No Trojan Horse or Others Similar Routines Sample Clauses

No Trojan Horse or Others Similar Routines. CMI warrants that SEVOCITY® does not contain any virus, “Trojan horse,” “worm,” or other software routines designed to permit unauthorized access, to disable, erase, or otherwise harm software, hardware or data, or to perform any other similar actions.
AutoNDA by SimpleDocs
No Trojan Horse or Others Similar Routines. REGION 7 ESC warrants that DMAC does not contain any virus, “Trojan horse,” “worm,” or other software routines designed to permit unauthorized access, to disable, erase, or otherwise harm software, hardware or data, or to perform any other similar actions.
No Trojan Horse or Others Similar Routines. CMI warrants that SEVOCITY® does not contain any virus, “Trojan horse,” “worm,” or other software routines designed to permit unauthorized access, to disable, erase, or otherwise harm software, hardware or data, or to perform any other similar actions. SEVOCITY® Services Agreement/7040.29 (June 2021) 7.4 Availability and Performance. Uptime for SEVOCITY® shall be seven (7) days a week, twenty-four (24) hours a day (“S cheduled Uptime”), provided that upon notice to the Licensee at least seventy-two (72) hours in advance, CMI may provide for scheduled downtime for maintenance (“Scheduled Downtime”). CMI warrants to Licensee for the term of the Agreement that SEVOCITY® shall be available for use by Licensee as set forth in the Agreement in substantially its full core functionality for a minimum of 99.5% of the Scheduled Uptime on a monthly basis, excluding Scheduled Downtime (“P erformance Criteria”). If the breach of warranty or failure results in Uptime being less than the specified Performance Criteria for two (2) consecutive months or for four (4) months in any consecutive twelve (12) month period, then Licensee’s sole remedy is as follows:

Related to No Trojan Horse or Others Similar Routines

  • Unbundled Network Element Combinations 4.1 For purposes of this Section, references to “Currently Combined” Network Elements shall mean that the particular Network Elements requested by NewPhone are in fact already combined by BellSouth in the BellSouth network. References to “

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Overload Teaching Paragraph 1: Overload teaching is that teaching conducted by a full-time classroom teacher teaching daily in a vacant position during his/her planning period.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Streaming The Licensee is entitled to an unlimited amount audio streams (on all streaming platforms such as Spotify) and unlimited video streams (on all platforms supporting video such as Youtube) for the song(s) created with the composition. All streaming royalties generated by the Licensee's song(s) belong to the Licensee.

  • Subloop Elements 2.8.1 Where facilities permit, BellSouth shall offer access to its Unbundled Subloop (USL) elements as specified herein.

  • Platforms Except where explicitly stated otherwise, these terms apply to Optimized Service (denoted with a “+” and sometimes referred to as Rapid Delivery) and non-Optimized Services Ethernet Access and Network Services Local Access Service. In particular, standard and optional features that apply to both are set out in this General Section 1. Section 2 (Available Versions) describes the characteristics particular to Optimized Service – Access +, and then to the non-Optimized Services – Ethernet Access and Network Services Local Access Service.

  • Video This restriction includes, but is not limited to, use of the Beat and/or New Song in television, commercials, film/movies, theatrical works, video games, and in any other form on the Internet which is not expressly permitted herein.

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

Time is Money Join Law Insider Premium to draft better contracts faster.