Viruses/Disabling Code Sample Clauses

Viruses/Disabling Code. As of the date of delivery to Customer, the Software and any Update(s) will not contain any computer virus or code that could be otherwise hostile, damaging or disabling to Customer’s existing information systems or components thereof. Licensor further warrants that Customer shall have quiet and peaceful enjoyment of the use of the Software and Documentation for the duration of this Agreement until and unless this Agreement is lawfully terminated, ended or otherwise declared ineffective, as specified herein. Licensor further covenants that it shall not install or insert any virus or disabling code or take any action which would permit Licensor or any third party to interfere with Customer’s quiet enjoyment of the Software.
AutoNDA by SimpleDocs
Viruses/Disabling Code. BancTec represents and covenants that BancTec Personnel will not, knowingly or ***, introduce a Virus or allow a Virus to be introduced into the systems used to provide the Services. If a Virus is found to have been introduced into the systems used to provide the Services as a result of a breach of the foregoing, without limiting DFS’ other rights and remedies, BancTec will use Commercially Reasonable Efforts, at no additional charge, to *** Certain information on this page has been omitted and filed separately with the Commission. Confidential treatment has been requested with respect to the omitted portions. assist DFS in eradicating the Virus and reversing its effects and, ***. BancTec represents and covenants that in the course of providing the Services it will not knowingly insert into Software, or invoke, any code that would have the effect of disabling or otherwise shutting down all or any portion of the Services.
Viruses/Disabling Code. BancTec represents and covenants that BancTec Personnel will not, knowingly or negligently, introduce a Virus or allow a Virus to be introduced into the systems used to provide the Services. If a Virus is found to have been introduced into the systems used to provide the Services as a result of a breach of the foregoing, without limiting DFS’ other rights and remedies, BancTec will use Commercially Reasonable Efforts, at no additional charge, to assist DFS in eradicating the Virus and reversing its effects and, if the Virus causes a loss of data or operational efficiency, to assist DFS in mitigating and reversing such losses. BancTec represents and covenants that in the course of providing the Services it will not knowingly insert into Software, or invoke, any code that would have the effect of disabling or otherwise shutting down all or any portion of the Services.
Viruses/Disabling Code. Service Provider represents and warrants that any Software provided or used (other than WG Software owned by or licensed to WG) by Service Provider as part of the Services (including Service Provider Software and Service Provider Third Party Software) or developed for WG (i) does not and shall not contain any malicious code designed to intentionally disable, slowdown, impair or otherwise shut down WG’s System, including any viruses, disabling code, time bombs or Trojan horses, except to the extent attributable to any action by WG; and (ii) shall be interoperable with other Software used by Service Provider that may deliver records to WG Software, receive records from such WG Software or interact with such WG Software, including to back-up and archive data, excluding operation failures and other problems that arise as a consequence of defects in the WG Data, WG Software or other Software not provided by or through the Service Provider, its Affiliates or their subcontractors.
Viruses/Disabling Code. WG represents and warrants that any WG Software owned by it, as provided in its unmodified state by WG to Service Provider, does not contain any malicious code designed to intentionally disable, slowdown, impair or otherwise shut down Service Provider’s systems, including any viruses, disabling code, time bombs or Trojan horses, except to the extent attributable to any action by Service Provider.
Viruses/Disabling Code. Each party warrants that to the best of its knowledge that any Software provided or used by the Party as part of the Services (including Third Party Software) or developed for one Party by the other party (i) does not and shall not contain any malicious code designed to intentionally disable, slowdown, impair or otherwise shut down the other Party’s System, including any viruses, disabling code, time bombs or trojan horses and (ii) shall be interoperable with other Software used by the other Party that may deliver records to that Party, receive records from the other Party’s Software or interact with such other Party’s Software, including to back-up and archive data. Each party is responsible for notifications and other notifications set forth in Appendix 4, however, in no event shall either party be liable for malicious code received unknowingly from third parties. WG represents and warrants that any WG Software owned by it, as provided in its unmodified state by WG to Integrated Supplier, does not contain any malicious code designed to intentionally disable, slowdown, impair or otherwise shut down Integrated Supplier’s systems, including any viruses, disabling code, time bombs or Trojan horses, except to the extent attributable to any action by Integrated Supplier.

Related to Viruses/Disabling Code

  • Disabling Code Contractor represents and warrants that the SaaS Application and Services, and any information, reports or other materials provided to Authorized Users as a result of the operation of the SaaS Application and Services, including future enhancements and modifications thereto, shall be free of any Disabling Code.

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Convicted, Discriminatory, Antitrust Violator, and Suspended Vendor Lists In accordance with sections 287.133, 287.134, and 287.137, F.S., the Contractor is hereby informed of the provisions of sections 287.133(2)(a), 287.134(2)(a), and 287.137(2)(a), F.S. For purposes of this Contract, a person or affiliate who is on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List may not perform work as a contractor, supplier, subcontractor, or consultant under the Contract. The Contractor must notify the Department if it or any of its suppliers, subcontractors, or consultants have been placed on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List during the term of the Contract. In accordance with section 287.1351, F.S., a vendor placed on the Suspended Vendor List may not enter into or renew a contract to provide any goods or services to an agency after its placement on the Suspended Vendor List. A firm or individual placed on the Suspended Vendor List pursuant to section 287.1351, F.S., the Convicted Vendor List pursuant to section 287.133, F.S., the Antitrust Violator Vendor List pursuant to section 287.137, F.S., or the Discriminatory Vendor List pursuant to section 287.134, F.S., is immediately disqualified from Contract eligibility.

  • Reasonable Accommodation for Applicants / Employees with Disabilities The contractor must be familiar

  • COMPLIANCE WITH NEW YORK STATE INFORMATION SECURITY BREACH AND NOTIFICATION ACT Contractor shall comply with the provisions of the New York State Information Security Breach and Notification Act (General Business Law Section 899-aa; State Technology Law Section 208).

  • Defend Trade Secrets Act Notice If this agreement is governed by United States law: (a) An individual shall not be held criminally or civilly liable under any Federal or State trade secret law for the disclosure of a trade secret that: (i) is made: (A) in confidence to a Federal, State, or local government official, either directly or indirectly, or to an attorney; and (B) solely for the purpose of reporting or investigating a suspected violation of law; or (ii) is made in a complaint or other document filed in a lawsuit or other proceeding, if such filing is made under seal. (b) An individual who files a lawsuit for retaliation by an employer for reporting a suspected violation of law may disclose the trade secret to the attorney of the individual and use the trade secret information in the court proceeding, if the individual: (i) files any document containing the trade secret under seal; and (ii) does not disclose the trade secret, except pursuant to court order.

  • Xxxxx Disaster Protection In accordance with the requirements of the Flood Disaster Protection Act of 1973 (42 U.S.C. 4001), the Subrecipient shall assure that for activities located in an area identified by the Federal Emergency Management Agency (FEMA) as having special flood hazards, flood insurance under the National Flood Insurance Program is obtained and maintained as a condition of financial assistance for acquisition or construction purposes (including rehabilitation).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!