Common use of Malicious Software Clause in Contracts

Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.

Appears in 37 contracts

Sources: Purchase Order Agreement, Cybersecurity Support Agreement (Castellum, Inc.), Basic Order Agreement (Boa)

Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3DC#) in accordance with instructions provided by DC3 or the Contracting Officer. Do not send the malicious software to the Contracting Officer.

Appears in 5 contracts

Sources: Contract, Contract, Contract

Malicious Software. When the Contractor Recipient or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting OfficerAgreements officer. Do not send the malicious software to the Contracting OfficerAgreements officer.

Appears in 3 contracts

Sources: Tia Single Modification (Perpetua Resources Corp.), Tia Single Modification (Perpetua Resources Corp.), Technology Investment Agreement (Perpetua Resources Corp.)

Malicious Software. When the Contractor or subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting OfficerOfficer or Buyer. Do not send the malicious software to the Contracting Officer.

Appears in 3 contracts

Sources: Customer Contract, Customer Contract, Customer Contract 23 C 8458

Malicious Software. When the Contractor Recipient or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Agreements Officer. Do not send the malicious software to the Contracting Agreements Officer.

Appears in 2 contracts

Sources: Technology Investment Agreement, Technology Investment Agreement

Malicious Software. When the Contractor or subrecipients/subcontractors discover and isolate malicious software in connection with a reported cyber incident, submit the malicious software to DoD Cyber Crime Center (DC3) in accordance with instructions provided by DC3 or the Contracting Officercontracts officer. Do not send the malicious software to the Contracting Officercontracts officer.

Appears in 1 contract

Sources: Flow Downs Agreement