Illicit Code Sample Clauses

Illicit Code. Except for the functions and features expressly disclosed in Supplier's documentation made available to Accenture, Deliverables will be free of any programs, subroutines, code, instructions, data or functions, (including but not limited to viruses, malware, worms, date bombs, time bombs, shut-down devices, keys, authorization codes, back doors or passwords allowing Supplier access) that may result in any inoperability, damage, interruption, or interference of the Deliverables or any equipment on which the Deliverables reside or with which the Deliverables are capable of communicating.
AutoNDA by SimpleDocs
Illicit Code. Licensor warrants unless (i) authorized in writing by Lilly or (ii) necessary to perform valid duties under this Agreement, any Software provided to Lilly by Licensor for use by Licensor or Lilly shall; (a) contain no hidden files, (b) as set up in the default installation, not replicate, transmit or activate itself without control of a person operating computing equipment on which it resides; (c) not alter, damage, or erase any data or computer programs without control of a person operating the computing equipment on which it resides; (d) contain no key, node lock, time-out or other function, whether implemented by electronic, mechanical or other means, which restricts or may restrict use or access to any programs or data developed under this Agreement, based on residency on a specific hardware configuration, frequency of duration of use, or other limiting criteria ("Illicit Code"). Provided and to the extent any program has any of the foregoing attributes, and notwithstanding anything elsewhere in this Agreement to the contrary. Licensor shall be in default of this Agreement, and a thirty (30) day cure period shall apply. In addition to any other remedies available to it under this Agreement, Lilly reserves the right to pursue any civil and/or criminal penalties available to it against the Licensor.
Illicit Code. The Licensed Software, when delivered and installed by Tyler, does not contain, and Tyler has not knowingly introduced through any media, any virus, worm, trap door, back door, bomb, bug, or other contaminant or disabling device, including, without limitation, any timer, clock, counter or other limiting routines, codes, commands, or instructions that may have the effect or be used to access, alter, delete, limit, control, damage, or disable any Purchaser property. EXCEPT AS SPECIFICALLY SET FORTH IN THIS SECTION 11 OR ELSEWHERE IN THIS AGREEMENT, TYLER DISCLAIMS ALL OTHER WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
Illicit Code. Except for the functions and features expressly disclosed in Provider's documentation provided or made available to Accenture, Provider represents and warrants that the Provider Services, deliverables, and software and equipment that process, store or transmit Accenture Data do not and will not knowingly contain any malicious code, including, but not limited to, viruses, malware, worms, malicious backdoors, date/time bombs, ransomware, spyware, rogue software, trojan horses or any disabling code.
Illicit Code. For any software or software development provided by Contractor the following provisions shall apply: Illicit Code is defined as any harmful or hidden programs or data incorporated therein that destroys or impairs the Software and/or data, thereby inhibiting or preventing University from using the Licensed Software as warranted. Contractor uses commercially available software to detect existence of illicit code prior to distributing such Licensed Software; however, Contractor cannot guarantee that any Licensed Software is free of illicit codes and other defects. During the term of a Licensed Software warranty period, or during the term of any Software Support Services as the case may be, like with any other material Licensed Software defect, if it is determined that Illicit Code is present, then Contractor will use commercially reasonable efforts to correct the affected Software and if it cannot do so in a reasonable period of time, replace the affected Software. Contractor will also reasonably assist University in curtailing the spread of the Illicit Code. Contractor represents and warrants that there are no methods for gaining access to the Licensed Software or other computer resources or data of University (such as a master access key, ID password, back door or trap door) other than as otherwise set forth, and Contractor will not embed any device in the Licensed Software or take any action to disrupt or terminate University’s operation of the Licensed Software.
Illicit Code. The Subscription Service shall not contain viruses, malware, worms, date bombs, time bombs, shut-down devices, that may result in, either: (a) any inoperability of the Subscription Service; or (b) any interruption, interference with the operation of the Subscription Service (collectively, “Illicit Code”). If the Subscription Service is found to contain any Illicit Code that adversely affects the performance of the Subscription Service or causes a material security risk to Customer Data, Cleafy shall, as Customer’s exclusive remedy, use commercially reasonable efforts to remove the Illicit Code or to advise and assist Customer to remove such Illicit Code.
Illicit Code. CrossWorlds shall use its best efforts to ensure that no Illicit Code (as defined herein) is coded or introduced into the Software by CrossWorlds or CrossWorlds' representatives. In the event that any Illicit Code is found to have been coded or introduced into the Software by CrossWorlds or CrossWorlds' representatives, CrossWorlds shall use best efforts, at no additional charge, to assist Customer in reducing the effects of the Illicit Code, including assisting customer in mitigating and restoring any damaged or lost data. "Illicit Code" means any program, routine, device or other undisclosed feature or hidden file, not referenced in the Documentation, including without limitation, a time bomb, virus, software lock, trojan horse, drop-dead device, worm, malicious logic or trap door, that is designed to delete, disable, deactivate, interfere with or otherwise harm the Software or Customer's other software, hardware, data, any transmitting or activating computer program, or any hardware-limiting, software-limiting or services-limiting function (including, but not limited to, any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.
AutoNDA by SimpleDocs
Illicit Code. Except for the functions and features expressly disclosed in Supplier's documentation made available to Accenture,
Illicit Code. The Services shall not contain viruses, malware, worms, date bombs, time bombs, shut- down devices, that may result in, either: (a) any inoperability of the Services; or (b) any interruption, interference with the operation of the Services (collectively, “Illicit Code”). If the Services is found to contain any Illicit Code that adversely affects the performance of the Services or causes a material security risk to Buyer Data, Supplier shall, as Buyer’s exclusive remedy, use commercially reasonable efforts to remove the Illicit Code or to advise and assist Buyer to remove such Illicit Code.
Illicit Code. WARRANTY3 A. Supplier represents and warrants that the Goods and/or Services do not contain Illicit Code. B. To the extent that any Goods and/or Services have Illicit Code written into them, Supplier will be in breach of this Agreement, and no cure period will apply. C. Should Supplier learn of the presence of Illicit Code, Supplier will promptly provide UC with written notice explaining the scope and associated risk. D. Supplier represents and warrants that it will take commercially reasonable steps to promptly remove Illicit Code.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!