Malicious Attacks Sample Clauses

The Malicious Attacks clause defines the responsibilities and liabilities of parties in the event of intentional, harmful actions such as hacking, data breaches, or sabotage. Typically, this clause outlines which party is responsible for implementing security measures, how incidents must be reported, and the steps required to mitigate damages following an attack. Its core function is to allocate risk and clarify obligations, ensuring that both parties understand their roles in preventing and responding to malicious activities.
Malicious Attacks if a third party not associated with Licensor initiates a "Denial of Service" or other form of disabling attack against our network or services, Licensor, will take all reasonable commercial steps to stop the attack, but cannot guarantee a resolution time. In the event that Licensor does not meet this SLA, Licensee will become eligible to request compensation for downtime. If Licensor is directly responsible for causing the downtime, Licensee will receive a credit for 2 times the actual amount of downtime. This means that if your server is unreachable for 1 hour outside of the regularly scheduled maintenance times and beyond the 1% allowed, the Licensee will receive 2 hours of credit. If Licensor is not directly responsible for causing the downtime, Licensee will not receive a credit for downtime. All requests for compensation for such downtime credits must be received within five (5) business days of the incident in question. The amount of compensation shall not exceed the cost of one month’s subscription.
Malicious Attacks if a third party not associated with SysAid initiates a disabling attack against Our ▇▇▇▇▇▇, SysAid will do everything in its power to stop the attack, but cannot guarantee a resolution time.
Malicious Attacks. If a third party not associated with Servers Australia initiates a "Denial of Service" or other form of disabling attack against your hosting or major portions of the Servers Australia core network, Servers Australia will do everything in its power to stop the attack, but cannot guarantee a resolution time.
Malicious Attacks. If a third party not associated with Venom IT initiates a "Denial of Service" or other form of disabling attack against your Dynamic Server or major portions of our network, Venom IT will do everything in its power to stop the attack, but cannot guarantee a resolution time. Any force majeure such as a war, riots, pandemic or natural disaster. Cybercrimes such as nation- state attacks and any wide-spread disruptions of the Internet or large-scale DoS or DDoS attacks will also be considered as force majeure, and any disruptions in service due to force majeure will not be eligible for SLA credits. Unavailability is the cumulative total unavailability for the relevant Venom IT Service. For the avoidance of doubt, Client Outages and Planned Maintenance are excluded from this definition Client Outages/Unavailability means any outage caused by any of the Unsupported Software and Hardware (as specified in the Scoping Document) or any change or action taken by the Client’s Personnel.
Malicious Attacks. If a third party not associated with Cloud Inspire and ahome cloud initiate a «Denial of Service» or other form of disabling attack against a customer’s managed server or major portions of our network, we will do everything in our power to stop the attack, but cannot guarantee a resolution time. Silver tier 3 Best Effort* tier 5 Hardware replacement When does the SLA starts ? 5%/hour 12 hours N/A N/A Network failure When does the SLA starts ? 5%/hour 4 hours N/A N/A Extended scheduled mainte- ▇▇▇▇▇ When does the SLA starts ? 5%/hour 2 hours N/A N/A Region Johannesburg Lagos The «%» for each Tier is the refund on the base monthly fee for a single server, up to 50% of your monthly bill as per your paid plan. After Cloud Inspire has confirmed a hardware failure, Cloud Inspire has this *time* to proceed with the replacement. A reboot attempt has to be requested, and performed before concluding it’s a hardware issue. It starts after the *time* of a confirmed network wide failure. The *time* counts past the initial estimated and announced downtime, or for unscheduled and unan- nounced maintenance ie: if Cloud Inspire planned a 2 hours maintenance in Tier 3, Cloud Inspire is allowed to take an additional hour without having to issue compensation. No SLA applies in these locations. This is often due to a location being one of our emerging markets, or loca- tions in which network, hardware and resolution standards are not up to par with the rest of the world. It is important to note that this SLA does not reflect, or affect the ticket and phone support hours or E.T.A.’s, and is subject to change at Cloud Inspire’s sole discretion.
Malicious Attacks. If a third party not associated with Nine Virtual Technologies, Inc. initiates a “Denial of Service” or other form of attack designed to disable our network availability/server availability and/or the availability of your vOffice desktop, we will do everything in our power to stop the attack, but cannot guarantee a resolution time. Any downtime associated will not be eligible for a Service Credit. The following definitions apply to our 99.9% Uptime Guarantee:  Unavailability – the total unavailability for the relevant Nine Virtual Technologies vOffice Service. For the avoidance of doubt, customer outages and Planned Maintenance are excluded from this definition.  Customer Outages/Unavailability – any outage caused by any of the Customer’s Hardware, Network Equipment, or any change, modification, or action taken by the Customer’s personnel.
Malicious Attacks if a third party not associated with ▇▇▇▇ initiates a disabling attack against Our Servers, Nubo will do everything in its power to stop the attack, but cannot guarantee a resolution time.

Related to Malicious Attacks

  • Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.

  • Malicious Software Any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence. Management Charge The sum paid by the Supplier to CCS being an amount of up to 1% but currently set at 0.75% of all Charges for the Services invoiced to Buyers (net of VAT) in each month throughout the duration of the Framework Agreement and thereafter, until the expiry or End of any Call-Off Contract. Management Information The management information specified in Framework Agreement Schedule 6. Material Breach Those breaches which have been expressly set out as a Material Breach and any other single serious breach or persistent failure to perform as required under this Call-Off Contract.

  • Vandalism Or Malicious Mischief This peril does not include loss to property on the "residence premises", and any ensuing loss caused by any intentional and wrongful act com- mitted in the course of the vandalism or malicious mischief, if the dwelling has been vacant for more than 60 consecutive days immediately before the loss. A dwelling being constructed is not consid- ered vacant.

  • Vandalism Vandalism will result in cancellation of privileges. Vandalism is defined as any malicious attempt to harm or destroy data of another user, Internet, or any of the above listed agencies or other networks that are connected to any of the Internet backbones. This includes, but not limited to, the uploading or creation of computer viruses.

  • Violence (a) The parties agree that violence shall be defined as any incident in which an employee is abused, threatened or assaulted while performing his or her work. The parties agree it includes the application of force, threats with or without weapons and severe verbal abuse. The parties agree that such incidents will not be condoned. Any employee who believes he/she has been subjected to such incident shall report this to a supervisor who will make every reasonable effort to rectify the situation. For purposes of sub- article (a) only, employees as referred to herein shall mean all employees of the Employer. (b) The Employer agrees to develop formalized policies and procedures in consultation with the Joint Health and Safety Committee to deal with workplace violence. The policy will address the prevention of violence and the management of violent situations and support to employees who have faced workplace violence. These policies and procedures shall be communicated to all employees. (c) The Employer will report all incidents of violence as defined herein to the Joint Health and Safety Committee for review. (d) The Employer agrees to provide training and information on the prevention of violence to all employees who come into contact with potentially aggressive persons. This training will be done during a new employee’s orientation and updated as required. (e) Subject to appropriate legislation, and with the employee’s consent, the Employer will inform the Union within three (3) days of any employee who has been subjected to violence while performing his/her work. Such information shall be submitted in writing to the Union as soon as practicable.