Viruses and Malware Sample Clauses

Viruses and Malware. The Software Services, Work Product, and to the extent applicable the Services, will not contain any security defect, including any malware, vulnerability, virus or any mechanism, including any worm, lock, drop-dead device, Trojan horse routine, trap door, time bomb, or any similar code or instruction that will (a) delete, disable, interfere with, or otherwise harm the software (or Company’s hardware, data, or other programs or products); or (b) make the Software Services, Work Product, or Company Data or systems inaccessible to Company; or (c) permit any third party to access Company’s data or systems or take any of the actions described in subsections (a) or (b) of this Section 4 (Viruses and Malware).
AutoNDA by SimpleDocs
Viruses and Malware. XX-Xxxxx.xxx does not represent or warrant that software, content or materials on the Website, or any Third Party Applications, Software, or Content are accurate, complete, reliable, current or error-free or that the Website, its servers, or any Third Party Applications, Software or Content are free of viruses or other harmful components. Therefore, you should exercise caution in the use and downloading of any such software, content or materials and use industry-recognized software to detect and disinfect viruses.
Viruses and Malware. Licensee agrees to use, and ensure that their users and systems, care and diligence to avoid introducing any software virus or other contaminant (including any adware, bugs, cracks, worms, logic bombs, trojan horses or any other self-propagating or other such program) that may infect or cause damage to the Software, the Services, or the Licensor's systems, or otherwise disrupt the Licensor's Service or operations.
Viruses and Malware. 1. All externally supplied removable storage media, computer-readable files, software programs, databases, word processing documents, and spreadsheets shall be subjected to a virus checking process.

Related to Viruses and Malware

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Latent Defects Notwithstanding anything to the contrary set forth herein, no acceptance, or deemed acceptance, by City pursuant to this Section shall be applicable with respect to any Latent Defects. An acceptance, or deemed acceptance, by City pursuant to this Section shall not mean that City has accepted, or the other party has been relieved of, responsibility for: (i) compliance with the Laws; (ii) the proper application of construction means or methods; or (iii) correcting any portion of the Project if it later is determined that any portion of the Project is inconsistent with the Final Documents and Drawings.

  • Malicious Code You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.

  • Computer Systems (a) The Computer Systems adequately meet the data processing and other computing needs of the Business as presently conducted. The Computer Systems function, operate, process and compute in accordance with all Applicable Laws, industry standards and trade practices. The Computer Systems operate and perform in all material respects in accordance with their documentation and functional specifications. The Computer Systems have not materially malfunctioned or failed within the past three years.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!