Destructive Elements means, collectively, all computer code, and any other associated software, firmware, hardware, computer system or network, that disrupt, disable, alter, damage, interfere with, harm, or otherwise impede in any manner, the Services, the Developments, the Oracle Materials or the Networks. Destructive Elements include, without limitation, viruses and codes that are commonly referred to as "time bombs", "time locks", “drop dead” or “trap door” devices, “disabling devices”, “worms” or “Trojan horse routines”.
Destructive Elements means computer code, programs, or programming devices that are intentionally designed to disrupt, modify, access, delete, damage, deactivate, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation of the Platform or any other associated software, firmware, hardware, computer system, or network (including, without limitation, “Trojan horses,” “viruses,” “worms,” “time bombs,” “time locks,” “devices,” “traps,” “access codes,” or “drop dead” or “trap door” devices) or any other harmful, malicious, or hidden procedures, routines or mechanisms that would cause the Platform to cease functioning or to damage or corrupt data, storage media, programs, equipment, or communications, or otherwise interfere with operations.
Destructive Elements means any computer code which:
Examples of Destructive Elements in a sentence
Provider will not, and will ensure that the Resources do not, code or introduce Destructive Elements (as defined below) into the Services, the Developments, the Oracle Materials or the Oracle or Client production or non-production (i.e., test and development) information systems environments, including without limitation, the hardware and software components of Oracle's and/or Client’s corporate network (such information systems environments and networks being collectively referred to as the “Networks”).
More Definitions of Destructive Elements
Destructive Elements means any software, data or tool (e.g., “viruses”, “worms” or “trojan” programs) that (i) are intentionally designed to disrupt, disable, harm or otherwise impede in any manner, including aesthetical disruptions or distortions, the operation of the Service or related systems of IATA, including, for example, based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (e.g., “time bombs”, “time locks” or “drop dead” devices), (ii) would permit Participant or third parties to access the Service or related systems, to cause such disablement or impairment, or otherwise to circumvent the security features of the Service or related systems, or (iii) contain any other harmful, malicious or hidden procedures, routines or mechanisms which would cause the Service or related systems to cease functioning, or to damage or corrupt software, data or communications, or otherwise interfere with operations.
Destructive Elements means computer code, programs, or programming devices that are intentionally designed to disrupt, modify, access, delete, damage, deactivate, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation of the Shift5 Product(s), or any other associated software, firmware, hardware, computer system, or network (including, without limitation, "Trojan horses," "viruses," "worms," "time bombs," "time locks," "devices," "traps," "access codes," or "drop dead" or "trap door" devices) or any other harmful, malicious, or hidden procedures, routines or mechanisms that would cause the Shift5 Product(s), to cease functioning or adversely impact or damage or corrupt data, storage media, programs, hardware, or communications, or otherwise interfere with operations.
Destructive Elements means computer Code, programs, or programming devices that are intentionally designed to disrupt, modify, access, delete, damage, deactivate, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation of the System or any other associated software, firmware, hardware, computer system, or network (including “Trojan horses,” “viruses,” “worms,” “time bombs,” “time locks,” “devices,” “traps,” “access codes,” “malware” or “drop dead” or “trap door” devices) or any other harmful, malicious, or hidden procedures, routines or mechanisms which can cause the System or the Authority’s computer systems to cease functioning or to damage or corrupt data, storage media, programs, equipment, or communications, or otherwise interfere with operations.
Destructive Elements means any "back door", "time bomb", "time lock", "trojan horse", "worm", "drop dead device", "virus" or other computer software routine, code or device intended or designed to: (a) permit access to or the use of any software, firmware, hardware and peripherals, wide area network, or local area network by an unauthorised person; or (b) disable, damage, erase, disrupt or impair in any way the operation of any software, firmware, hardware and peripherals, wide area network, or local area network, including by the elapsing of a period of time, exceeding an authorised number of copies, advancement to a particular date or other numeral; or (c) damage, erase or corrupt data, storage media, programmes, equipment or communications or otherwise interfere with operations of any software, firmware, hardware and peripherals, wide area network, or local area network; and/or (e) any other form of destructive coding and/or device, including those which result in aesthetical disruptions or distortions;
Destructive Elements means any Software, Equipment, Tools or data (a) intentionally designed to disrupt, disable, harm or otherwise impede in any manner, including aesthetical disruptions or distortions, the operation of the Systems, or any Software, Equipment, Tools or data (e.g., ”viruses” or “worms”), (b) that would disable the Systems, or any Software, Equipment, Tools or data, or impair in any way their operation including, for example, based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (e.g., ”time bombs”, “time locks” or “drop dead” devices), (c) that would permit BETA to access the Systems, or any Software, Equipment, Tools or data, to cause such disablement or impairment, or otherwise to circumvent the security features of the AGE/BETA Confidential Systems, Software, Equipment, Tools or data (e.g., “traps”, “access codes” or “trap door” devices) or (d) which contains any other harmful, malicious or hidden procedures, routines or mechanisms which would cause the Systems, or any Software, Equipment, Tools or data, to cease functioning or to damage or corrupt storage media, Software, Equipment, Tools, data or communications, or otherwise interfere with operations.
Destructive Elements means any software, data or tool (e.g., “viruses”, “worms” or “trojan” programs) that (i) are intentionally designed to disrupt, disable, harm or otherwise impede in any manner, including aesthetical disruptions or distortions, the operation of the Site, the Solution or other systems of IATA, including, for example, based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (e.g., “time bombs”, “time locks” or “drop dead” devices), (ii) would permit RECIPIENT or third parties to access the Site, the Solution or related systems, to cause such disablement or impairment, or otherwise to circumvent the security features of the Site, the Solution or related systems, or
Destructive Elements means any software, data or tools (e.g., “viruses,” “worms” or “trojan” programs) that (i) are intentionally designed to disrupt, disable, harm or otherwise impede in any manner, including aesthetical disruptions or distortions, the operation of Our systems, including, for example, based on the elapsing of a period of time, exceeding an authorised number of copies, advancement to a particular date or other numeral (e.g., “time bombs”, “time locks” or “drop dead” devices); (ii) would permit You or third parties to access Our systems or Airline Data, to cause such disablement or impairment, or otherwise to circumvent the security features of Our systems; or (iii) contain any other harmful, malicious or hidden procedures, routines or mechanisms which would cause Our systems to cease functioning completely or in part, or to damage or corrupt software, data or communications, or otherwise interfere with operations.