No Harmful Code. None of the software (including firmware and other software embedded in hardware devices) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by the Company (excluding any third party software that is generally available on standard commercial terms and is licensed to the Company solely for internal use on a non-exclusive basis) (collectively, the “Company Software”) contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 2 contracts
Samples: Agreement and Plan of Merger (Veracyte, Inc.), Agreement of Merger (Riverbed Technology, Inc.)
No Harmful Code. None To the Knowledge of the software (including firmware and other software embedded in hardware devices) ownedCompany, developed (or currently being developed), used, marketed, distributed, licensed or sold by none of the Company (excluding any third party software that is generally available on standard commercial terms and is licensed to the Company solely for internal use on a non-exclusive basis) (collectively, the “Company Software”) Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging damaging, destroying, taking, appropriating, or destroying exfiltrating any data or file without the user’s consentconsent (collectively, “Harmful Code”).
Appears in 2 contracts
Samples: Agreement and Plan of Merger (KnowBe4, Inc.), Agreement and Plan of Reorganization (FireEye, Inc.)
No Harmful Code. None To the Company’s Knowledge, none of the software (including firmware and other software embedded in hardware devices) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by the Company (excluding any third party software that is generally available on standard commercial terms and is licensed to the Company solely for internal use on a non-exclusive basis) (collectively, the “Company Software”) Software contains any undisclosed “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, the Company Product or a computer system or network or other device on which such code Company Software is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent; or (iii) otherwise significantly adversely affect the functionality of the Company Product or the computer system or network or other device on which such Company Software is stored or installed (collectively, “Harmful Code”).
Appears in 1 contract
No Harmful Code. None To the Knowledge of the Company, none of the software (including firmware and other software embedded in hardware devices) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by the Company (excluding any third party software that is generally available on standard commercial terms and is licensed to the Company solely for internal use on a non-exclusive basis) (collectively, the “Company Software”) contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s 's consent.
Appears in 1 contract
Samples: Stock Purchase Agreement (Silicon Graphics International Corp)
No Harmful Code. None of the software (including firmware and other software embedded in hardware devices) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by the Company Seller (excluding any third party software that is generally available on standard commercial terms and is licensed to the Company Seller solely for internal use on a non-exclusive basis) (collectively, the “Company Seller Software”) contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
No Harmful Code. None of the software (including firmware and other software embedded in hardware devices) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by the Company (excluding any third third-party software that is generally available on standard commercial terms and is licensed to the Company solely for internal use on a non-exclusive basis) (collectively, the “Company Software”) contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
Samples: Agreement of Merger (Oclaro, Inc.)
No Harmful Code. None of the software (including firmware and other software embedded in hardware devices) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold Company Software that is owned by the Company (excluding any third party software that is generally available on standard commercial terms and is licensed to the Company solely for internal use on a non-exclusive basis) (collectively, the “Company Software”) Group Companies contains any “back door,” “drop dead dropdead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consentconsent (collectively, “Harmful Code”).
Appears in 1 contract
Samples: Agreement and Plan of Merger (Otonomo Technologies Ltd.)