No Spyware or Malware Sample Clauses

No Spyware or Malware. None of the Company Software performs the following functions, without the knowledge and consent of the owner or authorized user of a computer system or device: (i) sends information of a user to any other Person without the user’s consent or collects Personal Data stored on the computer system or device; (ii) interferes with the owner’s or an authorized user’s control of the computer system or device; (iii) changes or interferes with settings, preferences or commands already installed or stored on the computer system or device without the knowledge of the owner or an authorized user of the computer system or device; (iv) changes or interferes with data that is stored, accessed or accessible on any computer system or device in a manner that obstructs, interrupts or interferes with lawful access to or use of that data by the owner or an authorized user of the computer system or device; (v) causes the computer system or device to communicate with another computer system or device; (vi) installs a computer program that may be activated by a Person other than the owner or an authorized user of the computer system or device; (vii) records a user’s actions without the user’s knowledge; or (viii) employs a user’s Internet connection without the user’s knowledge to gather or transmit information regarding the user or the user’s behavior.
AutoNDA by SimpleDocs
No Spyware or Malware. None of the Company Software is intended to perform the following functions, without the knowledge and consent of the owner or user of a computer system: (i) collects Personal Data stored on the computer system; (ii) interferes with the owner’s or an authorized user’s control of the computer system; (iii) changes or interferes with settings, preferences or commands already installed or stored on the computer system without the knowledge of the owner or an authorized user of the computer system; (iv) changes or interferes with data, that is stored, accessed or accessible on any computer system in a manner that obstructs, interrupts or interferes with lawful access to or use of that data by the owner or an authorized user of the computer system; (v) causes the computer system to communicate with another computer system, or other device, without the authorization of the owner or an authorized user of the computer system; (vi) installs a computer program that may be activated by a third party without the knowledge of the owner or an authorized user of the computer system.
No Spyware or Malware. None of the Company Software is intended to perform the following functions, without the consent of the owner or authorized user of a computer system: () collect Personal Data stored on the computer system; (ii) interfere with the owner’s or an authorized user’s control of the computer system; (iii) change or interferes with settings, preferences or commands already installed or stored on the computer system without the knowledge of the owner or an authorized user of the computer system; (iv) change, take, appropriate, exfiltrate or interfere with data, that is stored, accessed or accessible on any computer system or obstruct, interrupt or interfere with lawful access to or use of data by the owner or an authorized user of the computer system; (v) cause the computer system to communicate with another computer system or other device without the authorization of the owner or an authorized user of the computer system; or (vi) install a computer program that may be activated by a third party without the knowledge and permission of the owner or an authorized user of the computer system (all of the foregoing, collectively, “Harmful Actions”). To the extent the Company, any Subsidiary or any Computer Software has performed any Harmful Actions or delivered any Testing Content at any time, such performance was expressly within the specific consent provided by the owner or authorized user of the applicable computer system and complied with all applicable laws and regulations.
No Spyware or Malware. None of the Company Software is intended to perform the following functions, without the knowledge and consent of the owner or user of an electronic device: (i) collect Personal Data, viewing data, or other device usage data stored or Processed on the electronic device; (ii) interfere with the owner’s or an authorized user’s control of the electronic device; (ii) change or interfere with settings, preferences or commands already installed or stored on the electronic device without the knowledge of the owner or an authorized user of the computer system; (iii) change or interfere with data, that is stored, accessed or accessible on any electronic device in a manner that obstructs, interrupts or interferes with lawful access to or use of that data by the owner or an authorized user of the electronic device; (iv) cause the electronic device to communicate with another electronic device, or other device, without the authorization of the owner or an authorized user of the electronic device; or (v) install a computer program that may be activated by a third party without the knowledge of the owner or an authorized user of the electronic device.
No Spyware or Malware. None of the Company Software is designed to collect Personal Data stored on the computer system or device without the knowledge and consent of the owner or authorized user of a computer system or device. None of the Company Software performs or is designed to perform the following functions, without the knowledge and consent of the owner or authorized user of a computer system or device: (i) interfere with the owner’s or an authorized user’s control of the computer system or device; (ii) change or interfere with settings, preferences or commands already installed or stored on the computer system or device; (iii) change or interfere with data that is stored, accessed or accessible on any computer system or device in a manner that obstructs, interrupts or interferes with lawful access to or use of that data by the owner or an authorized user of the computer system or device; (iv) cause the computer system or device to communicate with another computer system or device; or (v) install a computer program that may be activated by a Person other than the owner or an authorized user of the computer system or device.

Related to No Spyware or Malware

  • No Smoking All District properties are tobacco-free zones; Contractor is prohibited from using any tobacco product on District property.

  • No Weapons or Firearms Except as provided by statute and District policy, all District properties are weapons- and firearms-free zones; Contractor is prohibited from possessing on its persons or in its vehicles any weapons or firearms while on District property.

  • NO DRUGS OR ALCOHOL For reasons of safety and public policy, in any Contract resulting from this procurement, the use of illegal drugs and/or alcoholic beverages by the Contractor or its personnel shall not be permitted while performing any phase of the work herein specified.

  • COUNTERFEIT WORK (a) The following definitions apply to this clause:

  • Unbundled Network Element Combinations 5.1. Unbundled Network Element Combinations shall include: 1) Enhanced Extended Links (EELs); 2) UNE Loops/Special Access Combinations; 3) Loop/Port Combinations; and 4)

  • No Additional Work or Material No claim for additional services, not specifically provided in this contract, performed or furnished by the contractor, will be allowed, nor may the contractor do any work or furnish any material not covered by the contract unless the work or material is ordered in writing by the Project Director and approved by the Agency Head.

  • Weapons We have a zero tolerance of the possession of weapons (sword, knives etc) or firearms (guns etc) in the Room, Building or Common Property. If You are found in possession of weapons, firearms or implements associated with their use in the Room, Building or Common Property We will immediately terminate this agreement and inform the relevant UNSW and legal authorities.

  • Software Ownership If Contractor develops or pays to have developed computer software exclusively with funds or proceeds from the Contract to perform its obligations under the Contract, or to perform computerized tasks that it was not previously performing to meet its obligations under the Contract, the computer software shall be exclusively owned by or licensed to the Department. If Contractor develops or pays to have developed computer software which is an addition to existing software owned by or licensed exclusively with funds or proceeds from the Contract, or to modify software to perform computerized tasks in a manner different than previously performed, to meet its obligations under the Contract, the addition shall be exclusively owned by or licensed to the Department. In the case of software owned by the Department, the Department grants to Contractor a nontransferable, nonexclusive license to use the software in the performance of the Contract. In the case of software licensed to the Department, the Department grants to Contractor permission to use the software in the performance of the Contract. This license or permission, as the case may be, terminates when Contractor has completed its work under the Contract. If Contractor uses computer software licensed to it which it does not modify or program to handle the specific tasks required by the Contract, then to the extent allowed by the license agreement between Contractor and the owner of the software, Contractor grants to the Department a continuing, nonexclusive license for either the Department or a different contractor to use the software in order to perform work substantially identical to the work performed by Contractor under the Contract. If Contractor cannot grant the license as required by this section, then Contractor shall reveal the input screens, report formats, data structures, linkages, and relations used in performing its obligations under the contract in such a manner to allow the Department or another contractor to continue the work performed by contractor under the Contract.

  • No Sanctions The Board and the Association agree that the Association shall not invoke “sanctions” against an individual school during the term of this Agreement. Sanctions are defined, for the purpose of this section, as actions by an association which would deem it unethical or improper for any present or future teacher to accept or continue employment in a particular school. Meetings Regarding Professional Development

  • Convicted, Discriminatory, Antitrust Violator, and Suspended Vendor Lists In accordance with sections 287.133, 287.134, and 287.137, F.S., the Contractor is hereby informed of the provisions of sections 287.133(2)(a), 287.134(2)(a), and 287.137(2)(a), F.S. For purposes of this Contract, a person or affiliate who is on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List may not perform work as a contractor, supplier, subcontractor, or consultant under the Contract. The Contractor must notify the Department if it or any of its suppliers, subcontractors, or consultants have been placed on the Convicted Vendor List, the Discriminatory Vendor List, or the Antitrust Violator Vendor List during the term of the Contract. In accordance with section 287.1351, F.S., a vendor placed on the Suspended Vendor List may not enter into or renew a contract to provide any goods or services to an agency after its placement on the Suspended Vendor List. A firm or individual placed on the Suspended Vendor List pursuant to section 287.1351, F.S., the Convicted Vendor List pursuant to section 287.133, F.S., the Antitrust Violator Vendor List pursuant to section 287.137, F.S., or the Discriminatory Vendor List pursuant to section 287.134, F.S., is immediately disqualified from Contract eligibility.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!