Malware Protection Sample Clauses

The Malware Protection clause establishes requirements and responsibilities for preventing, detecting, and responding to malicious software threats within a contractual relationship. Typically, it obligates parties to implement up-to-date antivirus software, conduct regular system scans, and promptly address any malware incidents that arise. This clause serves to minimize the risk of data breaches or system disruptions caused by malware, thereby protecting both parties’ information assets and ensuring the integrity of their operations.
POPULAR SAMPLE Copied 1 times
Malware Protection. Malware protection software with audit logging is deployed on all Genesys servers. Alerts indicating potential malicious activity are sent to an appropriate response team.
Malware Protection. Microsoft cares about protecting your device from malware. The software will turn on malware protection if other protection is not installed or has expired. To do so, other antimalware software will be disabled or may have to be removed.
Malware Protection. The Financial Institution is not responsible for any electronic viruses, spyware, or other malware that you may encounter. We encourage our customers to routinely scan their PC using a reliable anti- malware/anti-virus product and resolve any discovered issues. Undetected or non-repaired viruses may corrupt and destroy your programs, files and even your hardware. Additionally, you may unintentionally transmit the virus to other computers. Spyware refers to technologies that collect information about a user without his or her knowledge and reports that information to a third party. Certain forms of spyware can intercept sensitive and confidential information about an organization or user, including passwords, credit card numbers and other identifying data. It is important that customers do not access their online account information from a public computer – such as those in hotels and libraries because of the uncertainty of what malware may already exist on public equipment.
Malware Protection. The Contractor will provide and maintain industry-standard endpoint antivirus and antimalware protection on all Systems and Hardware as approved or required by the Department Information Security Officer (DISO) who will consult with the County’s Chief Information Security Officer (CISO) to ensure provided hardware is free, and remains free of malware. The Contractor agrees to provide the County documentation proving malware protection status upon request.
Malware Protection. Contractor hereby warrants that to the best of its knowledge there is no malware in any portion of the software and/or its computer system and that it has used commercially reasonable efforts to ensure that the software and/or its computer system is free of malware and has undergone malware-checking procedures consistent with industry standards. The term “malware” as used herein means any computer code designed to (a) disable, disrupt, or damage the County's use of the software, County data, or the County’s network or (b) damage or destroy any County data without the County's consent.
Malware Protection. NetWitness will install and run industry standard malware protection on all systems underlying the Service Offering. Anti-malware definition files shall be updated regularly in accordance with industry standards. For the avoidance of doubt,Customer remains responsible for protecting its own systems by installing, updating, and maintaining industry standard malware protection.
Malware Protection. The Customer is responsible for maintaining adequate virus and malicious software protections for your computers and networks used to access MDI Cloud.
Malware Protection. Supplier’s responsibilities for Malware protection include: (a) Installing, updating, implementing revisions to, operating and Maintaining Gap’s Approved security Software on all Equipment used to deliver or support the Services in accordance with the Procedures Manual. (b) Updates to Gap-Approved Malware-protection Software shall be installed as directed by Gap, per Gap’s vulnerability ratings attached and in accordance with the Service Levels set forth in Exhibit B.1 (Service Level Matrix). (c) Performing Malware scans on Equipment and Software as appropriate and dictated by good Management practices, the Service Levels set forth in Exhibit B.1 (Service Level Matrix) and the Procedures Manual. (d) Upon detection of Malware, taking immediate steps per the Procedures Manual to notify the * and *; assessing the scope of damage; arresting the spread and progressive damage from the Malware; eradicating the Malware; and (to the greatest extent possible) restoring all data and Software to its original state. (e) Maintaining the capability for Gap Authorized Users to scan all appropriate storage media for Malware per the Procedures Manual. (f) Jointly developing plans necessary to provide Malware protection as agreed to by Gap and Supplier.
Malware Protection. Effective virus and malware protection software shall be run and maintained on all of Contractor’s systems and assets (e.g., workstations, servers, and other configurable devices to the extent technically feasible) with remote or direct connections to IT/OT Technology and/or that store or host Information and Product/Services infrastructure. The virus signature files on these devices shall be updated in a timely manner as new releases are made available by the malware software supplier, preferably in an automated fashion.
Malware Protection. Contractor hereby warrants that to the best of its knowledge there is no malware in any portion of the software and/or its computer system and that it has used commercially reasonable efforts to ensure that the software and/or its computer system is free of malware and has undergone malware-checking procedures consistent with industry standards. The term “malware” as used herein means any computer code designed to (a) disable, disrupt, or damage the H-NNCSB's use of the software, H-NNCSB data, or the H-NNCSB’s network or (b) damage or destroy any H-NNCSB data without the H-NNCSB's consent.