Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.
Appears in 35 contracts
Samples: Customer Contract Requirements Atru, Extend Services, Extend Services)
Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3DC#) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.
Appears in 5 contracts
Samples: License Agreement, www.navair.navy.mil, www.navair.navy.mil
Malicious Software. When the Contractor Recipient or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting OfficerAgreements officer. Do not send the malicious software to the Contracting OfficerAgreements officer.
Appears in 3 contracts
Samples: Technology Investment Agreement (Perpetua Resources Corp.), Perpetua Resources Corp., Perpetua Resources Corp.
Malicious Software. When the Contractor Recipient or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Agreements Officer. Do not send the malicious software to the Contracting Agreements Officer.
Appears in 2 contracts
Samples: Technology Investment Agreement, Technology Investment Agreement
Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting OfficerOfficer or Buyer. Do not send the malicious software to the Contracting Officer.
Appears in 1 contract
Samples: Customer Contract Requirements
Malicious Software. When the Contractor or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officercontracts officer. Do not send the malicious software to the Contracting Officercontracts officer.
Appears in 1 contract
Samples: albemarle.com