The Supplier must not. 15.1.1 introduce or permit the introduction into the State’s ICT Infrastructure or a Customer’s ICT Infrastructure of any software, including, but not limited to, Malicious Software, unless its introduction has been authorised in writing by the State or a Customer; or 15.1.2 undertake, facilitate or permit any unauthorised communication with the State’s ICT Infrastructure or a Customer’s ICT Infrastructure that has the effect or purpose of disrupting, damaging or degrading the performance of that infrastructure, for example a “denial of service attack”.
Appears in 2 contracts
Samples: Panel Agreement, Panel Agreement
The Supplier must not. 15.1.1 13.1.1 introduce or permit the introduction into the State’s ICT Infrastructure or a Customer’s ICT Infrastructure of any software, including, but not limited to, Malicious Software, unless its introduction has been authorised in writing by the State or a Customer; or
15.1.2 13.1.2 undertake, facilitate or permit any unauthorised communication with the State’s ICT Infrastructure or a Customer’s ICT Infrastructure that has the effect or purpose of disrupting, damaging or degrading the performance of that infrastructure, for example a “denial of service attack”.
Appears in 2 contracts
Samples: Low Risk Ict Projects Agreement, Low Risk Ict Projects Agreement
The Supplier must not. 15.1.1 introduce or permit the introduction into the State’s ICT Infrastructure or a CustomeraCustomer’s ICT Infrastructure of any software, including, but not limited notlimited to, Malicious Software, unless its introduction has been authorised beenauthorised in writing by the State or a Customer; or
15.1.2 undertake, facilitate or permit any unauthorised communication with communicationwith the State’s ICT Infrastructure or a Customer’s ICT Infrastructure that has the effect or purpose of purposeof disrupting, damaging or degrading the performance of that infrastructure, for example a “denial of service attack”.
Appears in 1 contract
Samples: Panel Agreement
The Supplier must not. 15.1.1 introduce or permit the introduction into the State’s ICT Infrastructure or a Customer’s ICT Infrastructure of any software, including, but not limited to, Malicious Software, unless its introduction has been authorised in writing by the State or a Customer; or
15.1.2 undertake, facilitate or permit any unauthorised communication with the State’s ICT Infrastructure or a Customer’s ICT Infrastructure that has the effect or purpose of disrupting, damaging or degrading the performance of that infrastructure, for example a “denial of service attack”.
Appears in 1 contract
Samples: Panel Agreement