No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 3 contracts
Samples: Share Purchase Agreement (Silicom Ltd.), Merger Agreement (inContact, Inc.), Merger Agreement (Salesforce Com Inc)
No Harmful Code. None of the Company Acquired Entity Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 2 contracts
Samples: Merger Agreement (Splunk Inc), Merger Agreement (Pure Storage, Inc.)
No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).
Appears in 2 contracts
Samples: Agreement and Plan of Reorganization (Zovio Inc), Agreement and Plan of Reorganization (Zovio Inc)
No Harmful Code. None of the Company Owned Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) accessing, damaging or destroying any data or file without the user’s consent. None of the Company Software contains any “back doors” or other undocumented access mechanism allowing unauthorized access to, viewing of, manipulation of or modification or other changes to, any software or Company IT Systems.
Appears in 1 contract
No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise materially impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).
Appears in 1 contract
No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” or to the Knowledge of the Company, “virus” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).
Appears in 1 contract
Samples: Merger Agreement (Crexendo, Inc.)
No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).
Appears in 1 contract
No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise materially impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
No Harmful Code. None To the Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging damaging, destroying, taking, appropriating, or destroying exfiltrating any data or file without the user’s consentconsent (collectively, “Harmful Code”).
Appears in 1 contract
Samples: Merger Agreement (FireEye, Inc.)
No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) materially disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) materially damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).
Appears in 1 contract
No Harmful Code. None of the Company Business Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (iA) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (iiB) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
Samples: Merger Agreement (Envestnet, Inc.)
No Harmful Code. None of the Company Software contains any “back door,” “drop dead dropdead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).
Appears in 1 contract
No Harmful Code. None of the Acquired Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installedinstalled without the user’s consent; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
Samples: Share Purchase Agreement (Riverbed Technology, Inc.)
No Harmful Code. None Except as set forth in Part 2.10(k) of the Disclosure Schedule, none of the Acquired Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
Samples: Merger Agreement (Yelp Inc)