Harmful Code Sample Clauses
Harmful Code. Using a recent version of a reputable virus-checking product (to the extent commercially available), Company will check its software and other systems used by Company to deliver the products or services to the School District for any harmful code, including, without limitation, any viruses, worms, or similar harmful code, and will use commercially reasonable efforts to eliminate any such harmful code that the Company discovers.
Harmful Code. To the Company’s Knowledge, no Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Harmful Code. No Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; (b) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Seller Software.
Harmful Code. The Products shall be free from harmful code (such as spyware, malware, viruses, time bombs, and Trojan horses) and material programming errors that prevent the Products from operating in substantial conformity with the documentation therefor.
Harmful Code. The Seller Products do not contain any “viruses,” “worms,” “time-bombs,” “key-locks,” or any other devices that could disrupt or interfere with the operation of the Seller Products or equipment upon which the Seller Products operate.
Harmful Code. If either Party becomes aware that an unauthorized party has accessed Issuer Data, or Confidential Information, or that Harmful Code has infected a relevant network or system of such Party, then it shall notify the other Party as soon as reasonably practical, so the Parties can work together to mitigate any potential adverse effect and undertake any further steps that may be applicable or required by law. “Harmful Code” means computer instructions whose primary purpose or effect is to disrupt, damage or interfere with use of any computer or telecommunications facilities, including, without limitation, any automatic restraint, time-bomb, trap-door, virus, worm, Trojan horse, or other harmful code or instrumentality that will cause a system to cease to operate or to fail to conform to its specifications. Each Party shall take commercially reasonable precautions to avoid, prevent, stop, find and eliminate the spread of all Harmful Code on its hardware systems and networks.
Harmful Code. 23.3.1 The Service Provider must undertake reasonable efforts to detect and prevent any:
(a) unauthorised access to Confidential Information and Personal Information in its systems, and
(b) any Harmful Code from being introduced by the Service Provider, its Personnel or Subcontractors into Finance or the Agency’s systems or sent from Finance or the Agency’s systems by the Service Provider, its Personnel or Subcontractors, in the course of the Services, including by:
i. implementing practices and procedures that are consistent with industry best practice for an engagement similar to the Services;
ii. use of appropriate and up-to-date virus detection software for preventing and detecting Harmful Code; and
iii. without limiting paragraphs (a) or (b), pro-actively informing itself of developments in threats of Harmful Code, and taking reasonable precautions against such known threats.
23.3.2 If the Service Provider becomes aware that any Harmful Code is found to have been detected the Service Provider must:
(a) notify Finance or the Agency promptly and in any event within 24 hours of discovery;
(b) provide all information known by the Service Provider and reasonably requested by Finance or the Agency in relation to the Harmful Code, its manner of introduction and the effect the Harmful Code has had or is likely to have; and
(c) retain evidence and logs regarding the incident to help in determining the cause, damage and likely source.
23.3.3 The Service Provider must perform its obligations under this clause 23.3 at no additional cost to Finance or the Agency.
Harmful Code. Ping Identity warrants that it will use commercially reasonable efforts, using industry standard practices, to ensure that the Products, in the form provided by Ping Identity to Customer, do not contain Malicious Code.
Harmful Code. GT represents and warrants to Company that, as of the Delivery Date, to the best of its knowledge, software utilized by GT in providing the service does not contain computer instructions, circuitry or other technological means whose purpose is to disrupt, damage or interfere with any use of either party's computer and communications facilities or equipment ("Harmful Code") and it has used commercially reasonable efforts to prevent the introduction of such "Harmful Code" to the services prior to delivery to or use by Company. For the purposes of this warranty, Harmful Code shall include, without limitation, any code containing viruses, Trojan horses, worms, or like destructive code or code that self-replicates. To the extent there is a breach of this Section 10.4 GT shall implement the problem investigation and correction procedures specified in Attachment D at no cost to Company.
Harmful Code. To the Knowledge of the Company, no Company Software owned by the Acquired Corporations or software licensed to any of the Acquired Corporations for use in or in conjunction with the current version of any Company Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.