No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
No Harmful Code. To the knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file, all without the user’s consent (collectively, “Harmful Code”).
No Harmful Code. Customer represents and warrants that no content designed to delete, disable, deactivate, interfere with or otherwise harm any aspect of the IVR system now or in the future, shall be knowingly transmitted by Customer or Users.
No Harmful Code. Provider represents and warrants that the Services and all Deliverables will be free of any (a) Viruses or
No Harmful Code. To the Knowledge of the Acquired Companies, none of the Acquired Companies Software or any Acquired Companies Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
No Harmful Code. The Company takes commercially reasonable steps to assure that material Software and data residing on its computer networks or within the Products is free of viruses and other unauthorized disruptive technological means. To the Knowledge of the Company, the Company Intellectual Property does not contain any Harmful Code.
No Harmful Code. The Sellers take commercially reasonable steps at all times to assure that all software and data residing on its computer networks or licensed or otherwise distributed to customers is free of viruses and other disruptive technological means. The Purchased Intellectual Property does not contain any Harmful Code.
No Harmful Code. None of the software (including firmware and other software embedded in hardware devices) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by the Company (excluding any third-party software that is generally available on standard commercial terms and is licensed to the Company solely for internal use on a non-exclusive basis) (collectively, the “Company Software”) contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
No Harmful Code. None of the software (including firmware and other software embedded in hardware devices) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by any Acquired Company (collectively, “Acquired Company Software”) contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
No Harmful Code. Company represents and warrants that during the course of the Access, Company User will not run any process, audit, or the like, that collects, retrieves, extracts or otherwise provides access to University's data, system information, or the like without University's prior written consent. Company further represents and warrants that the Access activities will contain no computer instructions, circuitry or other technological means whose purpose or effect is to disrupt, damage, extract information from or interfere with University's computers, communications facilities or equipment and their use ("Harmful Code"), and Company shall prevent the introduction of such Harmful Code to University's systems. "Harmful Code" includes, without limitation, any code containing viruses, Trojan horses, worms or like destructive code or code that self-replicates, or cryptocurrency mining tools.