Protection from Malicious Software Sample Clauses

Protection from Malicious Software. (Addressable)
AutoNDA by SimpleDocs
Protection from Malicious Software. GCHD will undertake strong measures to protect against the introduction of malicious software into its information system. Security training will educate employees on guarding against, protecting from and reporting of malicious software, which may include: a. The danger of malicious software or any other agent that can destroy or alter data; b. The use of ant-virus protection software; c. Not opening or downloading files from an unknown or suspicious source; and d. External files being loaded on to the computer through a USB drive or other source.
Protection from Malicious Software. The Company uses hardware and anti-virus software that scans email attachments and other downloadable files. Every Workstation will have anti-virus software installed and activated. Virus signature files will be routinely updated. Workforce members will be instructed not to open emails unless the message was expected in the course of business or was sent by a source known to the recipient.

Related to Protection from Malicious Software

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Protection of Personal Information Party agrees to comply with all applicable state and federal statutes to assure protection and security of personal information, or of any personally identifiable information (PII), including the Security Breach Notice Act, 9 V.S.A. § 2435, the Social Security Number Protection Act, 9 V.S.A. § 2440, the Document Safe Destruction Act, 9 V.S.A. § 2445 and 45 CFR 155.260. As used here, PII shall include any information, in any medium, including electronic, which can be used to distinguish or trace an individual’s identity, such as his/her name, social security number, biometric records, etc., either alone or when combined with any other personal or identifiable information that is linked or linkable to a specific person, such as date and place or birth, mother’s maiden name, etc.

  • Safeguarding and Protecting Children and Vulnerable Adults The Supplier will comply with all applicable legislation and codes of practice, including, where applicable, all legislation and statutory guidance relevant to the safeguarding and protection of children and vulnerable adults and with the British Council’s Child Protection Policy, as notified to the Supplier and amended from time to time, which the Supplier acknowledges may include submitting to a check by the UK Disclosure & Barring Service (DBS) or the equivalent local service; in addition, the Supplier will ensure that, where it engages any other party to supply any of the Services under this Agreement, that that party will also comply with the same requirements as if they were a party to this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!