We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Common use of Virus Clause in Contracts

Virus. any program which contains malicious code or infiltrates or damages a computer system without the owner's informed consent or is designed to do so or which is hostile, intrusive or annoying to the owner or user and has no legitimate purpose. Vulnerability: a weakness in the computational logic (for example, code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability.

Appears in 2 contracts

Samples: Share Purchase Agreement, Share Purchase Agreement (Concierge Technologies Inc)

AutoNDA by SimpleDocs

Virus. any program which contains malicious code or infiltrates or damages a computer system without the owner's ’s informed consent or is designed to do so or which is hostile, intrusive or annoying to the owner or user and has no legitimate purpose. Vulnerability: a weakness in the computational logic (for example, code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability.

Appears in 2 contracts

Samples: Maintenance and Support Agreement, Share Purchase Agreement (Bright Horizons Family Solutions Inc.)

Virus. any program which contains malicious code or infiltrates or damages a computer system without the owner's informed consent or is designed to do so or which is hostile, intrusive or annoying to the owner or user and has no legitimate purpose. Vulnerability: a weakness in the computational logic (for example, code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability.

Appears in 2 contracts

Samples: Share Purchase Agreement (Aegean Marine Petroleum Network Inc.), Share Purchase Agreement (Efactor Group Corp.)

AutoNDA by SimpleDocs

Virus. any program which contains malicious code or infiltrates or materially damages a computer system without the owner's ’s informed consent or is designed to do so or which is hostile, hostile or intrusive or annoying to the owner or user and has no legitimate purpose. Vulnerability: a weakness in the computational logic (for example, code) found in software and hardware components that, when exploited, results in a negative impact to confidentiality, integrity, or availability.

Appears in 1 contract

Samples: Share Purchase Agreement (Qumu Corp)