Common use of No Harmful Code Clause in Contracts

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 3 contracts

Samples: Share Purchase Agreement (Silicom Ltd.), Agreement and Plan of Merger (inContact, Inc.), Agreement and Plan of Merger (Salesforce Com Inc)

AutoNDA by SimpleDocs

No Harmful Code. None of the Company Acquired Entity Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 2 contracts

Samples: Agreement and Plan of Mergers (Splunk Inc), Agreement and Plan of Merger (Pure Storage, Inc.)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 2 contracts

Samples: Agreement and Plan of Reorganization (Zovio Inc), Agreement and Plan of Reorganization (Zovio Inc)

No Harmful Code. None To the knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file file, all without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 2 contracts

Samples: Agreement and Plan of Reorganization (GOOD TECHNOLOGY Corp), Agreement and Plan of Reorganization (GOOD TECHNOLOGY Corp)

No Harmful Code. None of the Company Business Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (iA) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (iiB) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Envestnet, Inc.)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Stock Purchase Agreement (Simulations Plus, Inc.)

No Harmful Code. None To the Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging damaging, destroying, taking, appropriating, or destroying exfiltrating any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Reorganization (FireEye, Inc.)

No Harmful Code. None Except as set forth in Part 2.10(k) of the Disclosure Schedule, none of the Acquired Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Yelp Inc)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) materially disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) materially damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Merger and Reorganization (Coupa Software Inc)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead dropdead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Merger (Coupa Software Inc)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” or to the Knowledge of the Company, “virus” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Merger and Reorganization (Crexendo, Inc.)

AutoNDA by SimpleDocs

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise materially impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Merger (Select Comfort Corp)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Share Purchase Agreement (Salesforce Com Inc)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise materially impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Salesforce Com Inc)

No Harmful Code. None of the Acquired Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installedinstalled without the user’s consent; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Share Purchase Agreement (Riverbed Technology, Inc.)

No Harmful Code. None of the Company Owned Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) accessing, damaging or destroying any data or file without the user’s consent. None of the Company Software contains any “back doors” or other undocumented access mechanism allowing unauthorized access to, viewing of, manipulation of or modification or other changes to, any software or Company IT Systems.

Appears in 1 contract

Samples: Equity Purchase Agreement (OMNICELL, Inc)

No Harmful Code. None of Neither the Company Software Products nor any Company IT Systems contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (iA) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; installed or (iiB) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Interest and Stock Purchase Agreement (SOC Telemed, Inc.)

Time is Money Join Law Insider Premium to draft better contracts faster.