Network Security and Malicious Events Sample Clauses

Network Security and Malicious Events. Unless specifically otherwise agreed to in an applicable Order, it is Client’s sole responsibility to determine whatever actions deemed necessary to make Client’s data and voice networks and circuits secure from unauthorized access. Hardware firewall must be in place. Wireless data traffic in the environment must be securely encrypted. Provider is not responsible for the security of Client’s network and circuits from third parties, or for any damages that may result from any unauthorized access to Client’s network. Client has an affirmative obligation to protect Client’s network environment, and to train its employees for spam, malware, phishing, virus protection, and prevention from criminal acts of third parties. Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. If a security system for Client’s network is included within the Services to be provided by Provider, Provider agrees to use commercially reasonable efforts to protect Client’s network from malicious attacks by computer viruses, computer worms, and/or computer hackers (collectively, “malicious activities”). However, Client understands that no security system can guarantee complete protection against malicious activities as such attacks often involve the intentional action by third parties to invade and injure computer systems. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY, OR DAMAGE TO CLIENT OR ANY HARDWARE, SOFTWARE, AND/OR COMPUTER DATA OF CLIENT CAUSED BY SUCH MALICIOUS ACTIVITIES. Third-Party Criminal Activity Provider is not responsible for criminal acts of third parties, including but not limited to intrusions or unauthorized access of any kind, hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. CLIENT AGREES TO PAY XXXXXX OR HOLD PROVIDER HARMLESS FOR ANY ACTIVITY AFFECTING NETWORK SECURITY ON CLIENT’S ENVIRONMENT RELATED TO THIRD-PARTY CRIMINAL ACTIVITY, NETWORK SECURITY, OR PRIVACY. Any costs or fees to rebuild or service machines will be billed at provider’s then- prevailing hourly rates. Theft of Service Client shall notify Provider immediately, in writing, by electronic mail or by calling the Provider customer support line, if Client becomes aware at any time that the Services are being stolen or used fraudulently. Failure to do so in a timely manner may result in the immediate termination of the Services ...
AutoNDA by SimpleDocs
Network Security and Malicious Events. Unless specifically otherwise agreed to in an applicable Service Attachment, it is Client’s sole responsibility to determine whatever actions deemed necessary to make Client’s data and voice networks and circuits secure from unauthorized access. Hardware firewall must be in place. Wireless data traffic in the environment must be securely encrypted. Provider is not responsible for the security of your network and circuits from third parties, or for any damages that may result from any unauthorized access to your network. You have an affirmative obligation to protect your network environment, and to train your employees for spam, malware, virus protection, and prevention from criminal acts of third parties. Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. You agree to pay xxxxxx or hold provider harmless for any activity effecting network security on your environment. If a security system for Client’s network is included within the Services to be provided by Provider, Provider agrees to use commercially reasonable efforts to protect Client’s network from malicious attack by computer viruses, computer worms and/or computer hackers (collectively, “malicious activities”). However, Client understands that no security system can guaranty complete protection against malicious activities as such attacks often involve the intentional action by third parties to invade and injure computer systems. THEREFORE, CLIENT AGREES TO HOLD PROVIDER HARMLESS FROM ANY LOSS, INJURY OR DAMAGE TO CLIENT OR ANY HARDWARE, SOFTWARE, AND/OR COMPUTER DATA OF CLIENT CAUSED BY SUCH MALICIOUS ACTIVITIES. Theft of Service Client shall notify us immediately, in writing, by electronic mail or by calling the Provider customer support line, if Client becomes aware at any time that the Services are being stolen or used fraudulently. Failure to do so in a timely manner may result in the immediate termination of the Services and additional charges to billed to you. Client will be liable for all use of the Service using Equipment stolen from you and any and all stolen Service or fraudulent use of the Services. Credits will not be issued for charges resulting from fraud that arises out of third parties hacking into any Equipment. This includes, but is not limited to, modem hijacking, wireless hijacking or other fraud arising out of a failure of your internal/corporate procedure...
Network Security and Malicious Events. In performing the Services, AGILITY shall utilize cyber- security practices and technology that are in accordance with industry standards as of the date of performance. Unless specifically agreed in a Service Contract for the provision of cyber-security consulting services, AGILITY is not undertaking a duty to update the Client’s existing network, systems or environment or any previously- performed Services or to provide any advice, monitoring or other services related to cyber-security services, and AGILITY shall not be responsible for the security of your computer network, voice circuits or other systems, or any other aspect of your environment nor shall AGILITY be liable for any damages resulting from a Cyber-Attack, as defined below (except to the extent, if any, that the Cyber-Attack is attributable to a breach of the obligation set forth in the first sentence of this section, in which case AGILITY liability shall be limited in accordance with the general limitation of liability set forth in Section 13.1). WITHOUT LIMITING THE FOREGOING, AGILITY SHALL HAVE NO LIABILITY FOR DAMAGES RELATED TO SECURITY DEFECTS IN COMMERCIALLY-AVAILABLE SOFTWARE, HARDWARE OR OTHER PRODUCTS AND SERVICES THAT ARE SUBSEQUENTLY FOUND TO EXIST (REGARDLESS OF WHETHER THE PRODUCTS AND SERVICES IN QUESTION ARE RELATED TO CYBER- SECURITY OR ARE USED FOR INFORMATION TECHNOLOGY MANAGEMENT, BUSINESS PRODUCTIVITY OR OTHER PURPOSES).
Network Security and Malicious Events. Unless specifically otherwise agreed to in an applicable Order, it is Client’s sole responsibility to determine whatever actions deemed necessary to make Client’s data and voice networks and circuits secure from unauthorized access. Hardware firewall must be in place. Wireless data traffic in the environment must be securely encrypted. Provider is not responsible for the security of Client’s network and circuits from third parties, or for any damages that may result from any unauthorized access to Client’s network. Client has an affirmative obligation to protect Client’s network environment, and to train its employees for spam, malware, phishing, virus protection, and prevention from criminal acts of third parties. Provider is not responsible for criminal acts of third parties, including but not limited to hackers, phishers, crypto-locker, and any network environment subject to xxxxxx. If a security system for Client’s network is included within the Services to be provided by Provider, Provider agrees to use its best efforts to protect Client’s network from malicious attacks by computer viruses, computer worms, and/or computer hackers (collectively, “malicious activities”). However, Client understands that no security system can guarantee complete protection against malicious activities as such attacks often involve the intentional action by third parties to invade and injure computer systems.

Related to Network Security and Malicious Events

  • Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • SAFEGUARDING CHILDREN AND VULNERABLE ADULTS 8.1 The Service Provider will have ultimate responsibility for the management and control of any Regulated Activity provided under this agreement and for the purposes of the Safeguarding Vulnerable Groups Xxx 0000.

  • Network Security 10.1 Protection of Service and Property. Each Party shall exercise the same degree of care to prevent harm or damage to the other Party and any third parties, its employees, agents or End User Customers, or their property as it employs to protect its own personnel, End User Customers and property, etc.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Network Security and Privacy Liability Insurance During the term of this Contract, Supplier will maintain coverage for network security and privacy liability. The coverage may be endorsed on another form of liability coverage or written on a standalone policy. The insurance must cover claims which may arise from failure of Supplier’s security resulting in, but not limited to, computer attacks, unauthorized access, disclosure of not public data – including but not limited to, confidential or private information, transmission of a computer virus, or denial of service. Minimum limits: $2,000,000 per occurrence $2,000,000 annual aggregate Failure of Supplier to maintain the required insurance will constitute a material breach entitling Sourcewell to immediately terminate this Contract for default.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!