Malicious Software, Viruses, and Other Threats. The Participant shall use reasonable efforts to ensure that its connection to and use of the System, including without limitation the medium containing any data or other information provided to the System, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and Trojan Horses) which will disrupt the proper operation of the System or any part thereof or any hardware or software used by HIO in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the System or any part thereof or any hardware, software or data used by HIO or any other Participant in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. HEALTHeLINK shall use reasonable efforts to ensure that its provision of the HIE and the Services, including without limitation the medium containing any data or other information provided to the HIE, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and “Trojan Horses”) which will disrupt the proper operation of the HIE or any part thereof or any hardware or software used by the Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the HIE or any part thereof or any hardware, software or data used by HEALTHeLINK or any Participant in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. HEALTHeLINK shall use efforts consistent with current health care industry standards to ensure that its provision of the HIE and the Services, including without limitation the medium containing any data or other information provided to the HIE, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and “Trojan Horses”) which will disrupt the proper operation of the HIE or any part thereof or any hardware or software used by the Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the HIE or any part thereof or any hardware, software or data used by HEALTHeLINK or any Participant in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. The Participant shall use reasonable efforts to ensure that its connection to and use of the System, including without limitation the medium containing any data or other information provided to the System, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and Trojan Horses) which will disrupt the proper operation of the System or any part thereof or any hardware or software used by Redwood MedNet or other Participants in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the System or any part thereof or any hardware, software or data used by Redwood MedNet or any other Participant in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. The Epidemiology Center shall ensure that its connection to and use of the EDM will not introduce any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms and/or Trojan Horses). The Epidemiology Center shall not disrupt, cause a disruption in, or permit a disruption in the proper operation of the NDW, EDM, or any part thereof or any hardware or software used by IHS in connection with the NDW and EDM.
Malicious Software, Viruses, and Other Threats. The Participant shall use reasonable efforts to ensure that its connection to and use of the System, including without limitation the medium containing any data or other information provided to the System, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and Trojan Horses) which will disrupt the proper operation of the System or any part thereof or any hardware or software used by HIO in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the System or any part thereof or any hardware, software or data used by HIO or any other Participant in connection therewith, to be destroyed, damaged, or rendered inoperable. 4644 Section 5.3 (System Security) may be omitted for Model #1, under which the HIO does not establish and apply privacy, security and other standards for health information exchange.
Malicious Software, Viruses, and Other Threats must provide “malware” (including without limitation malicious software or malware, viruses, worms and Trojan Horses) protection . . .
Malicious Software, Viruses, and Other Threats. Each Party shall use reasonable efforts to ensure that its provision of the Network and the Services or connection to and use of the Network, as the case may be, including without limitation the medium containing any data or other information provided to the Network, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware,” viruses, worms, and “Trojan Horses”) which will disrupt the proper operation of the Network or any part thereof or any hardware or software used by the Data Recipient in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action will cause the Network or any part thereof or any hardware, software or data used by HEALTHeNET or any Data Recipient in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. RHIO shall use efforts consistent with current health care industry standards to ensure that its provision of the HIE and the Services, including, without limitation, the medium containing any data or other information provided to the HIE, does not include, and that any method of transmitting such data will not introduce, any program, routine, subroutine, or data (including without limitation malicious software or “malware”, viruses, worms and “Trojan Horses”) which will disrupt the proper operation of the HIE or any part thereof or any hardware or software used by the Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking or failure to take any action will cause the HIE or any part thereof or any hardware, software or data used by RHIO or any Participant in connection therewith, to be destroyed, damaged, or rendered inoperable.
Malicious Software, Viruses, and Other Threats. DBH shall use reasonable efforts to ensure their connection to and use of ICANS does not include any program, routine, subroutine, or data which will disrupt the proper operation of ICANS or any part of ICANS, or any hardware or software used by DBH in connection with ICANS. This includes the medium containing any data or other information provided to ICANS. DBH shall use reasonable efforts to ensure that any method of transmitting their data will not introduce any program, routine, subroutine, or data which will disrupt the proper operation