Malware Sample Clauses

MalwareSeller shall (consistent with the following sentence) ensure that no malware or similar items are coded or introduced into any aspect of the Facility, Interconnection Facilities, the Company Systems interfacing with the Facility and Interconnection Facilities, and any of Seller's critical control systems or processes used by Seller to provide energy, including the information, data and other materials delivered by or on behalf of Seller to Company, (collectively, the "Environment"). Seller will continue to review, analyze and implement improvements to and upgrades of its Malware prevention and correction programs and processes that are commercially reasonable and consistent with the then current technology industry's standards and, in any case, not less robust than the programs and processes implemented by Seller with respect to its own information systems. If Malware is found to have been introduced into the Environment, Seller will promptly notify Company and Seller shall take immediate action to eliminate and remediate the effects of the Malware, at Seller's expense. Seller shall not modify or otherwise take corrective action with respect to the Company Systems except at Company's request. Seller will promptly report to Company the nature and status of all Malware elimination and remediation efforts.
Malware. An anti-malware solution must be in place, and updated with valid update subscription. Provider is not responsible for any harm that may be caused by Client’s access to third-party application programming interfaces or the execution or transmission of malicious code or similar occurrences, including without limitation, disabling devices, drop dead devices, time bombs, trap doors, Trojan horses, worms, viruses, and similar mechanisms. Any costs or fees to rebuild or service machines are provided and sold separately by Provider.
Malware. An anti-malware solution must be in place, and updated with valid update subscription. Provider is not responsible for any harm that may be caused by Client’s access to third-party application programming interfaces or the execution or transmission of malicious code or similar occurrences, including without limitation, disabling devices, drop dead devices, time bombs, trap doors, Trojan horses, worms, viruses, and similar mechanisms. Any costs or fees to rebuild or service machines are provided and sold separately by Provider. Hardware and Software Configurations All Hardware and Software Configurations implemented by Provider shall belong to Provider, and shall constitute Provider’s Confidential Information. Client Data Security & Privacy In addition to its other confidentiality obligations under an applicable Service Attachment, Provider shall not use, edit, or disclose to any party other than Client any Client Data (defined below), except as otherwise requested by Client, or required by court order or applicable law. For purposes of this provision, all data stored on the virtualized machines assigned to Client, including locally stored personal data of individual employees, will be considered Client Data by Provider. As between Provider and Client, all Client Data is owned exclusively by Client. Client Data constitutes Confidential Information subject to the Terms. Provider may access Client's User accounts, including Client Data, solely to respond to service or technical problems or otherwise at Client's request. Security and Regulatory Recommendations Although it is under no obligation to do so, from time to time, Provider may make recommendations regarding regulatory compliance, safety, and security related to Client’s network and practices (e.g., multi-factored authentication). If Client fails to adopt or implement the recommended protocols, Client is responsible for any and all damages related to regulatory, security, privacy, or data protection, including but not limited to fines, data breach notification, malware or ransomware costs, restoration, forensic investigation, restoring backups, or any other costs or damages related to Client’s refusal to implement the recommended protocols. Password-Management Services If Provider provides password management services to Client, Client shall be responsible and liable for any unauthorized use of passwords. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY, OR DAMAGE TO CLIENT OR A...
Malware. In production, Zoom must employ tools to detect, log, and disposition malware.
Malware. You may not knowingly, willfully, or negligently incorporate any malicious or harmful code, viruses, Trojan Horses, worms, time bombs, cancelbots, or other malware in your Developer Software.
Malware. Supplier represents, warrants and guarantees that any Merchandise, if applicable, and any deliverables resulting from the Services do not include, and that any method of transmitting said deliverables to University will not introduce, any program, routine, subroutine, known vulnerability, or data (including malicious software or “malware,” viruses, ransomware, worms or Trojan Horses) that are designed to disrupt the proper operation of the Merchandise or deliverables or any other software or system used by University, or which, upon the occurrence of a certain event, the passage of time, or the taking of or failure to take any action, will cause the deliverables resulting from the Services or any system, software or data used in connection therewith to be destroyed, damaged or rendered inoperable or inaccessible.
Malware. Any type of Software that is designed to harm, impact, or access the Software or any other Authority systems.
MalwareThe term “Malware” shall mean software designed to infiltrate or damage a computer system without the owner's informed consent. Software is considered Malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, Trojan horses, most rootkits, spyware, dishonest adware, crime ware and other malicious and unwanted software.
MalwareYou agree not to knowingly or recklessly introduce a virus or other harmful component, or otherwise tamper with, impair or damage the Platform.
Malware. Anything or device (including any software, malware, code, file or programme) which may: prevent, impair or otherwise adversely affect the operation of any computer software, hardware or network, any telecommunications service, equipment or network or any other service or device; prevent, impair or otherwise adversely affect access to or the operation of any programme or data, including the reliability of any programme or data (whether by re-arranging, altering or erasing the programme or data in whole or part or otherwise); or adversely affect the user experience, including worms, Trojan horses, viruses, malicious code and other similar things or devices.