Protection Against Malicious Code policies Sample Clauses

Protection Against Malicious Code policies. 2.3.1. Any software or files entering the ARCELORMITTAL internal network must be screened for virus by anti-virus software before general distribution, whatever the media.
AutoNDA by SimpleDocs

Related to Protection Against Malicious Code policies

  • Anti-Terrorism Neither Buyer or Seller, nor any of their affiliates, are in violation of any Anti-Terrorism Law (as hereinafter defined) or engages in or conspires to engage in any transaction that evades or avoids, or has the purpose of evading or avoiding, or attempts to violate, any of the prohibitions set forth in any Anti-Terrorism Law. “Anti-Terrorism Laws” shall mean any laws relating to terrorism or money laundering, including: Executive Order No. 13224; the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001, Public Law 107-56, as the same has been, or may hereafter be, renewed, extended, amended or replaced; the applicable laws comprising or implementing the Bank Secrecy Act; and the applicable laws administered by the United States Treasury Department’s Office of Foreign Asset Control (as any of the foregoing may from time to time be amended, renewed, extended, or replaced).

  • Malicious Code You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.

  • Protection Against Dilution If the Corporation, with respect to the Common Stock, (1) pays a dividend or makes a distribution on shares of Common Stock that is paid in shares of Common Stock or in securities convertible into or exchangeable for Common Stock (in which latter event the number of shares of Common Stock initially issuable upon the conversion or exchange of such securities shall be deemed to have been distributed), (2) subdivides outstanding shares of Common Stock, (3) combines outstanding shares of Common Stock into a smaller number of shares, or (4) issues by reclassification of Common Stock any shares of capital stock of the Corporation, the number of shares as to which this Warrant is exercisable as of the date of such event and the Exercise Price in effect immediately prior thereto shall be adjusted so that each Holder thereafter shall be entitled to receive the number and kind of shares of Common Stock or other capital stock of the Corporation that it would have owned or been entitled to receive in respect of this Warrant immediately after the happening of any of the events described above had this Warrant been converted immediately prior to the happening of that event; provided that the aggregate purchase price payable for the total numbers of shares of Common Stock purchasable under this Warrant shall remain the same. An adjustment made in accordance with this section shall become effective immediately after the record date, in the case of a dividend, and shall become effective immediately after the effective date, in the case of a subdivision, combination, or reclassification. If, as a result of an adjustment made in accordance with this Section 4, the Holder becomes entitled to receive shares of two or more classes of capital stock or shares of Common Stock and other capital stock of the Corporation, the board of directors (whose determination shall be conclusive) shall determine the allocation of the adjusted Exercise Rate between or among shares of such classes of capital stock or shares of Common Stock and other capital stock.

  • Security Against Unauthorized Use of Funds’ Recordkeeping Systems Financial Intermediary agrees to provide such security as is necessary to prevent any unauthorized use of the Funds’ recordkeeping system, accessed via (a) the world wide web or any URL maintained by the Funds or JPMDS, (b) a networking/data access arrangement or (c) computer hardware or software provided to Financial Intermediary by JPMDS.

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Prohibition Against Recording Except as provided in Section 29.4 of this Lease, neither this Lease, nor any memorandum, affidavit or other writing with respect thereto, shall be recorded by Tenant or by anyone acting through, under or on behalf of Tenant.

  • Security and Safeguarding Information (a) Confidential Information that contains Non-Public Personal Information about customers is subject to the protections created by the Xxxxx-Xxxxx-Xxxxxx Act of 1999 (the “Act”) and under the standards for safeguarding Confidential Information, 16 CFR Part 314 (2002) adopted by Federal Trade Commission (“FTC”) (the “Safeguards Rule”). Additionally, state specific laws may regulate how certain confidential or personal information is safeguarded. The parties agree with respect to the Non-Public Personal Information to take all appropriate measures in accordance with the Act, and any state specific laws, as are necessary to protect the security of the Non-Public Personal Information and to specifically assure there is no disclosure of the Non-Public Personal Information other than as authorized under the Act, and any state specific laws, and this Agreement. With respect to Confidential Information, including Non-Public Personal Information and Personally Identifiable Financial Information as applicable, each of the parties agrees that:

  • Protections Against Violations of Agreement No purported sale, assignment, mortgage, hypothecation, transfer, pledge, encumbrance, gift, transfer in trust (voting or other) or other disposition of, or creation of a security interest in or lien on, any of the Restricted Stock Units by any holder thereof in violation of the provisions of this Agreement or the Certificate of Incorporation or the Bylaws of the Company, will be valid, and the Company will not transfer any shares resulting from the settlement of Restricted Stock Units on its books nor will any of such shares be entitled to vote, nor will any dividends be paid thereon, unless and until there has been full compliance with such provisions to the satisfaction of the Company. The foregoing restrictions are in addition to and not in lieu of any other remedies, legal or equitable, available to enforce such provisions.

Time is Money Join Law Insider Premium to draft better contracts faster.