Viruses and Hacking Sample Clauses

Viruses and Hacking. 15.1. You must not misuse the Materials by knowingly introducing viruses, trojans, worms, logic bombs or other material which is malicious or technologically harmful. You must not attempt to gain unauthorised access to our website, the server on which our website is stored, or any server, computer or database connected to our website. You must not attack our Website via a denial-of-service attack or a distributed denial-of service (“DDOS”) attack. 15.2. By breaching section 15.1, you would commit a criminal offence under the Computer Misuse Act 1990. We will report any such breach to the relevant law enforcement authorities and we will cooperate with those authorities by disclosing your identity to them. In the event of such a breach, your right to use the Materials will cease immediately. 15.3. We use reasonable endeavours to ensure that the Materials do not contain or promulgate any viruses or other malicious code. However, we do not guarantee that the Materials will be free from bugs, viruses or malicious code and we will not be Liable for any loss or damage caused by a DDOS attack, viruses or other technologically harmful material that may infect your computer equipment, computer programs, data or other proprietary material or items due to your use of the Materials or to your downloading of any material from our Website or App, or on any website linked to them. We therefore recommend that you use your own virus protection software and check regularly for the presence of viruses and other malicious code.
AutoNDA by SimpleDocs
Viruses and Hacking. So far as LBC is aware, the LBC IT System has not been the subject of any hacking or infected with any “viruses” or “worms” (as such terms are commonly understood in the software industry) or other similar harmful, malicious or hidden procedures, routines or mechanisms which would cause the LBC IT System to cease functioning or to have a material adverse effect on the operations of the LBC Business.
Viruses and Hacking. So far as SBL is aware, the SBL IT System has not been the subject of any hacking or infected with any “viruses” or “worms” (as such terms are commonly understood in the software industry) or other similar harmful, malicious or hidden procedures, routines or mechanisms which would cause the SBL IT System to cease functioning or to have a material adverse effect on the operations of the SBL Business.

Related to Viruses and Hacking

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Infectious Diseases The Employer and the Union desire to arrest the spread of infectious diseases in the nursing home. To achieve this objective, the Joint Health and Safety Committee may review and offer input into infection control programs and protocols including surveillance, outbreak control, isolation, precautions, worker education and training, and personal protective equipment. The Employer will provide training and ongoing education in communicable disease recognition, use of personal protective equipment, decontamination of equipment, and disposal of hazardous waste.

  • Grievability Denial of a petition for reinstatement is grievable. The grievance may not be based on information other than that shared with the Employer at the time of the petition for reinstatement.

  • EXCLUSION OF THIRD PARTY RIGHTS A person who is not a party to this Agreement has no right under the Contracts (Rights of Third Parties) Xxx 0000 to enforce any term of this Agreement, but this does not affect any right or remedy of a third party which exists or is available apart from that Act.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!