Common use of No Harmful Code Clause in Contracts

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 3 contracts

Samples: Share Purchase Agreement (Silicom Ltd.), Merger Agreement (inContact, Inc.), Merger Agreement (Salesforce Com Inc)

AutoNDA by SimpleDocs

No Harmful Code. None of the Company Acquired Entity Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 2 contracts

Samples: Merger Agreement (Splunk Inc), Merger Agreement (Pure Storage, Inc.)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 2 contracts

Samples: Agreement and Plan of Reorganization (Zovio Inc), Agreement and Plan of Reorganization (Zovio Inc)

No Harmful Code. None of the Company Owned Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) accessing, damaging or destroying any data or file without the user’s consent. None of the Company Software contains any “back doors” or other undocumented access mechanism allowing unauthorized access to, viewing of, manipulation of or modification or other changes to, any software or Company IT Systems.

Appears in 1 contract

Samples: Equity Purchase Agreement (OMNICELL, Inc)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise materially impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Merger Agreement (Select Comfort Corp)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” or to the Knowledge of the Company, “virus” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Merger Agreement (Crexendo, Inc.)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Stock Purchase Agreement (Simulations Plus, Inc.)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise materially impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Merger Agreement (Salesforce Com Inc)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Share Purchase Agreement (Salesforce Com Inc)

No Harmful Code. None To the Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging damaging, destroying, taking, appropriating, or destroying exfiltrating any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Merger Agreement (FireEye, Inc.)

AutoNDA by SimpleDocs

No Harmful Code. None of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) materially disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) materially damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Merger Agreement (Coupa Software Inc)

No Harmful Code. None of the Company Business Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (iA) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (iiB) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Merger Agreement (Envestnet, Inc.)

No Harmful Code. None of the Company Software contains any “back door,” “drop dead dropdead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Merger Agreement (Coupa Software Inc)

No Harmful Code. None of the Acquired Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installedinstalled without the user’s consent; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Share Purchase Agreement (Riverbed Technology, Inc.)

No Harmful Code. None Except as set forth in Part 2.10(k) of the Disclosure Schedule, none of the Acquired Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Merger Agreement (Yelp Inc)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!