No Harmful Code. To the Knowledge of the Acquired Companies, none of the Acquired Companies Software or any Acquired Companies Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 2 contracts
Samples: Stock Purchase Agreement, Stock Purchase Agreement (OMNICELL, Inc)
No Harmful Code. To the Knowledge None of the Acquired Companies, none of the Acquired Companies Entity Owned Software or any Acquired Companies Entity Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
No Harmful Code. To the Knowledge None of the Acquired CompaniesCompany Software, none of as it exists at the Acquired Companies Software or time any Acquired Companies Product Company makes such Acquired Company Software available to any third party, contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed, other than digital rights management mechanisms; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract
Samples: Agreement and Plan of Merger (Vonage Holdings Corp)
No Harmful Code. To No Owned Company Software and, to the Knowledge of the Acquired CompaniesCompany, none of the Acquired Companies no Licensed Company Software or any Acquired Companies Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, have or capable of performing, would reasonably be expected to perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.
Appears in 1 contract