Virus/Malware Scanning Sample Clauses

Virus/Malware Scanning. Provider shall use up-to-date, industry standard, commercial virus/malware scanning software that identifies malicious code on all of its systems that collect, use, disclose, store, retain or otherwise Process Uber Personal Data. Exhibit C Project Plan #1 Exhibit D Platform Access Agreement This Platform Access Agreement (this “PAA”) is by and among Serve Robotics, Inc. (“you”) and Xxxxxxx, LLC , a subsidiary of Uber Technologies, Inc. (“Uber”). This PAA governs your access to our Platform (defined below) which facilitates your provision of delivery services to (1) account holders seeking to access certain types of delivery services (“Delivery Recipients”) for themselves and/or their guests and (2) merchants providing the goods for delivery services (“Merchants”). For the sake of clarity and depending on the context, references to “we,” “our” and “us” may also refer to Uber and references to “you” or “your” mean Serve Robotics, Inc. (the “Company”) and/or, depending on the context, your Delivery Providers, as defined below. All capitalized terms not defined in this PAA will have the meanings set forth in that certain Master Framework Agreement executed between Serve Robotics, Inc. and Uber dated September 3rd, 2021 (“Framework Agreement”). Access to our technology platform includes access to our technology application (the “Driver App”) that, amongst other things, facilitates delivery transactions between you and Delivery Recipients; as well as websites and all other associated services, including payment and support services, provided by Uber, its affiliates or third parties (collectively, our “Platform”). Your access to our Platform is also governed by the applicable terms found on our website, including without limitation, the Community Guidelines, Referral Policies, other applicable Uber standards and policies (including, without limitation, Uber’s safety standards and accessibility policies) and any other agreements you have with us (including those related to how you choose to interact with our Platform, the services you choose to provide and where you chose to provide them) (collectively with this PAA, this “Agreement”), which are incorporated by reference into this Agreement. By accepting this Agreement, you confirm that you have read, understand and accept the provisions of this Agreement and intend to be bound by this Agreement. In the event of any conflict or inconsistency between this PAA or the Framework Agreement, on the one hand, and the for...
AutoNDA by SimpleDocs
Virus/Malware Scanning. PayU shall use commercial virus/malware scanning software on systems used by PayU to collect, use, disclose, store, retain or otherwise process Personal Information. For purposes of this agreement, “virus/malware” refers to any programming routines intended to damage, surreptitiously intercept or expropriate any system data or personal information. PayU shall run up-to-date industry standard anti-virus software and software that identifies malicious code on all PayU systems that contain Personal Information, including scanning all email attachments for malicious code. PayU shall use commercially reasonable efforts to protect its own information technology against malicious code and ensure that its connection to the Internet and for any other platform or network running the Services is secure, and shall in accordance with industry standards and its own information security practices, acquire and implement new technology, including monitoring hardware and software, as the technology becomes available and is proven stable, in PayU’s reasonable discretion, to ensure a secure and stable environment.

Related to Virus/Malware Scanning

  • Company Software “Company Software” means software (including firmware and other software embedded in hardware devices) owned, developed (or currently being developed), marketed, distributed, licensed, or sold by any of the Acquired Corporations and any software that is part of or is distributed with, any Company Product.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Open Source Software The Software product may include certain open source components that are subject to open source licenses (“Open Source Software”), in which case, the embedded Open Source Software is owned by a third party. The Open Source Software is not subject to the terms and conditions of this XXXX. Instead, each item of Open Source Software is licensed under its applicable license terms which accompanies such Open Source Software. Nothing in this XXXX limits your rights under, nor grants you rights that supersede, the terms and conditions of any applicable license terms for the Open Source Software. Any fees charged by GC in connection with the SOFTWARE, do not apply to the Open Source Software for which fees may not be charged under the applicable license terms. The terms and conditions of the applicable license for the Open Source Software are available on the LICENSE.txt file, which is provided with the SOFTWARE.

  • Access Control Supplier will maintain an appropriate access control policy that is designed to restrict access to Accenture Data and Supplier assets to authorized Personnel. Supplier will require that all accounts have complex passwords that contain letters, numbers, and special characters, be changed at least every 90 days, and have a minimum length of 8 characters.

Time is Money Join Law Insider Premium to draft better contracts faster.