Windows Defender Sample Clauses

Windows Defender. If turned on, Windows Defender will search your computer for many types of malicious software, including viruses, worms, bots, rootkits, “spyware”, “adware” and other potentially unwanted software. If you choose the “recommended” security settings when you first start using the software, such malware and other potentially unwanted software rated “high” or “severe” will automatically be removed. This removal may result in other software on your computer ceasing to work or your breaching a license to use that software. It is possible that software that is not unwanted may be removed or disabled. If you use Windows Defender and Windows Update, Windows Defender is regularly updated through Windows Update.
AutoNDA by SimpleDocs
Windows Defender. If turned on, Windows Defender will search your licensed device for many types of malicious software, including viruses, worms, bots, rootkits, “spyware”, “adware” and other potentially unwanted software. If it finds potentially unwanted software, the software will ask you if you want to ignore, disable (quarantine) or remove it. If you choose the “recommended” security settings when you first start using the software, such malware and other potentially unwanted software rated “high” or “severe” will automatically be removed. This removal may result in other software on your licensed device ceasing to work or your breaching a license to use that software. It is possible that software that is not unwanted may be removed or disabled. If you use Windows Defender and Windows Update, Windows Defender is regularly updated through Windows Update.

Related to Windows Defender

  • Windows a. Front and rear windshield per California Vehicle Code § 26710.

  • Weapons (1) If the Contractor requests that its personnel performing in the USCENTCOM AOR be authorized to carry weapons for individual self-defense, the request shall be made through the Contracting Officer to the Combatant Commander, in accordance with DoD Instruction 3020.41. The Combatant Commander will determine whether to authorize in-theater contractor personnel to carry weapons and what weapons and ammunition will be allowed.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • LOST, STOLEN OR DAMAGED CARDS If the Cardmember loses the Card or if the Card is damaged or stolen or if the PIN became available to any other persons, the Cardmember must immediately inform AEME by telephone. In addition, the Cardmember shall provide AEME with a written notification within 3 days from the date of the occurrence of any of the above listed events, as per applicable laws. All notices pursuant to this article must be sent to the following address: AMEX (Middle East) B.S.C. (c), P.O. Box 5990, Manama, Kingdom of Bahrain. Or facsimile number: (+000) 00 000000. To inform AEME by phone, call the number indicated in the Cardmember Additional Information Leaflet. If AEME is duly informed in the manner described above the Cardmember shall not be liable for any Charges made on his or her Card by any third parties after the Card has been reported lost or stolen. Failure to comply with the provisions of this article will render the Cardmember liable for all Transactions made on his or her lost or stolen Card until the time the Card is reported as lost or stolen to AEME. However, the Cardmember shall at all times be fully liable for all Charges including Cash Withdrawals even if these Charges were made by third parties if these third parties gained possession of the Card or any Supplementary Card or the PIN with the knowledge, permission, approval or other acts of the Cardmember or any Supplementary Cardmember or because of their negligence. If the Card is found after it was reported lost or stolen, the Cardmember may not use or attempt to use the Card at issue and shall immediately inform AEME which will take the appropriate action.

  • Fencing The SPD shall Fence the demarcated boundary of the Demised Premises at the SPD’s own expense in every respect.

  • Customer Equipment Customer represents and warrants that it owns or has the legal right and authority, and will continue to own or maintain the legal right and authority during the term of this Agreement, to place and use the Customer Equipment as contemplated by this Agreement. Customer further represents and warrants that its placement, arrangement, and use of the Customer Equipment in the Internet Data Centers complies with the Customer Equipment Manufacturer's environmental and other specifications.

  • Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.

  • Doors Exterior doors may not be propped open for safety and security reasons. Students may be referred to the student conduct system if found propping these doors. Doors marked as emergency exits may only be used for emergency purposes other than during University-sanctioned move-in days.

Time is Money Join Law Insider Premium to draft better contracts faster.