Virus Scanning Sample Clauses

POPULAR SAMPLE Copied 1 times
Virus Scanning. If a virus is identified that has arrived by email into an email system supported by the Mailsphere solution then this should be treated as an important issue and reported immediately.
Virus Scanning. Medidata will provide virus protection on all systems used to provide Medidata Applications and Services to Customer. Medidata will install, maintain and update virus control software for all systems used to provide Services to Customer. Medidata will use industry standard software scanning technology (updated with the then-current virus signatures and data) to test the Medidata Applications and Services in order to, wherever possible, ensure the Medidata Applications and Services will not contain, and shall use reasonable best efforts to remove any known harmful programs, data, or contaminants, including any codes or instructions that may be used to access, modify, delete, damage, disable or otherwise prevent the proper operation of a computer hardware system or the associated software (individually referred to as a “Virus”, and collectively as “Viruses”). Medidata will not knowingly introduce any Viruses into Customer’s systems. Medidata agrees that in the event a Virus is found to have been introduced into Medidata’s systems or into Customer’s systems, Medidata will use reasonable best efforts to assist Customer in reducing the effects of the Virus. To the extent a virus has been introduced into Medidata’s or Customer’s systems through Customer’s use of the Medidata Applications and/or Services, Customer shall be responsible for all fees and expenses (at Medidata’s then-current rates) for Medidata to provide the remedial or mitigating services described herein.

Related to Virus Scanning

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Malicious Software Any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence. Management Charge The sum paid by the Supplier to CCS being an amount of up to 1% but currently set at 0.75% of all Charges for the Services invoiced to Buyers (net of VAT) in each month throughout the duration of the Framework Agreement and thereafter, until the expiry or End of any Call-Off Contract. Management Information The management information specified in Framework Agreement Schedule 6. Material Breach Those breaches which have been expressly set out as a Material Breach and any other single serious breach or persistent failure to perform as required under this Call-Off Contract.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Message Screening 7.4.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from CCI local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the CCI switching system has a valid signaling relationship. 7.4.4.4.2 BellSouth shall set message screening parameters so as to pass valid messages from CCI local or tandem switching systems destined to any signaling point or network accessed through BellSouth’s SS7 network where the CCI switching system has a valid signaling relationship. 7.4.4.4.3 BellSouth shall set message screening parameters so as to accept and pass/send valid messages destined to and from CCI from any signaling point or network interconnected through BellSouth’s SS7 network where the CCI SCP has a valid signaling relationship.