Virus Protection Warranty Sample Clauses

Virus Protection Warranty. Contractor hereby warrants and represents that, any time the Licensed Software, Hosted Services, or any Maintenance Release(s) are delivered to the JBE, whether delivered via electronic media or the internet, no portion of the Licensed Software, Hosted Services or Maintenance Release(s), or the media upon which it is stored or delivered, will have any type of software routine or other element which is designed to facilitate or is capable of facilitating: (i) unauthorized access to or intrusion upon; (ii) disabling or erasure of; or (iii) unauthorized interference with, the operation of any hardware, software, data or peripheral equipment of or utilized by the JBE, or any contamination which might impact the JBE’s network or data.
AutoNDA by SimpleDocs
Virus Protection Warranty. Consultant hereby warrants and represents that, any time the Software or any Maintenance Releases are delivered to Customer, whether delivered via electronic media or the Internet, no portion of the Software or Maintenance Releases, or the media upon which it is stored or delivered, will contain any computer programming code that damages or otherwise improperly affects data files or hardware without the knowledge or consent of the user, including but not limited to self-replicating and self-propagating program instructions commonly referred to as “viruses” or “worms” to the extent such viruses or worms are detectable by commercially available detection software. Consultant warrants that the Software shall be free from any back door, time bomb, drop dead-devise, or other software routing designed to disable a computer program automatically with the passage of time or under the positive control of persons other than the Customer’s personnel.
Virus Protection Warranty. Contractor hereby warrants and represents that, any time the Licensed Software or any Maintenance Release(s) are delivered to the JBE, whether delivered via electronic media or the internet, no portion of the Licensed Software or Maintenance Release(s), or the media upon which it is stored or delivered, will have any type of software routine or other element which is designed to facilitate or is capable of facilitating: (i) unauthorized access to or intrusion upon; (ii) disabling or erasure of; or (iii) unauthorized interference with, the operation of any hardware, software, data or peripheral equipment of or utilized by the JBE, or any contamination which might impact the JBE’s network or data.

Related to Virus Protection Warranty

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Xxxxx Disaster Protection In accordance with the requirements of the Flood Disaster Protection Act of 1973 (42 U.S.C. 4001), the Subrecipient shall assure that for activities located in an area identified by the Federal Emergency Management Agency (FEMA) as having special flood hazards, flood insurance under the National Flood Insurance Program is obtained and maintained as a condition of financial assistance for acquisition or construction purposes (including rehabilitation).

  • Fraud, Waste, and Abuse Contractor understands that HHS does not tolerate any type of fraud, waste, or abuse. Violations of law, agency policies, or standards of ethical conduct will be investigated, and appropriate actions will be taken. Pursuant to Texas Government Code, Section 321.022, if the administrative head of a department or entity that is subject to audit by the state auditor has reasonable cause to believe that money received from the state by the department or entity or by a client or contractor of the department or entity may have been lost, misappropriated, or misused, or that other fraudulent or unlawful conduct has occurred in relation to the operation of the department or entity, the administrative head shall report the reason and basis for the belief to the Texas State Auditor’s Office (SAO). All employees or contractors who have reasonable cause to believe that fraud, waste, or abuse has occurred (including misconduct by any HHS employee, Grantee officer, agent, employee, or subcontractor that would constitute fraud, waste, or abuse) are required to immediately report the questioned activity to the Health and Human Services Commission's Office of Inspector General. Contractor agrees to comply with all applicable laws, rules, regulations, and System Agency policies regarding fraud, waste, and abuse including, but not limited to, HHS Circular C-027. A report to the SAO must be made through one of the following avenues: ● SAO Toll Free Hotline: 1-800-TX-AUDIT ● SAO website: xxxx://xxx.xxxxx.xxxxx.xx.xx/ All reports made to the OIG must be made through one of the following avenues: ● OIG Toll Free Hotline 0-000-000-0000 ● OIG Website: XxxxxxXxxxxXxxxx.xxx ● Internal Affairs Email: XxxxxxxxXxxxxxxXxxxxxxx@xxxx.xxxxx.xx.xx ● OIG Hotline Email: XXXXxxxxXxxxxxx@xxxx.xxxxx.xx.xx. ● OIG Mailing Address: Office of Inspector General Attn: Fraud Hotline MC 1300 P.O. Box 85200 Austin, Texas 78708-5200

  • Whistle Blowing Protection The Employer agrees to adhere to the whistle blowing protection pursuant to the

  • PERSONAL DATA PROTECTION ACT 7.1. PAH is committed to protecting the privacy, confidentiality and security of all personal data to which it is entrusted. It has been our policy to ensure your personal information are protected. With the introduction of the Malaysian Personal Data Protection Act 2010 ("PDPA"), we are even committed to ensure the privacy and confidentiality and security of all personal data are protected in line with the PDPA. We process personal data which you have provided to us voluntarily through our website upon your registration and this includes personal data such as your name, address, NRIC and contact details. In this regards, you have expressly consent to our processing of your personal data. If you give us personal data or information about another person, you must first confirm that he/she has appointed you to act for him/her, to consent to the processing of his/her personal data and to receive on his/her behalf any data protection notices. We may request your assistance to procure the consent of such persons whose personal data is provided by you to us and you agree to do so. You shall indemnify us in the event we suffer loss and damage as a result of your failure to comply with the same. We will only retain your personal data for as long as necessary for the fulfilment of the specified purposes or as legislated 7.2. E-Bidders shall be responsible for the confidentiality and use of password and not to reveal the password to anyone at any time and under any circumstances whether intentionally or unintentionally. 7.3. E-Bidders agree to comply with all the security measures related to safety of the password or generally in respect of the use of the service. In the event that the password is compromised, the E-Bidders shall immediately notify PAH.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!