Protection of Computer Systems and Software Sample Clauses

The Protection of Computer Systems and Software clause establishes requirements and responsibilities for safeguarding computer hardware, software, and related digital assets from unauthorized access, damage, or misuse. Typically, this clause obligates parties to implement security measures such as firewalls, antivirus software, regular updates, and access controls, and may require prompt reporting of security breaches. Its core function is to minimize the risk of data loss, cyberattacks, and operational disruptions, thereby ensuring the integrity and reliability of technological resources used in the agreement.
Protection of Computer Systems and Software. The Employee agrees to take all necessary precautions to protect the computer systems and software of the Company, including, without limitation, complying with the obligations set out in the Company’s policies.
Protection of Computer Systems and Software. I agree to take all necessary precautions to protect the computer systems and software of the Company and of the suppliers and clients of the Company.
Protection of Computer Systems and Software. The Employee agrees to take all necessary precautions to protect the computer systems and software of Hostopia and of the suppliers and clients of Hostopia, including without limitation complying with the obligations set out in Hostopia's Computer and Network Protection Rules (collectively, the "Rules"). A copy of the Rules, as currently in effect, is attached as Exhibit B to this Agreement. The Employee agrees that Hostopia may unilaterally amend the Rules, and upon their delivery to the Employee such new rules shall form part of this Agreement and will be binding on the Employee. The Employee agrees that violation of any of such Rules may be grounds for discipline up to and including immediate dismissal for cause.
Protection of Computer Systems and Software. The Consultant agrees to take all necessary precautions to protect the computer systems and software of the Corporation and of the suppliers and clients of the Corporation. The Consultant agrees to comply with the obligations set out in the Corporation’s Computer and Network Protection Rules (the “Rules”). A copy of the Rules, as currently in effect, is attached as Schedule "B" to this Agreement. The Consultant agrees that the Corporation may unilaterally amend the Rules, and upon their delivery to the Consultant such new Rules will form part of this Agreement and will be binding on the Consultant. The Consultant agrees that violation of any of such Rules may constitute a fundamental breach of the Consultant's engagement.
Protection of Computer Systems and Software. The Consultant agrees to take all necessary precautions to protect the computer systems and software of the Company, including, without limitation, complying with the obligations set out in the Company’s policies.
Protection of Computer Systems and Software. I agree to take all necessary precautions to protect the computer systems and software of the Company and of the suppliers and clients of the Company, including without limitation complying with the obligations set out in the Company’s Computer and Network Protection Rules (collectively, the “Rules”). A copy of the Rules, as currently in effect, is attached as Schedule B to this Agreement. I agree that the Company may unilaterally amend the Rules, and upon their delivery to me such new Rules will form part of this Agreement and will be binding on me. I agree that violation of any of such Rules may be grounds for discipline up to and including immediate dismissal for cause.
Protection of Computer Systems and Software. The Employee agrees to take all necessary precautions to protect the computer systems and software of the Corporation, and the Corporation's Affiliates, including, without limitation, complying with the obligations set out in any of the Corporation's policies of which the Employee is advised from time to time. The Employee will not insert into the software any time bombs, trojan horses, worms or other hidden devices that will, or whose intention is, to cause any software owned, used or licensed by the Corporation or any of the Corporations Affiliates to cease to operate or to fail to operate in accordance with its documentation. The Employee agrees that violation of any of such policies may be grounds for discipline up to and including immediate dismissal for just cause.

Related to Protection of Computer Systems and Software

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Computer Systems (a) Servicer to operate systems (b) Servicer to maintain back-up facilities (c) Servicer to notify location of computer tapes

  • Server Software Subject to the terms and conditions of this ▇▇▇▇, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Commercial Computer Software If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Software The Software is licensed to you subject to any terms and conditions presented when you downloaded it from a source authorized by NCR Voyix, as well as those contained in this Agreement. If there is a conflict, this Agreement will control. You are licensed to use the Software only with the Service and with Hardware purchased or subscribed from NCR Voyix or its Resellers. Your license to any Software will end when your subscription to the Service ends. The Software is copyrighted and licensed, not sold, and is NCR Voyix’s confidential and unpublished information. You will retain any copyright notices and proprietary legends on all copies of the Software and the media on which it is delivered. Any attempt to transfer the Software is void and will automatically cause your license to end.