No Harmful Code. To the knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contents
Appears in 1 contract
No Harmful Code. To the knowledge of the Company, none None of the Company Software contains which constitutes Company IP, as a result of Company’s intentional acts. includes any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any unauthorized manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent or command (collectively, collectively “Harmful Code”). Table of Contents.
Appears in 1 contract
No Harmful Code. To the knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contents.
Appears in 1 contract
Samples: Agreement and Plan of Reorganization (FireEye, Inc.)
No Harmful Code. To the knowledge of the Company’s Knowledge, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contents(k)
Appears in 1 contract
Samples: Agreement and Plan of Merger (Simulations Plus, Inc.)
No Harmful Code. To the knowledge of the Company, none None of the Company Software contains which constitutes Company IP as a result of Company’s intentional acts includes any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any unauthorized manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contentsor command.
Appears in 1 contract
No Harmful Code. To the knowledge Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging damaging, destroying, taking, appropriating, or destroying exflitrating any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contents.
Appears in 1 contract