Malicious Software, Viruses, and Other Threats Sample Clauses

Malicious Software, Viruses, and Other Threats. HealtheConnections shall use reasonable efforts to ensure that its provision of the HIE and Services, including without limitation the medium containing any data or other information provided to the HIE, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and “Trojan Horses”) which will disrupt the proper operation of the HIE or any part thereof or any hardware or software used by the Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the HIE or any part thereof or any hardware, software or data used by HealtheConnections or any other Participant in connection therewith, to be destroyed, damaged, or rendered inoperable.
AutoNDA by SimpleDocs
Malicious Software, Viruses, and Other Threats. The Participant shall use reasonable efforts to ensure that its connection to and use of the System, including without limitation the medium containing any data or other information provided to the System, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and Trojan Horses) which will disrupt the proper operation of the System or any part thereof or any hardware or software used by HIO in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the System or any part thereof or any hardware, software or data used by HIO or any other Participant in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. Participant shall use efforts consistent with current health care industry standards to ensure that its connection to and use of the HIE, including without limitation the medium containing any data or other information provided to the HIE, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and Trojan Horses) which will disrupt the proper operation of the HIE or any part thereof or any hardware or software used by HEALTHeLINK in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the HIE or any part thereof or any hardware, software or data used by HEALTHeLINK or any other Participant in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. The Epidemiology Center shall ensure that its connection to and use of the EDM will not introduce any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms and/or Trojan Horses). The Epidemiology Center shall not disrupt, cause a disruption in, or permit a disruption in the proper operation of the NDW, EDM, or any part thereof or any hardware or software used by IHS in connection with the NDW and EDM.
Malicious Software, Viruses, and Other Threats. The Participant shall use reasonable efforts to ensure that its connection to and use of the System, including without limitation the medium containing any data or other information provided to the System, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and trojan horses) which will disrupt the proper operation of the System or any part thereof or any hardware or software used by HealtHIE Nevada or other Participants in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the System or any part thereof or any hardware, software or data used by HealtHIE Nevada or any other Participant in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. The Participant shall use reasonable efforts to ensure that its connection to and use of the System, including without limitation the medium containing any data or other information provided to the System, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and Trojan Horses) which will disrupt the proper operation of the System or any part thereof or any hardware or software used by HIO in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the System or any part thereof or any hardware, software or data used by HIO or any other Participant in connection therewith, to be destroyed, damaged, or rendered inoperable. 44 Section 5.3 (System Security) may be omitted for Model #1, under which the HIO does not establish and apply privacy, security and other standards for health information exchange.
Malicious Software, Viruses, and Other Threats. DBH shall use reasonable efforts to ensure their connection to and use of ICANS does not include any program, routine, subroutine, or data which will disrupt the proper operation of ICANS or any part of ICANS, or any hardware or software used by DBH in connection with ICANS. This includes the medium containing any data or other information provided to ICANS. DBH shall use reasonable efforts to ensure that any method of transmitting their data will not introduce any program, routine, subroutine, or data which will disrupt the proper operation of ICANS. DBH shall use reasonable efforts to ensure ICANS or any part thereof or any hardware, software or data used by DBH, or any Agency in connection with ICANS, is not destroyed, damaged, or rendered inoperable.
AutoNDA by SimpleDocs
Malicious Software, Viruses, and Other Threats must provide “malware” (including without limitation malicious software or malware, viruses, worms and Trojan Horses) protection . . .
Malicious Software, Viruses, and Other Threats. Each Party shall use reasonable efforts to ensure that its provision of the Network and the Services or connection to and use of the Network, as the case may be, including without limitation the medium containing any data or other information provided to the Network, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and “Trojan Horses”) which will disrupt the proper operation of the Network or any part thereof or any hardware or software used by the Data Recipient in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the Network or any part thereof or any hardware, software or data used by HEALTHeNET or any Data Recipient in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. Members must provide “malware” (including without limitation malicious software or malware, viruses, worms and Trojan Horses) protection on its environment and shall ensure that the connection to and use of the Network will not introduce any program, routine, subroutine, or data. Members will not disrupt the proper operation of the Network or any part thereof or any hardware or software used by IHS.
Time is Money Join Law Insider Premium to draft better contracts faster.