Virtual Security. You understand and agree that no security solution is one hundred percent effective, and any security paradigm may be circumvented and/or rendered ineffective by certain malware, such as certain ransomware or rootkits that were unknown to the malware prevention industry at the time of infection, and/or which are downloaded or installed into the Environment. We do not warrant or guarantee that any security-related product or solution implemented or facilitated by us will be capable of being detecting, avoiding, quarantining or removing all malicious code, spyware, malware, etc., or that any data deleted, corrupted, or encrypted by any of the foregoing (“Impacted Data”) will be recoverable. Unless otherwise expressly stated in a Quote, the recovery of Impacted Data is out-of-scope. Moreover, unless expressly stated in a Quote or Services Guide, we will not be responsible for activating multifactor authentication in any application in or connected to the Environment. You are strongly advised to (i) educate your employees to properly identify and react to “phishing” activity (i.e., fraudulent attempts to obtain sensitive information or encourage behavior by disguising oneself as a trustworthy entity or person through email), and (ii) obtain insurance against cyberattacks, data loss, malware-related matters, and privacy-related breaches, as such incidents can occur even under a “best practice” scenario. Unless a malware-related incident is caused by our intentionally malicious behavior or our gross negligence, we are held harmless from any costs, expenses, or damages arising from or related to such incidents.
Appears in 5 contracts
Samples: Master Services Agreement, Master Services Agreement, Master Services Agreement
Virtual Security. You understand and agree that no security solution is one hundred percent effective, and any security paradigm may be circumvented and/or rendered ineffective by certain malware, such as certain ransomware or rootkits that were unknown to the malware prevention industry at the time of infection, and/or which are downloaded or installed into the Environment. We do not warrant or guarantee that any security-related product or solution implemented or facilitated by us will be capable of being detecting, avoiding, quarantining quarantining, or removing all malicious code, spyware, malware, etc., or that any data deleted, corrupted, or encrypted by any of the foregoing (“Impacted Data”) will be recoverable. Unless otherwise expressly stated in a Quote, the recovery of Impacted Data is out-of-scope. Moreover, unless expressly stated in a Quote or Services Guide, we will not be responsible for activating multifactor authentication in any application in or connected to the Environment. You are strongly advised to (i) educate your employees to properly identify and react to “phishing” activity (i.e., fraudulent attempts to obtain sensitive information or encourage behavior by disguising oneself as a trustworthy entity or person through email), and (ii) obtain insurance against cyberattacks, data loss, malware-related matters, and privacy-related breaches, as such incidents can occur even under a “best practice” scenario. Unless a malware-related incident is caused by our intentionally malicious behavior or our gross negligence, we are held harmless from any costs, expenses, or damages arising from or related to such incidents.
Appears in 1 contract
Samples: Master Services Agreement
Virtual Security. You understand and agree that no security solution is one hundred percent effective, and any security paradigm may be circumvented and/or rendered ineffective by certain malware, such as certain ransomware or rootkits that were unknown to the malware prevention industry at the time of infection, and/or which are downloaded or installed into the Environment. We do not warrant or guarantee that any security-related product or solution implemented or facilitated by us will be capable of being detecting, avoiding, quarantining or removing all malicious code, spyware, malware, etc., or that any data deleted, corrupted, or encrypted by any of the foregoing (“Impacted Data”) will be recoverable. Unless otherwise expressly stated in a Quote, the recovery of Impacted Data is out-of-scope. Moreover, unless expressly stated in a Quote or Services Guide, we will not be responsible for activating multifactor authentication in any application in or connected to the Environment. You are strongly advised to (i) educate your employees to properly identify and react to “phishing” activity (i.e., fraudulent attempts to obtain sensitive information or encourage behavior by disguising oneself as a trustworthy entity or person through email), and (ii) obtain insurance against cyberattacks, data loss, malware-related matters, and privacy-related breaches, as such incidents can occur even under a “best practice” scenario. Unless a malware-related incident is caused by our intentionally malicious behavior or our gross negligence, we are held harmless from any costs, expenses, or damages arising from or related to such incidents.
Appears in 1 contract
Samples: Master Services Agreement
Virtual Security. You understand and agree that no security solution is one hundred percent effective, and any security paradigm may be circumvented and/or rendered ineffective by certain malware, through social engineering or such as certain ransomware or rootkits that were unknown to the malware prevention industry at the time of infection, and/or which are downloaded or installed into the Environment. You are responsible for the configuration and security of your Environment and Services acquired or provided by Covenant. Cybersecurity event investigation and remediation are not included in any Service provided by Covenant. We do not warrant or guarantee that any security-related product all malware or solution implemented or facilitated by us malicious activity will be capable of being detectingdetected, avoidingavoided, quarantining quarantined, or removing all malicious code, spyware, malware, etc.removed, or that any data deleted, corrupted, or encrypted by any of the foregoing such malware (“Impacted Data”) will be recoverable. Unless otherwise expressly stated in a Quote, the The recovery of Impacted Data is out-of-scope. Moreover, unless expressly stated in a Quote or Services Guide, we We will not be responsible for activating multifactor authentication in any application in or connected to the Environment. You are strongly advised to (i) educate your employees to properly identify and react to “phishing” activity (i.e., fraudulent attempts to obtain sensitive information or encourage behavior by disguising oneself as a trustworthy entity or person through email), and (ii) obtain insurance against cyberattacks, data loss, malware-related matters, and privacy-privacy- related breaches, as such incidents can occur even under a “best practice” scenario. Unless a malware-malware- related incident is caused by our intentionally malicious behavior or our gross negligence, we are held harmless from any costs, expenses, or damages arising from or related to such incidents.
Appears in 1 contract
Samples: Master Services Agreement
Virtual Security. You understand and agree that no security solution is measures are one hundred percent effective, and any security paradigm may be circumvented and/or rendered ineffective by certain malwaremalware and vulnerabilities, such as certain ransomware ransomware, rootkits, botnets, or rootkits other attack methods that were unknown to the malware prevention industry at the time of infection, and/or which are downloaded or installed into the Environment. We do not warrant or guarantee that any security-related product or solution implemented or facilitated by us will be capable of being detecting, avoiding, quarantining quarantining, or removing all malicious code, spyware, malware, etc., or that any data deleted, corrupted, or encrypted by any of the foregoing (“Impacted Data”) will be recoverable. Unless otherwise expressly stated in a Quote, the recovery of Impacted Data is out-of-scope. Moreover, unless expressly stated in a Quote or Services GuideService Plan, we will not be responsible for activating multifactor authentication in any application in or connected to the Environment. You are strongly advised to (i) educate your employees to properly identify and react to “phishing” activity (i.e., fraudulent attempts to obtain sensitive information or encourage behavior by disguising oneself as a trustworthy entity or person through email), and (ii) obtain . It is assumed that you have obtained insurance against cyberattacks, data loss, malware-related matters, and privacy-privacy- related breaches, as such incidents can occur even under a “best practice” scenario. Unless a malware-related incident is caused by our intentionally malicious behavior or our gross negligence, we are held harmless from any costs, expenses, or damages arising from or related to such incidents.
Appears in 1 contract