Harmful Code. No Business Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the Software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file, in each case, without the user’s consent (“Harmful Code”).
Appears in 1 contract
Harmful Code. No Business Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the Software software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (i) disrupting, disabling, harming, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file, in each case, without the user’s consent (“Harmful Code”)consent.
Appears in 1 contract
Samples: Share Purchase Agreement (Zynga Inc)
Harmful Code. No Business To the best of the knowledge of the Company, no Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the Software software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (ia) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (iib) damaging or destroying any data or file, in each case, file without the user’s consent (“Harmful Code”)consent.
Appears in 1 contract
Harmful Code. No Business The Company has not knowingly taken any action resulting in the Company Software contains containing any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the Software software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file, in each case, file without the user’s consent (“Harmful Code”)consent.
Appears in 1 contract