Common use of Malicious Software Clause in Contracts

Malicious Software. Each Participant shall ensure that it employs security controls that meet applicable industry or Federal standards so that the information and Message Content being Transacted and any method of Transacting such information and Message Content will not introduce any viruses, worms, unauthorized cookies, trojans, malicious software, “malware,” or other program, routine, subroutine, or data designed to disrupt the proper operation of a System or any part thereof or any hardware or software used by a Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause a System or any part thereof or any hardware, software or data used by a Participant in connection therewith, to be improperly accessed, destroyed, damaged, or otherwise made inoperable. In the absence of applicable industry standards, each Participant shall use all commercially reasonable efforts to comply with the requirements of this Section.

Appears in 11 contracts

Samples: Data Use and Reciprocal Support Agreement (Dursa), Data Use and Reciprocal Support Agreement (Dursa), Data Use and Reciprocal Support Agreement (Dursa)

AutoNDA by SimpleDocs

Malicious Software. Each In participating in the NHIN, each Participant shall ensure that it employs security controls that meet applicable industry or Federal standards so that the information and Message Content being Transacted transmitted and any method of Transacting transmitting such information and Message Content will not introduce any viruses, worms, unauthorized cookies, trojans, malicious software, “malware,” or other program, routine, subroutine, or data designed to disrupt the proper operation of a System or any part thereof or any hardware or software used by a Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause a System or any part thereof or any hardware, software or data used by a Participant in connection therewith, to be improperly accessed, destroyed, damaged, or otherwise made inoperable. In the absence of applicable industry standards, each Participant shall use all commercially reasonable efforts to comply with the requirements of this Section.

Appears in 4 contracts

Samples: Data Use and Reciprocal Support Agreement (Dursa), Data Use and Reciprocal Support Agreement (Dursa), Data Use and Reciprocal Support Agreement (Dursa)

Malicious Software. Each In participating in the NHIN, each Participant shall ensure that it employs security controls that meet applicable industry or Federal federal standards so that the information and Message Content Data being Transacted transmitted and any method of Transacting transmitting such information and Message Content Data will not introduce any viruses, worms, unauthorized cookies, trojans, malicious software, software or “malware,” ”, or other program, routine, subroutine, or data designed to disrupt the proper operation of a System or any part thereof or any hardware or software used by a Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, action will cause a System or any part thereof or any hardware, software or data used by a Participant in connection therewith, to be improperly accessed, destroyed, damaged, or otherwise made inoperable. In the absence of applicable industry standards, each Participant shall use all commercially reasonable efforts to comply with the requirements of this Section.

Appears in 2 contracts

Samples: Data Use and Reciprocal Support Agreement (Dursa), Data Use and Reciprocal Support Agreement (Dursa)

Malicious Software. Each Participant shall ensure that it employs security controls that meet applicable industry or Federal standards so that the information Health and Message Content being Transacted Social Services Information exchanged pursuant to this Agreement and any method of Transacting exchanging such information and Message Content will not introduce any viruses, worms, unauthorized cookies, trojans, malicious software, “malware,” or other program, routine, subroutine, or data designed to disrupt the proper operation of a System or any part thereof or any hardware or software used by a Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause a System or any part thereof or any hardware, software or data used by a Participant in connection therewith, to be improperly accessed, destroyed, damaged, or otherwise made inoperable. In the absence of applicable legal or industry standards, each Participant shall use all commercially reasonable efforts to comply with the requirements of this Section.

Appears in 2 contracts

Samples: Data Sharing Agreement, Data Sharing Agreement

Malicious Software. Each Participant shall ensure that it employs security controls that meet applicable industry or Federal federal standards so that the information PHI and Message Content PII being Transacted exchanged and any method of Transacting such information and Message Content exchanging that PHI or PII will not introduce any viruses, worms, unauthorized cookies, trojans, malicious software, “malware,” or other program, routine, subroutine, or data designed to disrupt the proper operation of a System system or any part thereof or any hardware or software used by a Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause a System system or any part thereof or any hardware, software or data used by a Participant in connection therewith, to be improperly accessed, destroyed, damaged, or otherwise made inoperable. In the absence of applicable legal or industry standards, each Participant shall use all commercially reasonable efforts to comply with the requirements of this Section.

Appears in 2 contracts

Samples: Data Sharing Agreement, Data Sharing Agreement

AutoNDA by SimpleDocs

Malicious Software. Each Participant shall ensure that it employs security controls that meet applicable industry or Federal standards so that the information and Message Content being Transacted and any method of Transacting such information and Message Content will not introduce any viruses, worms, unauthorized cookies, trojans, malicious software, malware,” , or other program, routine, subroutine, or data designed to disrupt the proper operation of a System or any part thereof or any hardware or software used by a Participant in connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause a System or any part thereof or any hardware, software or data used by a Participant in connection therewith, to be improperly accessed, destroyed, damaged, or otherwise made inoperable. In the absence of applicable industry standards, each Participant shall use all commercially reasonable efforts to comply with the requirements of this Section.

Appears in 1 contract

Samples: Health Information Exchange Agreement

Malicious Software. Each Participant shall ensure that it employs security controls that meet applicable industry or Federal standards so that the information and Message Content being Transacted and any method of Transacting such information and Message Content will not introduce any viruses, worms, unauthorized cookies, trojans, malicious software, “malware,” or other program, routine, subroutine, or data designed to disrupt the proper operation of a System or any part thereof or any hardware or software used by a Participant in connection Connection therewith, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause a System or any part thereof or any hardware, software or data used by a Participant in connection Connection therewith, to be improperly accessed, destroyed, damaged, or otherwise made inoperable. In the absence of applicable industry standards, each Participant shall use all commercially reasonable efforts to comply with the requirements of this Section.

Appears in 1 contract

Samples: Health Information Exchange Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!