance with the provisions of clause 20.2.1 shall be borne by the Parties as follows:
20.2.3.1 by the Supplier, where the Malicious Software originates from the Supplier Software or the Customer Data (whilst the Customer Data was under the control of the Supplier) unless the Supplier can demonstrate that such Malicious Software was present and not quarantined or otherwise identified by the Customer when provided to the Supplier; and
20.2.3.2 by the Customer if the Malicious Software originates from the Customer Software or the Customer Data (whilst the Customer Data was under the control of the Customer).
Malicious Software. Any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence. Management Charge The sum paid by the Supplier to CCS being an amount of up to 1% but currently set at 0.75% of all Charges for the Services invoiced to Buyers (net of VAT) in each month throughout the duration of the Framework Agreement and thereafter, until the expiry or End of any Call-Off Contract. Management Information The management information specified in Framework Agreement Schedule 6. Material Breach Those breaches which have been expressly set out as a Material Breach and any other single serious breach or persistent failure to perform as required under this Call-Off Contract.
Malicious Software. 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.
12.2 Notwithstanding clause 12.1 if Malicious Software is found, the parties shall co-operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of DFID Data, assist each other to mitigate any losses and to restore the Services to their desired operating efficiency.
12.3 Any cost arising out of the actions of the parties taken in compliance with the provisions of clause 12.2 shall be borne by the parties as follows:
12.3.1 by the Supplier where the Malicious Software originates from the Supplier’s Software, the Third Party Software or the DFID Data (whilst the DFID Data was under the control of the Contractor); and
12.3.2 by DFID if the Malicious Software originates from the DFID Software or the DFID Data (whilst DFID Data was under the control of DFID).
Malicious Software. Each Participant shall ensure that it employs security controls that meet applicable industry or Federal standards so that the information and Message Content being Transacted and any method of Transacting such information and Message Content will not introduce any viruses, worms, unauthorized cookies, trojans, malicious software, “malware,” or other program, routine, subroutine, or data designed to disrupt the proper operation of a System or any part thereof or any hardware or software used by a Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause a System or any part thereof or any hardware, software or data used by a Participant in connection therewith, to be improperly accessed, destroyed, damaged, or otherwise made inoperable. In the absence of applicable industry standards, each Participant shall use all commercially reasonable efforts to comply with the requirements of this Section.
Malicious Software. 44.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions and software available from an industry accepted anti-virus software vendor to check for, contain the spread of, and minimise the impact of Malicious Software in the ICT environment (or as otherwise agreed between the Parties).
44.2 Notwithstanding Clause 44.1 if Malicious Software is found, the Parties shall co operate to reduce the effect of the Malicious Software and, particularly if Malicious Software causes loss of operational efficiency or loss or corruption of customer data, assist each other to mitigate any losses and to restore the Services to their desired operating efficiency.
44.3 Any cost arising out of the actions of the Parties taken in compliance with the provisions of Clause 44 shall be borne by the Parties as follows;