Common use of No Harmful Code Clause in Contracts

No Harmful Code. To the Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, or exflitrating any data or file without the user’s consent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Merger Agreement (FireEye, Inc.)

AutoNDA by SimpleDocs

No Harmful Code. To the Knowledge of the Company’s Knowledge, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exflitrating destroying any data or file without the user’s consent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Merger Agreement (Simulations Plus, Inc.)

No Harmful Code. To the Knowledge knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exflitrating destroying any data or file without the user’s consent (collectively, “Harmful Code”).

Appears in 1 contract

Samples: Agreement and Plan of Reorganization (FireEye, Inc.)

No Harmful Code. To the Knowledge of the Company, none None of the Company Software contains which constitutes Company IP as a result of Company’s intentional acts includes any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any unauthorized manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exflitrating destroying any data or file without the user’s consent (collectively, “Harmful Code”)or command.

Appears in 1 contract

Samples: Merger Agreement (Instructure Inc)

AutoNDA by SimpleDocs

No Harmful Code. To the Knowledge of the Company, none None of the Company Software contains which constitutes Company IP, as a result of Company’s intentional acts. includes any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any unauthorized manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exflitrating destroying any data or file without the user’s consent or command (collectively, collectively “Harmful Code”).

Appears in 1 contract

Samples: Merger Agreement (Instructure Inc)

No Harmful Code. To the Knowledge knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exflitrating destroying any data or file without the user’s consent (collectively, “Harmful Code”).. Table of Contents

Appears in 1 contract

Samples: Merger Agreement (Roku, Inc)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!