Common use of No Harmful Code Clause in Contracts

No Harmful Code. To the Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, or exfiltrating any data or file without the user’s consent (collectively, “Harmful Code”).

Appears in 2 contracts

Samples: Agreement and Plan of Merger (KnowBe4, Inc.), Agreement and Plan of Reorganization (FireEye, Inc.)

AutoNDA by SimpleDocs

No Harmful Code. To the Knowledge None of the Companysoftware (including firmware and other software embedded in hardware devices) owned, none of developed (or currently being developed), used, marketed, distributed, licensed or sold by the Company Software (excluding any third party software that is generally available on standard commercial terms and is licensed to the Company solely for internal use on a non-exclusive basis) (collectively, the “Company Software”) contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent (collectively, “Harmful Code”)consent.

Appears in 2 contracts

Samples: Agreement and Plan of Merger (Veracyte, Inc.), Agreement of Merger (Riverbed Technology, Inc.)

No Harmful Code. To No Owned Company Software and, to the Knowledge of the Company, none of the no Licensed Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, have or capable of performing, would reasonably be expected to perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent (collectively, “Harmful Code”)consent.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Yelp Inc)

No Harmful Code. To the Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, or exfiltrating exflitrating any data or file without the user’s consent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Merger (FireEye, Inc.)

No Harmful Code. To the Knowledge of the Company, none None of the Company Software contains which constitutes Company IP as a result of Company’s intentional acts includes any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any unauthorized manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent (collectively, “Harmful Code”)or command.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Instructure Inc)

No Harmful Code. To the Knowledge of the Company’s Knowledge, none of the Company Software contains any undisclosed “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, the Company Product or a computer system or network or other device on which such code Company Software is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent consent; or (iii) otherwise significantly adversely affect the functionality of the Company Product or the computer system or network or other device on which such Company Software is stored or installed (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Stock Purchase Agreement (Willdan Group, Inc.)

No Harmful Code. To the Knowledge of the Company, none None of the Company Software contains which constitutes Company IP, as a result of Company’s intentional acts. includes any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any unauthorized manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent or command (collectively, collectively “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Merger (Instructure Inc)

No Harmful Code. To the Knowledge knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Reorganization (FireEye, Inc.)

AutoNDA by SimpleDocs

No Harmful Code. To the Knowledge of the Company, none None of the Company Software that is owned by the Group Companies contains any “back door,” “drop dead dropdead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Merger (Otonomo Technologies Ltd.)

No Harmful Code. To the Knowledge None of the Companysoftware (including firmware and other software embedded in hardware devices) owned, none of developed (or currently being developed), used, marketed, distributed, licensed or sold by the Company Software (excluding any third-party software that is generally available on standard commercial terms and is licensed to the Company solely for internal use on a non-exclusive basis) (collectively, the “Company Software”) contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent (collectively, “Harmful Code”)consent.

Appears in 1 contract

Samples: Agreement of Merger (Oclaro, Inc.)

No Harmful Code. To the Knowledge knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent (collectively, “Harmful Code”).. Table of Contents

Appears in 1 contract

Samples: Agreement and Plan of Merger (Roku, Inc)

No Harmful Code. To the Knowledge None of the Companysoftware (including firmware and other software embedded in hardware devices) owned, none of the Company Software developed (or currently being developed), used, marketed, distributed, licensed or sold by Seller (excluding any third party software that is generally available on standard commercial terms and is licensed to Seller solely for internal use on a non-exclusive basis) (collectively, “Seller Software”) contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent (collectively, “Harmful Code”)consent.

Appears in 1 contract

Samples: Asset Purchase Agreement (LOCAL Corp)

No Harmful Code. To the Knowledge of the Company’s Knowledge, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exfiltrating destroying any data or file without the user’s consent (collectively, “Harmful Code”).. (k)

Appears in 1 contract

Samples: Agreement and Plan of Merger (Simulations Plus, Inc.)

Time is Money Join Law Insider Premium to draft better contracts faster.