No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
No Harmful Code. Customer represents and warrants that no content designed to delete, disable, deactivate, interfere with or otherwise harm any aspect of the IVR system now or in the future, shall be knowingly transmitted by Customer or Users.
No Harmful Code. To the Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, or exfiltrating any data or file without the user’s consent (collectively, “Harmful Code”).
No Harmful Code. To the Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, or exflitrating any data or file without the user’s consent (collectively, “Harmful Code”).
No Harmful Code. Provider represents and warrants that the Services and all Deliverables will be free of any (a) Viruses or
No Harmful Code. To the Knowledge of the Acquired Companies, none of the Acquired Companies Software or any Acquired Companies Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
No Harmful Code. The Company takes commercially reasonable steps to assure that material Software and data residing on its computer networks or within the Products is free of viruses and other unauthorized disruptive technological means. To the Knowledge of the Company, the Company Intellectual Property does not contain any Harmful Code.
No Harmful Code. The Sellers take commercially reasonable steps at all times to assure that all software and data residing on its computer networks or licensed or otherwise distributed to customers is free of viruses and other disruptive technological means. The Purchased Intellectual Property does not contain any Harmful Code.
No Harmful Code. Neither the Company Products nor any Company IT Systems contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (A) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed or (B) damaging or destroying any data or file without the user’s consent.
No Harmful Code. Company represents and warrants that during the course of the Access, Company User will not run any process, audit, or the like, that collects, retrieves, extracts or otherwise provides access to University's data, system information, or the like without University's prior written consent. Company further represents and warrants that the Access activities will contain no computer instructions, circuitry or other technological means whose purpose or effect is to disrupt, damage, extract information from or interfere with University's computers, communications facilities or equipment and their use ("Harmful Code"), and Company shall prevent the introduction of such Harmful Code to University's systems. "Harmful Code" includes, without limitation, any code containing viruses, Trojan horses, worms or like destructive code or code that self-replicates, or cryptocurrency mining tools.