Viruses and Malicious Code Clause Samples

POPULAR SAMPLE Copied 2 times
Viruses and Malicious Code. You will neither insert nor permit the insertion or introduction of any Malicious Code (defined below) into the Services or systems and software (collectively “System”) used to deliver the Services provided under this Agreement. In addition, You will take all commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the System. X-Rite may immediately suspend Your access to the System if it detects Malicious Code or reasonably suspects that Malicious Code was introduced or permitted to be introduced by or through You or Your account. For purposes of this provision, “Malicious Code” will mean (i) any code, program, or sub-program the knowing or intended purpose or effect of which is to damage or maliciously interfere with the operation of a computer system containing the code, program or sub-program, or to halt, disable, or interfere with the operation of the software, code, program, or sub-program, itself, or (ii) any device, method, or token that permits any person to circumvent without authorization the normal security of any software or System containing the code.
Viruses and Malicious Code. Customer will neither insert nor permit the insertion or introduction of any Malicious Code (defined below) into the Product. Customer will take all commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the Product. or Licensor, as applicable, may immediately suspend Customer's access to the Product if either detects Malicious Code or reasonably suspects that Malicious Code was introduced or permitted by Customer or Customer's account. "Malicious Code” means (i) any code, program, or sub-program which causes damage or maliciously interferes with the operation of a computer system containing the code, program or sub- program, or halts, disables, or interferes with the operation of the Product (ii) any device, method, or token that permits any person to circumvent without authorization the normal security of the Product.
Viruses and Malicious Code. You will neither insert nor permit the insertion or introduction of any Malicious Code into the System. In addition, You will take all commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the System. The Videojet may immediately suspend Your access to the System if it detects Malicious Code or reasonably suspects that Malicious Code was introduced or permitted to be introduced by or through You or Your account.
Viruses and Malicious Code. In the performance of the Services, Esko implements industry standard anti‐virus software. You also agree to implement commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the Hosted Infrastructure through Your use of the Services. “Malicious Code” will mean
Viruses and Malicious Code. 1Life represents and warrants that it will not intentionally introduce any viruses or other malicious code into the Deliverables or Hosted Services; provided, however, that no virus or malicious code will be attributable to the Deliverables or Hosted Services to the extent that it is demonstrated by 1Life to have been provided to 1Life by or on behalf of Google.
Viruses and Malicious Code. Customer will neither insert nor permit the insertion or introduction of any Malicious Code (defined below) into the Software used to deliver the Software. Customer will take all commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the Software. Voyager may immediately suspend Customer's access to the Software if Voyager detects Malicious Code or reasonably suspects that Malicious Code was introduced or permitted by Customer or Customer's account. "Malicious Code” means (i) any code, program, or sub-program which causes damage or maliciously interferes with the operation of a computer Software containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Software (ii) any device, method, or token that permits any person to circumvent without authorization the normal security of the Software.
Viruses and Malicious Code. Customer will neither insert nor permit the insertion or introduction of any Malicious Code (defined below) into the Platform. Customer will take all commercially reasonable actions and precautions to prevent the introduction and proliferation of Malicious Code into the Platform. GYTPOL may immediately suspend Customer's access to the Platform if GYTPOL detects Malicious Code or reasonably suspects that Malicious Code was introduced or permitted by Customer or Customer's account. "Malicious Code” means (i) any code, program, or sub-program which causes damage or maliciously interferes with the operation of a computer Platform containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Platform (ii) any device, method, or token that permits any person to circumvent without authorization the normal security of the Platform.
Viruses and Malicious Code. Neither Google nor any party working on its behalf will intentionally introduce any viruses or other malicious code into the Deliverables or the Hosted Services.

Related to Viruses and Malicious Code

  • Malicious Code DST shall implement controls that are designed to detect the introduction or intrusion of malicious code on information systems handling or holding Fund Data and implement a process for removing said malicious code from information systems handling or holding Fund Data.

  • Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.

  • Malicious Software Any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence. Management Charge The sum paid by the Supplier to CCS being an amount of up to 1% but currently set at 0.75% of all Charges for the Services invoiced to Buyers (net of VAT) in each month throughout the duration of the Framework Agreement and thereafter, until the expiry or End of any Call-Off Contract. Management Information The management information specified in Framework Agreement Schedule 6. Material Breach Those breaches which have been expressly set out as a Material Breach and any other single serious breach or persistent failure to perform as required under this Call-Off Contract.

  • Virus Protection The Bank is not responsible for any electronic virus or viruses that you may encounter. We suggest that you routinely scan your PC using a virus protection product. An undetected virus may corrupt and destroy your programs, files, and your hardware.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.