Common use of Security Acknowledgement Clause in Contracts

Security Acknowledgement. Due to the continual development of new techniques for intruding upon and attacking networks, systems, and/or Computers, Trend Micro does not represent, warrant or guarantee: (1) that Products will detect, block, or completely remove, or clean any or all applications, routines, and files that are malicious, fraudulent or that Company does not use or want; or (2) that any Product or any data, equipment, system or network on which a Product is used (or protects) will be free of vulnerability to intrusion or attack. Company agrees that the success of security efforts and the operation and protection of its Computers, networks, and data are dependent on factors solely under Company’s control and responsibility, including, but not limited to: (a) the design, implementation, deployment, and use of hardware and software security tools in a coordinated effort to manage security threats; (b) the selection, implementation, and enforcement of appropriate internal security policies, procedures and controls regarding access, security, encryption, use, and transmission of data; (c) development of, and ongoing enforcement of, processes and procedures for the backup and recovery of any system, software, database, and any stored data; and (d) diligently and promptly downloading and installing all Updates to Products made available to Company.

Appears in 4 contracts

Samples: Global Business Software and Appliance Agreement, Business Software and Appliance Agreement, Trend Micro Global Business Software and/or Appliance Agreement

AutoNDA by SimpleDocs

Security Acknowledgement. Due to the continual development of new techniques for intruding upon and attacking networks, systems, and/or Computers, Trend Micro TXOne Networks does not represent, warrant or guarantee: : (1) that Products will detect, block, or completely remove, or clean any or all applications, routines, and files that are malicious, fraudulent or that Company does not use or want; or (2) that any Product or any data, equipment, system or network on which a Product is used (or protects) will be free of vulnerability to intrusion or attack. Company agrees that the success of security efforts and the operation and protection of its Computers, networks, and data are dependent on factors solely under Company’s control and responsibility, including, but not limited to: (a) the design, implementation, deployment, and use of hardware and software security tools in a coordinated effort to manage security threats; (b) the selection, implementation, and enforcement of appropriate internal security policies, procedures and controls regarding access, security, encryption, use, and transmission of data; (c) development of, and ongoing enforcement of, processes and procedures for the backup and recovery of any system, software, database, and any stored data; and (d) diligently and promptly downloading and installing all Updates to Products made available to Company.

Appears in 2 contracts

Samples: Txone Networks Global Business Software and/or Appliance Agreement, Txone Networks Global Business Software and/or Appliance Agreement

AutoNDA by SimpleDocs

Security Acknowledgement. Due to the continual development of new techniques for intruding upon and attacking networks, systems, and/or Computers, Trend Micro TXOne Networks does not represent, warrant or guarantee: (1) that Products will detect, block, or completely remove, or clean any or all applications, routines, and files that are malicious, fraudulent or that Company does not use or want; or (2) that any Product or any data, equipment, system or network on which a Product is used (or protects) will be free of vulnerability to intrusion or attack. Company agrees that the success of security efforts and the operation and protection of its Computers, networks, and data are dependent on factors solely under Company’s control and responsibility, including, but not limited to: (a) the design, implementation, deployment, and use of hardware and software security tools in a coordinated effort to manage security threats; (b) the selection, implementation, and enforcement of appropriate internal security policies, procedures and controls regarding access, security, encryption, use, and transmission of data; (c) development of, and ongoing enforcement of, processes and procedures for the backup and recovery of any system, software, database, and any stored data; and (d) diligently and promptly downloading and installing all Updates to Products made available to Company.

Appears in 1 contract

Samples: Business Software and Appliance Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!