Common use of Harmful Code Clause in Contracts

Harmful Code. No Business Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the Software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file, in each case, without the user’s consent (“Harmful Code”).

Appears in 1 contract

Samples: Master Business Transfer Agreement (Zynga Inc)

AutoNDA by SimpleDocs

Harmful Code. No Business Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the Software software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (i) disrupting, disabling, harming, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file, in each case, without the user’s consent (“Harmful Code”)consent.

Appears in 1 contract

Samples: Share Purchase Agreement (Zynga Inc)

Harmful Code. No Business To the best of the knowledge of the Company, no Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the Software software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (ia) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (iib) damaging or destroying any data or file, in each case, file without the user’s consent (“Harmful Code”)consent.

Appears in 1 contract

Samples: Merger Agreement (Patient Infosystems Inc)

AutoNDA by SimpleDocs

Harmful Code. No Business The Company has not knowingly taken any action resulting in the Company Software contains containing any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the Software software industry) or any similar mechanism or device, or any other code designed or intended to have, or intended to be capable of performing, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file, in each case, file without the user’s consent (“Harmful Code”)consent.

Appears in 1 contract

Samples: Merger Agreement (Fusion Acquisition Corp.)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!