Unauthorized Code Sample Clauses

Unauthorized Code. In the event a TW Company chooses to have AOL provide managed services, such TW Company represents and warrants that the Customer Site and any Updates as delivered will not contain any Unauthorized Code. Using a current version of a reputable “antivirus” program, such TW Company shall test the Customer Site and any Updates thereto for Unauthorized Code.
AutoNDA by SimpleDocs
Unauthorized Code. The Digital Turbine App will contain no Unauthorized Code. Digital Turbine will not use the Digital Turbine App to engage in any fraudulent, illegal, or unauthorized use. Digital Turbine will continuously monitor the Digital Turbine App for the presence of any Unauthorized Code. In the event Digital Turbine detects the presence of any Unauthorized Code, it will: (a) notify Verizon in writing the same day the Unauthorized Code is detected; (b) promptly remove the Unauthorized Code; and (c) promptly remedy any condition caused by the Unauthorized Code.
Unauthorized Code. That the Gordian IP shall be free, at ----------------- the time of receipt by Lantronix, of any computer virus, software locks or other such unauthorized code incorporated therein by Gordian or at Gordian's direction. Unauthorized code includes harmful programs or data incorporated into the Gordian IP which are intended to destroy, erase, damage or otherwise disrupt the normal operation of the Gordian IP or other programs, hardware or systems utilized by Lantronix or allows for unauthorized access to the Gordian IP or other programs, hardware or systems utilized by Lantronix. Unauthorized code also includes any mechanism, such as password checking, CPU serial number checking or time dependency, that could hinder Lantronix freedom to fully exercise its rights under this Agreement.
Unauthorized Code. WebIAm represents and warrants that, at the time WebIAm delivers Licensed Software to WEBiX, there will be no Unauthorized Code, as defined below, in the Licensed Software delivered by WebIAm at that time, or any portion thereof. "Unauthorized Code" means any virus, Trojan horse, worm or other software routines designed to permit unauthorized access by WebIAm or third parties; to disable, erase or otherwise harm Licensed Software, hardware or data; or to perform similar or other such actions.
Unauthorized Code. That QPX shall be free, at the time of receipt by Orbitz, of (1) any automatic restraints, computer viruses, software locks, time bombs or other such code that hinders Orbitz’s freedom fully to exercise its license rights under this Agreement; (2) harmful programs or data incorporated into QPX which destroy, erase, damage or otherwise disrupt the normal (i.e., in accordance with the provisions of this Agreement) operation of QPX or other programs, hardware or systems utilized by Orbitz or allow for unauthorized access to QPX or other programs, hardware or systems utilized by Orbitz; or (3) any mechanism, such as password checking, CPU serial number checking or time dependency, that hinders Orbitz’s freedom to fully exercise its license rights under this Agreement. The foregoing provisions of this paragraph (v) shall not be deemed violated by license files that disable functions in QPX which are not included in the license grant to Orbitz hereunder.
Unauthorized Code. That the Licensed Software shall be free, at the time of receipt by Galileo, of (1) any automatic restraints, computer viruses, software locks, time bombs or other such code that hinders Galileo’s freedom fully to exercise its license rights under this Agreement; (2) harmful programs or data incorporated into the Licensed Software which destroy, erase, damage or otherwise disrupt the normal (i.e., in accordance with the provisions of this Agreement) operation of the Licensed Software or other programs, hardware or systems utilized by Galileo or allow for unauthorized access to the Licensed Software or other programs, hardware or systems utilized by Galileo; or (3) any mechanism, such as password checking, CPU serial number checking or time dependency, that hinders Galileo’s freedom to fully exercise its license rights under this Agreement. The foregoing provisions of this paragraph (v) shall not be deemed violated by license files that disable functions in the Licensed Software which are not included in the license grant to Galileo hereunder.
Unauthorized Code. That the Software shall be free, at the time of receipt by ChiLin, of any computer virus, software locks or other such unauthorized code. Unauthorized code includes harmful programs or data incorporated into the Software which destroys, erases, damages or otherwise disrupts the normal operation of the Software or other programs, hardware or systems utilized by ChiLin or allows for unauthorized access to the Software or other programs, hardware or systems utilized by ChiLin.
AutoNDA by SimpleDocs
Unauthorized Code. Unauthorized Code means any virus, Trojan horse, worm, back door, trap door, time bomb, drop-dead device, timer, clock, counter or other limiting routine, as well as any other instructions, designs, software routines, or hardware components designed to: (a) disable, erase, or otherwise harm software, hardware, data, text or any other information stored in electronic form; (b) cause any of the foregoing with the passage of time; or (c) place a program or hardware under the positive control of a person other than an owner or licensee of the program or hardware. Unauthorized Code does not include software routines in a computer program, if any, designed to permit the owner or licensor of the program, or any other person acting by authority of the owner, or licensor, to obtain access to a licensee’s computer system(s) for purposes of maintenance or technical support.

Related to Unauthorized Code

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. § 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.

  • Unauthorized Leave Leave other than that provided for in this section may be cause for disciplinary action.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.

  • Unauthorized Acts Each Party shall (a) notify the other Party promptly of any unauthorized possession, use, or knowledge of any Confidential Information by any person which shall become known to it, any attempt by any person to gain possession of Confidential Information without authorization or any attempt to use or acquire knowledge of any Confidential Information without authorization (collectively, "Unauthorized Access"), (b) promptly furnish to the other Party full details of the Unauthorized Access and use reasonable efforts to assist the other Party in investigating or preventing the reoccurrence of any Unauthorized Access, (c) cooperate with the other Party in any litigation and investigation against third parties deemed necessary by such Party to protect its proprietary rights, and (d) use commercially reasonable efforts to prevent a reoccurrence of any such Unauthorized Access.

  • Privacy of Customer Information Company Customer Information in the possession of the Agent, other than information independently obtained by the Agent and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of the Companies. Except in accordance with this Section 10.10, the Agent shall not use any Company Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, Customers, or disclose any Company Customer Information to any Person, including any of the Agent’s employees, agents or contractors or any third party not affiliated with the Agent. The Agent may use or disclose Company Customer Information only to the extent necessary (i) for examination and audit of the Agent’s activities, books and records by the Agent’s regulatory authorities, (ii) to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges or (iii) to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors), and for no other purpose; provided that the Agent may also use and disclose the Company Customer Information as expressly permitted by the relevant Company in writing, to the extent that such express permission is in accordance with the Privacy Requirements. The Agent shall take commercially reasonable steps to ensure that each Person to which the Agent intends to disclose Company Customer Information, before any such disclosure of information, agrees to keep confidential any such Company Customer Information and to use or disclose such Company Customer Information only to the extent necessary to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges, or to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations, under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors). The Agent agrees to maintain an Information Security Program and to assess, manage and control risks relating to the security and confidentiality of Company Customer Information pursuant to such program in the same manner as the Agent does so in respect of their own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 208, 211, 225, 263, 308, 364, 568 and 570. Without limiting the scope of the foregoing sentence, the Agent shall use at least the same physical and other security measures to protect all Company Customer Information in the Agent’s possession or control as the Agent uses for their own customers’ confidential and proprietary information.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!