Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.
Appears in 37 contracts
Samples: Purchase Order Agreement, Basic Order Agreement (Boa), Cybersecurity Support Agreement (Castellum, Inc.)
Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3DC#) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.
Appears in 5 contracts
Malicious Software. When the Contractor Recipient or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting OfficerAgreements officer. Do not send the malicious software to the Contracting OfficerAgreements officer.
Appears in 3 contracts
Samples: Tia Single Modification (Perpetua Resources Corp.), Tia Single Modification (Perpetua Resources Corp.), Technology Investment Agreement (Perpetua Resources Corp.)
Malicious Software. When the Contractor Recipient or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Agreements Officer. Do not send the malicious software to the Contracting Agreements Officer.
Appears in 2 contracts
Samples: Technology Investment Agreement, Technology Investment Agreement
Malicious Software. When the Contractor or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officercontracts officer. Do not send the malicious software to the Contracting Officercontracts officer.
Appears in 1 contract
Samples: Flow Downs Agreement
Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting OfficerOfficer or Buyer. Do not send the malicious software to the Contracting Officer.
Appears in 1 contract
Samples: Customer Contract 23 C 8458