Viruses and Malicious Code Sample Clauses

Viruses and Malicious Code. You will neither insert nor permit the insertion or introduction of any Malicious Code into the System. In addition, You will take all commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the System. The Videojet may immediately suspend Your access to the System if it detects Malicious Code or reasonably suspects that Malicious Code was introduced or permitted to be introduced by or through You or Your account.
AutoNDA by SimpleDocs
Viruses and Malicious Code. You will neither insert nor permit the insertion or introduction of any Malicious Code (defined below) into the Services or systems and software (collectively “System”) used to deliver the Services provided under this Agreement. In addition, You will take all commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the System. X-Rite may immediately suspend Your access to the System if it detects Malicious Code or reasonably suspects that Malicious Code was introduced or permitted to be introduced by or through You or Your account. For purposes of this provision, “Malicious Code” will mean (i) any code, program, or sub-program the knowing or intended purpose or effect of which is to damage or maliciously interfere with the operation of a computer system containing the code, program or sub-program, or to halt, disable, or interfere with the operation of the software, code, program, or sub-program, itself, or (ii) any device, method, or token that permits any person to circumvent without authorization the normal security of any software or System containing the code.
Viruses and Malicious Code. Customer will neither insert nor permit the insertion or introduction of any Malicious Code (defined below) into the Software used to deliver the Software. Customer will take all commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the Software. Voyager may immediately suspend Customer's access to the Software if Voyager detects Malicious Code or reasonably suspects that Malicious Code was introduced or permitted by Customer or Customer's account. "Malicious Code” means (i) any code, program, or sub-program which causes damage or maliciously interferes with the operation of a computer Software containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Software (ii) any device, method, or token that permits any person to circumvent without authorization the normal security of the Software.
Viruses and Malicious Code. In the performance of the Services, Esko implements industry standard anti‐virus software. You also agree to implement commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the Hosted Infrastructure through Your use of the Services. “Malicious Code” will mean
Viruses and Malicious Code. Customer will neither insert nor permit the insertion or introduction of any Malicious Code (defined below) into the Product. Customer will take all commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the Product. or Licensor, as applicable, may immediately suspend Customer's access to the Product if either detects Malicious Code or reasonably suspects that Malicious Code was introduced or permitted by Customer or Customer's account. "Malicious Code” means (i) any code, program, or sub-program which causes damage or maliciously interferes with the operation of a computer system containing the code, program or sub- program, or halts, disables, or interferes with the operation of the Product (ii) any device, method, or token that permits any person to circumvent without authorization the normal security of the Product.
Viruses and Malicious Code. 1Life represents and warrants that it will not intentionally introduce any viruses or other malicious code into the Deliverables or Hosted Services; provided, however, that no virus or malicious code will be attributable to the Deliverables or Hosted Services to the extent that it is demonstrated by 1Life to have been provided to 1Life by or on behalf of Google.
Viruses and Malicious Code. Neither Google nor any party working on its behalf will intentionally introduce any viruses or other malicious code into the Deliverables or the Hosted Services.
AutoNDA by SimpleDocs

Related to Viruses and Malicious Code

  • Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Disabling Code Contractor represents and warrants that the SaaS Application and Services, and any information, reports or other materials provided to Authorized Users as a result of the operation of the SaaS Application and Services, including future enhancements and modifications thereto, shall be free of any Disabling Code.

  • The Software The End User shall be granted to receive one copy of the Software and the Documentation and to load, install and properly use the Software for the maximum number of servers and users or workflows determined in the Form of Agreement and under the terms and conditions of this XXXX and the ELP. The Form of Agreement contains specific conditions valid for the agreement between the Licensor and the End User for the specific license. References to this XXXX within the present document include the reference to the Form of Agreement concluded with the End User. The Software Licenses defined, described in this document give the rights solely for the Eventus software and no other software or hardware or any other kind of components, unless otherwise stated.

  • Illicit Code Except for the functions and features expressly disclosed in Supplier's documentation made available to Accenture, Deliverables will be free of any programs, subroutines, code, instructions, data or functions, (including but not limited to viruses, malware, worms, date bombs, time bombs, shut-down devices, keys, authorization codes, back doors or passwords allowing Supplier access) that may result in any inoperability, damage, interruption, or interference of the Deliverables or any equipment on which the Deliverables reside or with which the Deliverables are capable of communicating.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!