Viruses and Disabling Code Sample Clauses

Viruses and Disabling Code. Vendor represents, warrants and covenants that (a) Vendor will ensure that no computer viruses or similar items are coded or introduced into the Software or any systems used to perform the Services, and (b) Vendor will not insert into any Software any code which would have the effect of disabling or otherwise shutting down all or a portion of such Software or damaging any information or functionality.
AutoNDA by SimpleDocs
Viruses and Disabling Code. XXXX will use commercially reasonable efforts to prevent the coding or introduction of viruses, disabling code or similar items into the Customer systems by XXXX or its agents; and XXXX will, in the event a virus, disabling code or similar item is found to have been introduced into the software Deliverables or Customer systems by XXXX or its agents, at no additional charge, assist Customer in reducing the effects of the virus, disabling code or similar item.
Viruses and Disabling Code. Each Party will use commercially reasonable efforts to ensure that no viruses or similar items ("Viruses") are coded or introduced into the systems used to provide the Services. Each Party agrees that, in the event a Virus is found to have been in- troduced into the Systems used to provide the Services, such Party will take all reasonable actions at its own expense to assist in reducing the effects of the Virus and, if the Virus causes a loss of operational efficiency or loss of data, to cooperate to the same extent to mitigate and restore such losses. Chase shall not, without the prior written consent of NEW TRUSTCO, insert into the Software any code which would have the effect of disabling or otherwise shutting down all or any portion of the Services. Furthermore, with respect to any disabling code that may be part of the Software, Chase shall not invoke such disabling code at any time, including, upon expiration or termination of the Agreement for any reason, without NEW TRUSTCO's prior written consent.

Related to Viruses and Disabling Code

  • Disabling Code Contractor represents and warrants that the SaaS Application and Services, and any information, reports or other materials provided to Authorized Users as a result of the operation of the SaaS Application and Services, including future enhancements and modifications thereto, shall be free of any Disabling Code.

  • Prohibited Uses and Disclosures BA shall not use or disclose PHI other than as permitted or required by the Contract and Addendum, or as required by law. BA shall not use or disclose Protected Information for fundraising or marketing purposes. BA shall not disclose Protected Information to a health plan for payment or health care operation purposes if the patient has requested this special restriction, and has paid out of pocket in full for the health care item or service to which the PHI solely relates [42 U.S.C. Section 17935(a) and 45 C.F.R. Section 164.522(a)(vi)]. BA shall not directly or indirectly receive remuneration in exchange for Protected Information, except with the prior written consent of CE and as permitted by the HITECH Act, 42 U.S.C. Section 17935(d)(2), and the HIPAA regulations, 45 C.F.R. Section 164.502(a)(5)(ii); however, this prohibition shall not affect payment by CE to BA for services provided pursuant to the Contract.

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.

  • Permitted Uses and Disclosures by Business Associate Except as otherwise limited by this Agreement, Business Associate may make any uses and disclosures of Protected Health Information necessary to perform its services to Covered Entity and otherwise meet its obligations under this Agreement, if such use or disclosure would not violate the Privacy Rule if done by Covered Entity. All other uses or disclosures by Business Associate not authorized by this Agreement or by specific instruction of Covered Entity are prohibited.

  • Permitted Uses and Disclosures of Phi by Business Associate Except as otherwise indicated in this Agreement, Business Associate may use or disclose PHI, inclusive of de-identified data derived from such PHI, only to perform functions, activities or services specified in this Agreement on behalf of DHCS, provided that such use or disclosure would not violate HIPAA or other applicable laws if done by DHCS.

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Use and Disclosure of Protected Health Information The Business Associate must not use or further disclose protected health information other than as permitted or required by the Contract or as required by law. The Business Associate must not use or further disclose protected health information in a manner that would violate the requirements of HIPAA Regulations.

  • Permitted Uses and Disclosures i. Business Associate shall use and disclose PHI only to accomplish Business Associate’s obligations under the Contract. i. To the extent Business Associate carries out one or more of Covered Entity’s obligations under Subpart E of 45 C.F.R. Part 164, Business Associate shall comply with any and all requirements of Subpart E that apply to Covered Entity in the performance of such obligation. ii. Business Associate may disclose PHI to carry out the legal responsibilities of Business Associate, provided, that the disclosure is Required by Law or Business Associate obtains reasonable assurances from the person to whom the information is disclosed that: A. the information will remain confidential and will be used or disclosed only as Required by Law or for the purpose for which Business Associate originally disclosed the information to that person, and; B. the person notifies Business Associate of any Breach involving PHI of which it is aware. iii. Business Associate may provide Data Aggregation services relating to the Health Care Operations of Covered Entity. Business Associate may de-identify any or all PHI created or received by Business Associate under this Agreement, provided the de-identification conforms to the requirements of the HIPAA Rules.

  • Permitted Uses and Disclosure by Business Associate (1) General Use and Disclosure Provisions Except as otherwise limited in this Section of the Contract, Business Associate may use or disclose PHI to perform functions, activities, or services for, or on behalf of, Covered Entity as specified in this Contract, provided that such use or disclosure would not violate the HIPAA Standards if done by Covered Entity or the minimum necessary policies and procedures of the Covered Entity.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!