Unauthorized Code Sample Clauses

Unauthorized Code. In the event a TW Company chooses to have AOL provide managed services, such TW Company represents and warrants that the Customer Site and any Updates as delivered will not contain any Unauthorized Code. Using a current version of a reputable “antivirus” program, such TW Company shall test the Customer Site and any Updates thereto for Unauthorized Code.
AutoNDA by SimpleDocs
Unauthorized Code. The Digital Turbine App will contain no Unauthorized Code. Digital Turbine will not use the Digital Turbine App to engage in any fraudulent, illegal, or unauthorized use. Digital Turbine will continuously monitor the Digital Turbine App for the presence of any Unauthorized Code. In the event Digital Turbine detects the presence of any Unauthorized Code, it will: (a) notify Verizon in writing the same day the Unauthorized Code is detected; (b) promptly remove the Unauthorized Code; and (c) promptly remedy any condition caused by the Unauthorized Code.
Unauthorized Code. That the Gordian IP shall be free, at ----------------- the time of receipt by Lantronix, of any computer virus, software locks or other such unauthorized code incorporated therein by Gordian or at Gordian's direction. Unauthorized code includes harmful programs or data incorporated into the Gordian IP which are intended to destroy, erase, damage or otherwise disrupt the normal operation of the Gordian IP or other programs, hardware or systems utilized by Lantronix or allows for unauthorized access to the Gordian IP or other programs, hardware or systems utilized by Lantronix. Unauthorized code also includes any mechanism, such as password checking, CPU serial number checking or time dependency, that could hinder Lantronix freedom to fully exercise its rights under this Agreement.
Unauthorized Code. That the Software shall be free, at the time of receipt by ChiLin, of any computer virus, software locks or other such unauthorized code. Unauthorized code includes harmful programs or data incorporated into the Software which destroys, erases, damages or otherwise disrupts the normal operation of the Software or other programs, hardware or systems utilized by ChiLin or allows for unauthorized access to the Software or other programs, hardware or systems utilized by ChiLin.
Unauthorized Code. Unauthorized Code means any virus, Trojan horse, worm, back door, trap door, time bomb, drop-dead device, timer, clock, counter or other limiting routine, as well as any other instructions, designs, software routines, or hardware components designed to: (a) disable, erase, or otherwise harm software, hardware, data, text or any other information stored in electronic form; (b) cause any of the foregoing with the passage of time; or (c) place a program or hardware under the positive control of a person other than an owner or licensee of the program or hardware. Unauthorized Code does not include software routines in a computer program, if any, designed to permit the owner or licensor of the program, or any other person acting by authority of the owner, or licensor, to obtain access to a licensee’s computer system(s) for purposes of maintenance or technical support.
Unauthorized Code. WebIAm represents and warrants that, at the time WebIAm delivers Licensed Software to WEBiX, there will be no Unauthorized Code, as defined below, in the Licensed Software delivered by WebIAm at that time, or any portion thereof. "Unauthorized Code" means any virus, Trojan horse, worm or other software routines designed to permit unauthorized access by WebIAm or third parties; to disable, erase or otherwise harm Licensed Software, hardware or data; or to perform similar or other such actions.
Unauthorized Code. That the Licensed Software shall be free, at the time of receipt by Galileo, of (1) any automatic restraints, computer viruses, software locks, time bombs or other such code that hinders Galileo’s freedom fully to exercise its license rights under this Agreement; (2) harmful programs or data incorporated into the Licensed Software which destroy, erase, damage or otherwise disrupt the normal (i.e., in accordance with the provisions of this Agreement) operation of the Licensed Software or other programs, hardware or systems utilized by Galileo or allow for unauthorized access to the Licensed Software or other programs, hardware or systems utilized by Galileo; or (3) any mechanism, such as password checking, CPU serial number checking or time dependency, that hinders Galileo’s freedom to fully exercise its license rights under this Agreement. The foregoing provisions of this paragraph (v) shall not be deemed violated by license files that disable functions in the Licensed Software which are not included in the license grant to Galileo hereunder.
AutoNDA by SimpleDocs
Unauthorized Code. That QPX shall be free, at the time of receipt by Orbitz, of (1) any automatic restraints, computer viruses, software locks, time bombs or other such code that hinders Orbitz’s freedom fully to exercise its license rights under this Agreement; (2) harmful programs or data incorporated into QPX which destroy, erase, damage or otherwise disrupt the normal (i.e., in accordance with the provisions of this Agreement) operation of QPX or other programs, hardware or systems utilized by Orbitz or allow for unauthorized access to QPX or other programs, hardware or systems utilized by Orbitz; or (3) any mechanism, such as password checking, CPU serial number checking or time dependency, that hinders Orbitz’s freedom to fully exercise its license rights under this Agreement. The foregoing provisions of this paragraph (v) shall not be deemed violated by license files that disable functions in QPX which are not included in the license grant to Orbitz hereunder.

Related to Unauthorized Code

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Unauthorized Acts Each Party agrees to:

  • Privacy of Customer Information Company Customer Information in the possession of the Agent, other than information independently obtained by the Agent and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of the Companies. Except in accordance with this Section 10.10, the Agent shall not use any Company Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, Customers, or disclose any Company Customer Information to any Person, including any of the Agent’s employees, agents or contractors or any third party not affiliated with the Agent. The Agent may use or disclose Company Customer Information only to the extent necessary (i) for examination and audit of the Agent’s activities, books and records by the Agent’s regulatory authorities, (ii) to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges or (iii) to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors), and for no other purpose; provided that the Agent may also use and disclose the Company Customer Information as expressly permitted by the relevant Company in writing, to the extent that such express permission is in accordance with the Privacy Requirements. The Agent shall take commercially reasonable steps to ensure that each Person to which the Agent intends to disclose Company Customer Information, before any such disclosure of information, agrees to keep confidential any such Company Customer Information and to use or disclose such Company Customer Information only to the extent necessary to protect or exercise the Agent’s, the Custodian’s and the Lenders’ rights and privileges, or to carry out the Agent’s, the Custodian’s and the Lenders’ express obligations, under this Agreement and the other Facilities Papers (including providing Company Customer Information to Approved Investors). The Agent agrees to maintain an Information Security Program and to assess, manage and control risks relating to the security and confidentiality of Company Customer Information pursuant to such program in the same manner as the Agent does so in respect of their own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 208, 211, 225, 263, 308, 364, 568 and 570. Without limiting the scope of the foregoing sentence, the Agent shall use at least the same physical and other security measures to protect all Company Customer Information in the Agent’s possession or control as the Agent uses for their own customers’ confidential and proprietary information.

  • Customer Information CPNI of a Customer and any other non-public, individually identifiable information about a Customer or the purchase by a Customer of the services or products of a Party.

  • UNAUTHORIZED DISCLOSURE OF INFORMATION If it appears that Employee has disclosed (or has threatened to disclose) Information in violation of this Agreement, Employer shall be entitled to an injunction to restrain Employee from disclosing, in whole or in part, such Information, or from providing any services to any party to whom such Information has been disclosed or may be disclosed. Employer shall not be prohibited by this provision from pursuing other remedies, including a claim for losses and damages.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Confidentiality/Protection of Customer Information The Company shall keep confidential and shall not divulge to any party, without the Purchaser's prior written consent, the price paid by the Purchaser for the Mortgage Loans, except to the extent that it is reasonable and necessary for the Company to do so in working with legal counsel, auditors, taxing authorities or other governmental agencies. Each party agrees that it shall comply with all applicable laws and regulations regarding the privacy or security of Customer Information and shall maintain appropriate administrative, technical and physical safeguards to protect the security, confidentiality and integrity of Customer Information, including maintaining security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information, 66 Fed. Reg. 8616 (the "Interagency Guidelines"). For purposes of this Section, the term "Customer Information" shall have the meaning assigned to it in the Interagency Guidelines.

  • Safeguarding Customer Information The Servicer has implemented and will maintain security measures designed to meet the objectives of the Interagency Guidelines Establishing Standards for Safeguarding Customer Information published in final form on February 1, 2001, 66 Fed. Reg. 8616 and the rules promulgated thereunder, as amended from time to time (the “Guidelines”). The Servicer shall promptly provide the Master Servicer, the Trustee and the NIMS Insurer information reasonably available to it regarding such security measures upon the reasonable request of the Master Servicer, the Trustee and the NIMS Insurer which information shall include, but not be limited to, any Statement on Auditing Standards (SAS) No. 70 report covering the Servicer’s operations, and any other audit reports, summaries of test results or equivalent measures taken by the Servicer with respect to its security measures to the extent reasonably necessary in order for the Seller to satisfy its obligations under the Guidelines.

  • Malicious Code You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!