Harmful Code. To the best of the knowledge of the Company, no Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
Samples: Agreement and Plan of Merger (Patient Infosystems Inc)
Harmful Code. To the best of the knowledge of the Company, no Company No Business Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file file, in each case, without the user’s consentconsent (“Harmful Code”).
Appears in 1 contract
Harmful Code. To The Company has not knowingly taken any action resulting in the best of the knowledge of the Company, no Company Software contains containing any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
Samples: Agreement and Plan of Merger (Fusion Acquisition Corp.)
Harmful Code. To the best of the knowledge of the Company, no Company No Target Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) collecting, damaging or destroying any information, data or file file, in each case, without the user’s consent.
Appears in 1 contract
Samples: Agreement and Plan of Merger (DreamWorks Animation SKG, Inc.)
Harmful Code. To the best of the knowledge of the Company, no No Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (ai) disrupting, disabling, harming, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file file, in each case, without the user’s consent.
Appears in 1 contract
Samples: Share Purchase Agreement (Zynga Inc)