Destructive Code definition

Destructive Code means any "viruses", "trojan horses", computer code, malware, "ransomware", instructions, devices or other Materials that (i) are designed to disrupt, disable, harm or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation or use of Infrastructure or Materials; or (ii) would disable the whole or any part of any Infrastructure or Materials or impair in any way their operation or use based on the elapsing of a period of time, exceeding the authorised number of copies, advancement to a particular date or other numeral; or (iii) that would permit an unauthorised party to access the Infrastructure or Materials of iConnect to cause such disablement or impairment, or (iv) which contains any other harmful, malicious or hidden procedures, routines or mechanisms; or (iv) that can cause or allow damage to, or loss, theft, destruction or corruption of, Infrastructure or Materials, data, storage media, programs, equipment or communications, or otherwise interfere with the operations thereof;
Destructive Code means any unauthorised software, computer code, access or routines which is designed to disrupt, disable, harm or otherwise impede in any manner, data and operations including the operations of any software, firmware, hardware and peripherals, wide area network, or local area network (including elements generally referred to as "viruses", "Trojan-horses", worms", "time-bombs", "drop dead", "traps", "access codes", "back doors" or "trap door" devices). Initial: Contractor:
Destructive Code means any "viruses", "trojan horses", computer code, malware, instructions, devices or other materials designed to disrupt, disable, harm or otherwise impede in any manner the operation of any Device, Technology, services, data, storage media, programs, equipment or communications, or otherwise interfere with operations thereof;

Examples of Destructive Code in a sentence

  • The Contractor shall use Commercially Reasonable Efforts to ensure that no Destructive Code is introduced into the Deliverables or Interfront’s Infrastructure during the performance of any Services by the Contractor personnel or by its Sub- Contractor/s.

  • In the event that a Destructive Code is introduced by the Initial: Contractor: Contractor’s personnel or that of its Sub-Contractor/s, to the extent commercially reasonable, the Contractor shall at no additional charge, assist Interfront to reduce the effects of the Destructive Code and if the Destructive Code causes a loss of operational efficiency or loss of data, to mitigate and restore such losses.


More Definitions of Destructive Code

Destructive Code means any "viruses", "trojan horses", computer code, malware, "ransomware", instructions, devices or other Materials that (i) are designed to disrupt, disable, harm or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation or use of Infrastructure or Materials; or (ii) would disable the whole or any part of any Infrastructure or Materials or impair in any way their operation or Use based on the elapsing of a period of time, exceeding the authorised number of copies, advancement to a particular date or other numeral; or (iii) that would permit an unauthorised party to access the Infrastructure or Materials of iConnect to cause such disablement or impairment, or (iv) which contains any other similar harmful, malicious or hidden procedures, routines or mechanisms; or (iv) that can cause or allow damage to, or loss, theft, destruction or corruption of, Infrastructure or Materials, data, storage media, programs, equipment or communications, or otherwise interfere with operations thereof; “Dispute Notice” means a written notice served by the aggrieved party on the defaulting party, setting out the nature of the dispute; “Effective Date” means, in respect of each Services Proposal, the effective date stipulated in each Services Order or the Connection Date, whichever is the first to occur; “Emergency Changes” means an urgent, mandatory change that may occur outside the Scheduled Downtime where critical changes impacting on iConnect’ network infrastructure must be performed in order to (i) restore accessibility and functionality of; and/or (ii) sustain the availability of the iConnect network infrastructure; “Equipment” means the router/gateway, modem and/or any other equipment or hardware that are required to be installed by the Customer at the Sites in order for iConnect to provide the Services, including, without limitation, the Equipment set out in a Services Proposal; “Fees” means the fees and charges to be paid by the Customer to iConnect in respect of the Services as set out in the relevant Service Proposal; “Initial Term” means a period of 24 months commencing on the Effective Date, unless a different period is stated in a Services Proposal; "Infrastructure" means information technology and telecommunications infrastructure and systems, including computer and telecommunications networks, equipment, hardware, software, middleware, firmware, data, databases, peripherals, terminals and components; "Laws" means all laws, ...

Related to Destructive Code

  • Constructive Ownership means ownership of Shares by a Person, whether the interest in Shares is held directly or indirectly (including by a nominee), and shall include interests that would be treated as owned through the application of Section 318(a) of the Code, as modified by Section 856(d)(5) of the Code. The terms “Constructive Owner,” “Constructively Owns” and “Constructively Owned” shall have the correlative meanings.

  • Constructive Sale means, with respect to any security, a short sale or entering into or acquiring an offsetting derivative contract with respect to such security, entering into or acquiring a futures or forward contract to deliver such security or entering into any other hedging or other derivative transaction that has the effect of materially changing the economic benefits and risks of ownership of such security.

  • Destruction means physical destruction or removal of personal identifiers from information so that the information is no longer personally identifiable.

  • Obstructive practice means materially impede the Bank’s or Government agencies investigation into allegations of one or more of the above mentioned prohibited practices either by deliberately destroying, falsifying, altering; or by concealing of evidence material to the investigation; or by making false statements to investigators and/or by threatening, harassing or intimidating any party to prevent it from disclosing its knowledge of matters relevant to the investigation or from pursuing the investigation; or by impeding the Bank’s rights of audit or access to information;

  • obstructive practices which means harming or threatening to harm, directly or indirectly, persons to influence their participation in a procurement process, or affect the execution of a contract;

  • Emotional abuse means behavior that could harm a child's emotional development, such as threatening, intimidating, humiliating, demeaning, criticizing, rejecting, using profane language, or using inappropriate physical restraint.

  • Constructive Termination means:

  • Data Breaches Party shall report to AHS, though its Chief Information Officer (CIO), any impermissible use or disclosure that compromises the security, confidentiality or privacy of any form of protected personal information identified above within 24 hours of the discovery of the breach. Party shall in addition comply with any other data breach notification requirements required under federal or state law.

  • Personal Data Breach means a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, Personal Data transmitted, stored or otherwise processed;

  • Counterfeit substance means a controlled substance which, or the container or labeling of which, without authorization, bears the trademark, trade name, or other identifying mark, imprint, number or device, or any likeness thereof, of a manufacturer, distributor, or dispenser other than the person who in fact manufactured, distributed, or dispensed the substance.

  • Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.

  • Data Breach means the unauthorized access by an unauthorized person that results in the use, disclosure or theft of Customer Data.

  • Nonexempt property means property that is not a principal residence, qualified agricultural property, qualified forest property, supportive housing property, industrial personal property, commercial personal property, or property occupied by a public school academy.

  • Personal harassment means any improper behaviour by a person employed by the Employer that is directed at and offensive to another person employed by the Employer which the first person knew or ought reasonably to have known would be unwelcome. Personal harassment comprises objectionable conduct, comment, act or display that demeans, belittles or causes personal humiliation or embarrassment to the recipient.

  • Involuntary Termination means a termination of your employment with the Company pursuant to either (i) a termination initiated by the Company without Cause, or (ii) your resignation for Good Reason, and provided in either case such termination constitutes a Separation from Service. An Involuntary Termination does not include any other termination of your employment, including a termination due to your death or disability.

  • effective control means a relationship constituted by rights, contracts or any other means which, either separately or jointly and having regard to the considerations of fact or law involved, confer the possibility of directly or indirectly exercising a decisive influence on an undertaking, in particular by:

  • Sexual harassment means conduct on the basis of sex that satisfies one or more of the following: