No Malicious Software Sample Clauses

No Malicious Software. None of the Company Products contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing or without user intent will cause, any of the following functions (except as may be necessary to legitimately manage the authorized use of Company’s Product): (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed, (ii) damaging or destroying any data or file without the user’s consent, or (iii) sending information to Company, any of its Subsidiaries or any third party without the user’s consent. None of the Company Products (i) constitutes or is considered “spyware” or “trackware” as such term is commonly understood in the software industry, (ii) is installed on a user’s computer without their knowledge, (iii) records a user’s actions without their knowledge, (iv) employs a user’s Internet connection without their knowledge to gather or transmit information on the user or their behavior, or (v) will load whenever a browser starts or share the browser’s memory context. For the purposes of this paragraph, “without a user’s knowledge” includes but is not limited to (x) without explicitly informing the user and (y) without being expected by a reasonable user even if the text of a license agreement, help file, or other user information file does explicitly inform such user.
AutoNDA by SimpleDocs
No Malicious Software. None of the Company Products currently being distributed, offered, made available, used, or supported contain any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing or without user intent will cause, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed, (ii) damaging or destroying any data or file without a customer’s specific consent, or (iii) sending information to the Company, a Company Subsidiary or any third party without a customer’s specific consent. None of the Company Products currently being distributed, offered, made available, used, or supported (i) is installed on a customer’s computer without their knowledge, (ii) records customer’s actions without their knowledge, (iii) employs a customer’s Internet connection without their knowledge to gather or transmit information on the customer or their behavior, or (iv) will load whenever a browser starts or share the browser’s memory context (all of the foregoing, collectively, “Malware”); provided, however, that no representation or warranty is made in this sentence with respect to any Malware that may be transmitted by the Company’s customers via Company Products, where any such Malware (i) is not and was not contained in or transmitted with the Company Products as made available by the Company or its Subsidiaries and (ii) could not have been detected and removed using reasonable efforts of the Company or its Subsidiaries. For the purposes of this paragraph, “without customer’s knowledge” includes but is not limited to (a) without explicitly informing the customer or (b) without being expected by a reasonable customer, even if the text of a license agreement, help file, or other user information file does explicitly inform such customer. For purposes of this Section 3.13(k), “customer” includes paid and unpaid customers and other users of such Company Products. The Company and each of its Subsidiaries have taken reasonable steps to protect the Company Products and the information technology systems used in connection with the operation of the Company and each of its Subsidiaries from Malware.
No Malicious Software. No Company Product contains any computer code designed to improperly disrupt, disable or harm in any manner the operation of any software or hardware. None of the Company’s Products contains any worm, bomb, backdoor, clock, timer or other disabling device, code, design or routine which improperly causes the software or any portion thereof to be erased, inoperable or otherwise incapable of being used, either automatically, with the passage of time or upon command by any party. The Company has a policy and procedure for tracking material bugs, errors and defects of which it becomes aware in any Company Products, and maintains a database covering the foregoing. For all Software currently used by the Company in providing Company Products, or in developing or making available any of the Company Products, the Company has, to the extent commercially appropriate, implemented any and all material security patches or material security upgrades that to the Company’s Knowledge are generally available for that Software. The term “material security patches or material security upgrades” means, for purposes of the foregoing sentence, security patches and security upgrades the implementation of which other companies developing and marketing software products similar to the Company’s Products would reasonably consider prudent.

Related to No Malicious Software

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • The Software The End User shall be granted to receive one copy of the Software and the Documentation and to load, install and properly use the Software for the maximum number of servers and users or workflows determined in the Form of Agreement and under the terms and conditions of this XXXX and the ELP. The Form of Agreement contains specific conditions valid for the agreement between the Licensor and the End User for the specific license. References to this XXXX within the present document include the reference to the Form of Agreement concluded with the End User. The Software Licenses defined, described in this document give the rights solely for the Eventus software and no other software or hardware or any other kind of components, unless otherwise stated.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!