SOFTWARE VIRUS PROTECTION Sample Clauses

SOFTWARE VIRUS PROTECTION. 44 ARTICLE V................................................................... 45
AutoNDA by SimpleDocs
SOFTWARE VIRUS PROTECTION. 19.1 Supplier represents and warrants to SWCO that the Software provided to SWCO by Supplier does not contain or will not contain any Self-Help Code or any Unauthorized Code (defined below).
SOFTWARE VIRUS PROTECTION. 18.1 Metawave represents and warrants to BAM that the Software provided to BAM by Metawave does not contain or will not contain any Self-Help Code or any Unauthorized Code (defined below).
SOFTWARE VIRUS PROTECTION. SMSI represents and warrants to Verizon Wireless that the Software provided to Verizon Wireless by SMSI does not contain or will not contain any Self-Help Code or any Unauthorized Code (defined below). SMSI shall remove promptly any such Self-Help Code or Unauthorized Code in the Software of which it is notified or may discover. SMSI shall indemnify Verizon Wireless against any loss or expense arising out of any breach of this warranty. As used in this Agreement, "Self-Help Code" means any back door, "time bomb", drop dead device, or other software routine designed to disable a computer program automatically with the passage of time or under the positive control of a person other than a licensee of the program. Self-Help Code does not include software routines in a computer program, if any, designed to permit the licenser of the computer program (or other person acting by authority of the licensor) to obtain access to a licensee's computer system(s) (e.g., remote access via modem) 7 <PAGE> CONTRACT NO. 220-00-0134 for purposes of maintenance or technical support. As used in this Agreement, "Unauthorized Code" means any virus, Trojan horse, worm, or any other software routines or hardware components designed to permit unauthorized access to disable, erase, or otherwise harm software, hardware, or data or to perform any other such actions. The term Unauthorized Code does not include Self-Help Code. 8.8 LIMITATION OF LIABILITY. THE FOREGOING WARRANTIES ARE IN LIEU OF ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. SMSI MAKES NO AND SPECIFICALLY DISCLAIMS ALL REPRESENTATIONS GUARANTEES AND WARRANTIES TO ANY PERSON OR ENTITY REGARDING THE USE OR THE RESULTS OF THE USE OF THE SOFTWARE THIS SECTION SHALL NOT APPLY TO INDEMNITY, IP INFRINGEMENT AND COMPLIANCE WITH LAWS. SECTION IX. INDEMNIFICATION 9.1
SOFTWARE VIRUS PROTECTION. SMSI represents and warrants to Verizon Wireless that the Software provided to Verizon Wireless by SMSI does not contain or will not contain any Self-Help Code or any Unauthorized Code (defined below). SMSI shall remove promptly any such Self-Help Code or Unauthorized Code in the Software of which it is notified or may discover. SMSI shall indemnify Verizon Wireless against any loss or expense arising out of any breach of this warranty.
SOFTWARE VIRUS PROTECTION. 17.3.1 Intellisync represents and warrants to Verizon Wireless that the Customized Software does not contain or will not contain any Self-Help Code or any Unauthorized Code. Intellisync shall remove promptly any such Self-Help Code or Unauthorized Code in the Customized Software of which it is notified or may discover. Intellisync shall indemnify Verizon Wireless against any loss or expense arising out of any breach of this warranty. Intellisync/Verizon Wireless Proprietary and Confidential ***Confidential treatment requested pursuant to a request for confidential treatment filed with the Securities and Exchange Commission. Omitted portions have been filed separately with the Commission.

Related to SOFTWARE VIRUS PROTECTION

  • Whistleblower Protections and Trade Secrets Notwithstanding anything to the contrary contained herein, nothing in this Agreement prohibits Executive from reporting possible violations of federal law or regulation to any United States governmental agency or entity in accordance with the provisions of and rules promulgated under Section 21F of the Securities Exchange Act of 1934 or Section 806 of the Xxxxxxxx-Xxxxx Act of 2002, or any other whistleblower protection provisions of state or federal law or regulation (including the right to receive an award for information provided to any such government agencies). Furthermore, in accordance with 18 U.S.C. § 1833, notwithstanding anything to the contrary in this Agreement: (i) Executive shall not be in breach of this Agreement, and shall not be held criminally or civilly liable under any federal or state trade secret law (x) for the disclosure of a trade secret that is made in confidence to a federal, state, or local government official or to an attorney solely for the purpose of reporting or investigating a suspected violation of law, or (y) for the disclosure of a trade secret that is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal; and (ii) if Executive files a lawsuit for retaliation by the Company for reporting a suspected violation of law, Executive may disclose the trade secret to Executive’s attorney, and may use the trade secret information in the court proceeding, if Executive files any document containing the trade secret under seal, and does not disclose the trade secret, except pursuant to court order.

  • Data Protection All personal data contained in the agreement shall be processed in accordance with Regulation (EC) No 45/2001 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by the EU institutions and bodies and on the free movement of such data. Such data shall be processed solely in connection with the implementation and follow-up of the agreement by the sending institution, the National Agency and the European Commission, without prejudice to the possibility of passing the data to the bodies responsible for inspection and audit in accordance with EU legislation (Court of Auditors or European Antifraud Office (XXXX)). The participant may, on written request, gain access to his personal data and correct any information that is inaccurate or incomplete. He/she should address any questions regarding the processing of his/her personal data to the sending institution and/or the National Agency. The participant may lodge a complaint against the processing of his personal data with the [national supervising body for data protection] with regard to the use of these data by the sending institution, the National Agency, or to the European Data Protection Supervisor with regard to the use of the data by the European Commission.

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • Anti-Dilution Protection In the event that the Company consummates a sale of Common Stock for cash consideration (a “Financing”) prior to January 1, 2018 (such applicable period, the “Anti-Dilution Period”), and the price per share of such Common Stock shares sold in such Financing (the “Per Share Price”) is less than $0.15 per share (the “Anti-Dilution Price”)(each as adjusted for stock splits, dividends, recapitalizations and the like), the Subscriber who purchased Shares hereunder shall receive such additional number of Shares equal to (i) the aggregate Purchase Price paid by the Subscriber, divided by (ii) the price that Common Stock was sold at in the Financing (or any subsequent Financing where the Per Share Price is less than the prior Anti-Dilution Price), minus (iii) the total aggregate Shares issued to the Subscriber at the time of his, her or its entry into this Agreement plus any additional Shares previously issued to the Subscriber pursuant to the terms of this Section H. Each time that additional Shares are issued to the Subscriber under this Section H, the “Anti-Dilution Price” shall be deemed to reset and equal the lowest Per Share Price for all Financings to date through the Anti-Dilution Period, immediately after such applicable issuance of Shares. Notwithstanding the above, no Shares will be issued to the Subscriber pursuant to this Section H and no anti-dilution rights hereunder will apply (i) upon the exercise of any warrants, options or convertible securities granted, issued and outstanding on the date of this Agreement; (ii) upon the grant or exercise of any stock or options which may hereafter be granted or exercised under any employee benefit plan, stock option plan or restricted stock plan of the Company now existing or to be implemented in the future; (iii) upon the issuance of any securities in connection with an acquisition by the Company; (iv) upon the issuance of any securities pursuant to a commitment by the Company that has been previously disclosed prior to the date hereof; (v) in connection with any public offering of securities; (vi) in connection with the sale, exercise or conversion of any convertible securities, warrants or options; or (vii) in connection with the issuance of shares of Common Stock other than for cash consideration.

  • Cybersecurity; Data Protection To the Company’s knowledge, the Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company and its subsidiaries have implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect their material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (collectively, the “Personal Data”)) used in connection with their businesses, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same, except in each case as would not reasonably be expected to have a Material Adverse Effect. The Company and its subsidiaries are presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification.

  • Intellectual Property Protection The Group Companies shall establish and maintain appropriate intellectual inspection system to protect the Proprietary Rights of the Group Companies. The Group Companies shall, and the Founders shall cause the Group Companies to fully comply with the laws and regulations in respect of the protection of the Proprietary Rights and refrain from infringing the Proprietary Rights of other parties. Ecommerce Company shall, and the other Warrantors shall procure Ecommerce Company to, use its best efforts to obtain as soon as possible and maintain the registration of the core trademarks used in the Business (including without limitation, the marks of “perfect diary”, “完美日记” and the combination of the foregoing) in the appropriate goods and services (including without limitation, cosmetics, cosmetics tools and advertisement). The Group Companies shall take all necessary or desirable actions to protect their trademarks, including initiating trademark petitions against any trademark applications filed by any third party for a trademark identical or similar to the Group Companies’ trademarks.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto.

  • Privacy Act If performance involves design, development or operation of a system of records on individuals, this Agreement incorporates by reference FAR 52.224-1 Privacy Act Notification (Apr 1984) and FAR 52.224-2 Privacy Act (Apr 1984).

  • Third-Party Information; Privacy or Data Protection Laws Each Party acknowledges that it and members of its Group may presently have and, following the Effective Time, may gain access to or possession of confidential or proprietary information of, or personal information relating to, Third Parties (i) that was received under confidentiality or non-disclosure agreements entered into between such Third Parties, on the one hand, and the other Party or members of such Party’s Group, on the other hand, prior to the Effective Time; or (ii) that, as between the two Parties, was originally collected by the other Party or members of such Party’s Group and that may be subject to and protected by privacy, data protection or other applicable Laws. Each Party agrees that it shall hold, protect and use, and shall cause the members of its Group and its and their respective Representatives to hold, protect and use, in strict confidence the confidential and proprietary information of, or personal information relating to, Third Parties in accordance with privacy, data protection or other applicable Laws and the terms of any agreements that were either entered into before the Effective Time or affirmative commitments or representations that were made before the Effective Time by, between or among the other Party or members of the other Party’s Group, on the one hand, and such Third Parties, on the other hand.

  • Waiver of Anti-dilution Protection The Sponsor and each Class B Holder hereby irrevocably (a) waives, subject to, and conditioned upon, the occurrence of the Closing, to the fullest extent permitted by law, and (b) agrees not to assert or perfect, any rights to adjustment or other anti-dilution protections in connection with the transactions contemplated by the Merger Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.