Common use of No Harmful Code Clause in Contracts

No Harmful Code. To the knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contents

Appears in 1 contract

Samples: Agreement and Plan of Merger (Roku, Inc)

AutoNDA by SimpleDocs

No Harmful Code. To the knowledge of the Company, none None of the Company Software contains which constitutes Company IP, as a result of Company’s intentional acts. includes any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any unauthorized manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent or command (collectively, collectively “Harmful Code”). Table of Contents.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Instructure Inc)

No Harmful Code. To the knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contents.

Appears in 1 contract

Samples: Agreement and Plan of Reorganization (FireEye, Inc.)

No Harmful Code. To the knowledge of the Company’s Knowledge, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software Software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contents(k)

Appears in 1 contract

Samples: Agreement and Plan of Merger (Simulations Plus, Inc.)

AutoNDA by SimpleDocs

No Harmful Code. To the knowledge of the Company, none None of the Company Software contains which constitutes Company IP as a result of Company’s intentional acts includes any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any unauthorized manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contentsor command.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Instructure Inc)

No Harmful Code. To the knowledge Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging damaging, destroying, taking, appropriating, or destroying exflitrating any data or file without the user’s consent (collectively, “Harmful Code”). Table of Contents.

Appears in 1 contract

Samples: Agreement and Plan of Merger (FireEye, Inc.)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!