Common use of No Harmful Code Clause in Contracts

No Harmful Code. To the Knowledge of the Acquired Companies, none of the Acquired Companies Software or any Acquired Companies Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 2 contracts

Samples: Stock Purchase Agreement, Stock Purchase Agreement (OMNICELL, Inc)

AutoNDA by SimpleDocs

No Harmful Code. To the Knowledge None of the Acquired CompaniesCompany Software, none of as it exists at the Acquired Companies Software or time any Acquired Companies Product Company makes such Acquired Company Software available to any third party, contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed, other than digital rights management mechanisms; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Vonage Holdings Corp)

AutoNDA by SimpleDocs

No Harmful Code. To the Knowledge None of the Acquired Companies, none of the Acquired Companies Entity Owned Software or any Acquired Companies Entity Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Autodesk Inc)

Time is Money Join Law Insider Premium to draft better contracts faster.