Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.
Minor Damage In the event that a Property is damaged or destroyed by fire or other casualty prior to the Closing, and the cost of Repairs is equal to or less than ten percent (10%) of the Purchase Price for such Property, then this transaction shall be closed in accordance with Section 11.3, notwithstanding such casualty. In such event, applicable Seller may at its election endeavor to make such Repairs to the extent of any recovery from insurance carried on the Property, if such Repairs can be reasonably effected before the Closing. Regardless of applicable Seller’s election to commence such Repairs, or applicable Seller’s ability to complete such Repairs prior to Closing, this transaction shall be closed in accordance with Section 11.3 below.
Windstorm or hail This peril does not include loss to the property contained in a building caused by rain, snow, sleet, sand or dust unless the direct force of wind or hail damages the building causing an opening in a roof or wall and the rain, snow, sleet, sand or dust enters through this opening. This peril includes loss to watercraft and their trailers, furnishings, equipment, and outboard engines or motors, only while inside a fully enclosed building.
Major Damage In the event of Major Damage to a Property prior to the Closing Date, then the applicable Seller shall have no obligation to repair such Major Damage and shall notify Purchaser in writing of such damage or destruction (the “Damage Notice”). Within ten (10) days after Purchaser’s receipt of the Damage Notice, Purchaser may elect at its option to give a Termination Notice for the damaged Property to Seller’s Representative. If Purchaser does not elect to terminate this Agreement with respect to the damaged Property, this transaction shall be closed in accordance with the terms of this Agreement either, at the election of the applicable Seller, (a) for the full Purchase Price for the damaged Property notwithstanding any such damage or destruction, and Purchaser shall, at Closing, execute and deliver an assignment and assumption (in a form reasonably required by the applicable Seller) of such Seller’ rights and obligations with respect to the insurance claim and related to such casualty, and thereafter Purchaser shall receive all remaining insurance proceeds pertaining to such claim (plus a credit against the applicable Purchase Price at Closing in the amount of any deductible payable by the applicable Seller in connection therewith and not spent by such Seller for demolition, site cleaning, restoration or other repairs); or (b) Purchaser shall receive a credit against the Base Purchase Price for the damaged Property for the full replacement costs of repair to the subject Property, plus, to the extent covered by such Seller’s insurance policy, any costs required pursuant to local code or zoning requirements, as determined by an independent third party reasonably acceptable to such Seller and Purchaser. In the event a Seller elects to assign such Seller's rights and obligations with respect to the insurance claim and related casualty to Purchaser as provided above, and if an AIMCO employee is the adjuster for the claim related thereto, Sellers covenant and agree that the adjuster shall act in accordance with standard insurance industry protocols in processing such claim (including, without limitation, the time taken to process such claim).
Anti-Terrorism The Contractor agrees to undertake all reasonable efforts to ensure that none of the UNDP funds received under the Contract is used to provide support to individuals or entities associated with terrorism and that recipients of any amounts provided by UNDP hereunder do not appear on the list maintained by the Security Council Committee established pursuant to Resolution 1267 (1999). The list can be accessed via xxxxx://xxx.xx.xxx/sc/suborg/en/sanctions/1267/aq_sanctions_list. This provision must be included in all sub-contracts or sub-agreements entered into under the Contract.
Loss or Damage The District and its agents and authorized representatives shall not in any way or manner be answerable or suffer loss, damage, expense, or liability for any loss or damage that may happen to the Work, or any part thereof, or in or about the same during its construction and before acceptance, and the Contractor shall assume all liabilities of every kind or nature arising from the Work, either by accident, negligence, theft, vandalism, or any cause whatsoever; and shall hold the District and its agents and authorized representatives harmless from all liability of every kind and nature arising from accident, negligence, or any cause whatsoever.
Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.
Insurance, Subcontractor's Public Liability and Property Damage The Contractor shall require each of its subcontractors to secure and maintain during the life of the subcontract, insurance of the type specified in this Contract, or, the Contractor may insure the activities of its subcontractors in the Contractor’s policy, as specified in this Contract.
Vandalism Vandalism will result in cancellation of privileges. Vandalism is defined as any malicious attempt to harm or destroy data of another user, Internet, or any of the above listed agencies or other networks that are connected to any of the Internet backbones. This includes, but not limited to, the uploading or creation of computer viruses.