Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.
Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.
Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.
Latent Defects Notwithstanding anything to the contrary set forth herein, no acceptance, or deemed acceptance, by City pursuant to this Section shall be applicable with respect to any Latent Defects. An acceptance, or deemed acceptance, by City pursuant to this Section shall not mean that City has accepted, or the other party has been relieved of, responsibility for: (i) compliance with the Laws; (ii) the proper application of construction means or methods; or (iii) correcting any portion of the Project if it later is determined that any portion of the Project is inconsistent with the Final Documents and Drawings.
The Software The End User shall be granted to receive one copy of the Software and the Documentation and to load, install and properly use the Software for the maximum number of servers and users or workflows determined in the Form of Agreement and under the terms and conditions of this XXXX and the ELP. The Form of Agreement contains specific conditions valid for the agreement between the Licensor and the End User for the specific license. References to this XXXX within the present document include the reference to the Form of Agreement concluded with the End User. The Software Licenses defined, described in this document give the rights solely for the Eventus software and no other software or hardware or any other kind of components, unless otherwise stated.
Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.
Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes
Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.