back doors, definition
back doors, or other means designed to allow remote access and/or control a Customer’s networks; and (iv) any codes or keys designed to have the effect of disabling or otherwise shutting down all or any portion of the Services or limiting its functionality.
back doors,. Whimsical has not purposefully created “back doors” or similar programming in its systems that provide Services that could be used to access the systems and/or European Personal Data, nor has Whimsical purposefully created or changed its business processes in a manner that facilitates access to European Personal Data or its systems that provide the Services. To the best of Whimsical’s knowledge, United States Data Protection Legislation does not require Whimsical to create or maintain “back doors” or to facilitate access to European Personal Data or systems that provide Services or for Whimsical to possess or provide the encryption key in connection with a United States Disclosure Request (as defined below).
back doors, or other means designed to allow remote access and/or control a Licensee’s networks; (iv) any codes or keys designed to have the effect of disabling or otherwise shutting down all or any portion of the Software or limiting its functionality. Notwithstanding the foregoing, Licensee acknowledges that the Software utilizes a License Key mechanism which limits the Use of the Software to the purchased scope and subscription period and is designed to expire automatically at or after the end of the purchased subscription period, at which point the Software will no longer function.
More Definitions of back doors,
back doors, trap doors," "worms," viruses, bugs, faults or other devices or effects that (i) enable or assist any person to access without authorization the IT Assets, or (ii) otherwise significantly adversely affect the functionality of the IT Assets, in either case except as disclosed in its documentation. To Seller's Knowledge, no person has gained unauthorized access to the IT Assets. Seller has implemented commercially reasonable backup and disaster recovery technology consistent with industry practices.
back doors, trap doors," "worms," viruses, bugs, faults or other devices or effects that (A) enable or assist any Person to access without authorization the IT Assets, or (B) otherwise significantly adversely affect the functionality of the IT Assets, except as disclosed in its documentation. To Seller's Knowledge, no Person has gained unauthorized access to the IT Assets. Seller has implemented reasonable backup and disaster recover technology consistent with industry practices. To Seller's Knowledge, none of the IT Assets or any proprietary software owned by Seller contains any shareware, open source code, or other software whose use requires disclosure or licensing of the Transferred Intellectual Property.
back doors,. “trap doors,” “worms,” viruses, malware, spyware or other malicious devices intentionally included in the Company Products by Company to (i) enable or assist any Person to access without authorization the Company Products; or (ii) disrupt the permitted operation of the Company Products, except as expressly disclosed in its documentation; or (iii) have a Material Adverse Impact on the operation of other software or operating systems on which the Company Products operate. 40
back doors, trap doors," "worms," viruses, bugs, faults or other devices or effects that (A) enable any person to access without authorization the IT Assets, or (B) otherwise significantly adversely affect the functionality of the IT Assets, except as disclosed in its documentation. To the Company's knowledge, no person has gained unauthorized access to the IT Assets. To the Company's knowledge, none of the IT Assets contain any shareware, open source code or other software which requires the disclosure of any information which would otherwise be a Trade Secret of the Company or any of its Subsidiaries.
back doors, trap doors," "worms," viruses, or other devices or effects that (A) enable or assist any person to access without authorization the Company Proprietary Software, or (B) otherwise significantly adversely affect the functionality of the Company Proprietary Software. Except as set forth on Section 3.17(b) of the Disclosure Schedule, to the Knowledge of Sellers, the Company Proprietary Software does not contain any shareware, open source code, or other software the use of which requires disclosure or licensing of the Company Proprietary Software. Sellers shall have made available to Purchaser II for hiring all personnel necessary to use, maintain, revise and operate the Company Proprietary Software as currently maintained, revised and operated.
back doors, time bombs," "drop dead devices," or any other deleterious programmer code, which may restrict Licensee's ability to use or access any of the ViryaNet Product(s) or data contained therein (all of the foregoing collectively the "Devices"), and ViryaNet has no knowledge that the Third Party Software contains any Devices that would restrict Licensee's ability to use or access the ViryaNet Product(s);
back doors, trap doors," "worms," viruses, bugs, faults or other devices or effects that (A) enable or assist any Person to access without authorization the IT Assets, or (B) otherwise significantly adversely affect the functionality of the IT Assets, except as disclosed in its documentation. To the Company's and the Sellers' knowledge, no Person has gained unauthorized access to the IT Assets. The Company and each of its Subsidiaries has implemented reasonable backup and disaster recover technology consistent with industry practices. To the Company's and the Sellers' knowledge, none of the IT Assets contains any shareware, open source code, or other software the use of which requires disclosure or licensing of Intellectual Property.