Destructive Mechanisms definition

Destructive Mechanisms means computer code that: (i) is designed to disrupt, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation of the Software or any other software, firmware, hardware, computer system or network (sometimes referred to as “viruses” or “worms”); (ii) would disable or impair the Software or any other software, firmware, hardware, computer systems or networks in any way where such disablement or impairment is caused by the passage of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (sometimes referred to as “time bombs,” “time locks” or “drop dead” devices); (iii) would permit Company to access the Software or any other software, firmware, hardware, computer systems or networks to cause such disablement or impairment (sometimes referred to as “traps,” “access codes” or “trap door” devices); or (iv) which contains any other similar harmful, malicious or hidden procedures, routines or mechanisms which would cause such programs to cease functioning or to damage or corrupt data, storage media, programs, equipment or communications or otherwise interfere with operations. If any Software contains Destructive Mechanism, Company shall, via a document specific to this provision, notify Saint Luke’s in writing. Such notification shall specifically inform Saint Luke’s of the full extent and nature of the Destructive Mechanism and provide Saint Luke’s with instructions for overriding such Destructive Mechanism in emergencies. Notwithstanding anything elsewhere in the Agreement to the contrary and to the extent any Software contains a Destructive Mechanism, Company shall be in default of the Agreement and no cure period shall apply. In addition to any other remedies available to it under the Agreement, Saint Luke’s reserves the right to pursue any civil and/or criminal penalties available to it against Company. Company represents and warrants that the occurrence of or use by the Software on dates or times that change (e.g. DST) will not adversely affect the performance of the Software with respect to date-dependent data, computations, output or other functions (including, without limitation, calculating, computing or sequencing), and the Software will create, store and generate output data related to or including such dates without errors or omissions.
Destructive Mechanisms means computer code that: (i) is designed to disrupt, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation of the Software or any other software, firmware, hardware, computer system or network (sometimes referred to as “viruses” or “worms”); (ii) would disable or impair the Software or any other software, firmware, hardware, computer systems or networks in any way where such disablement or impairment is caused by the passage of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (sometimes referred to as “time bombs,” “time locks” or “drop dead” devices); [ cont’d] Anti-Virus Warranty(iii) would permit Vendor to access the Software or any other software, firmware, hardware, computer systems or networks to cause such disablement or impairment(sometimes referred to as “traps,” “access codes” or “trap door” devices); or (iv) which contains any other similar harmful, malicious or hidden procedures, routines or mechanisms which would cause such programs to cease functioning or to damage or corrupt data, storage media, programs, equipment or communications or otherwise interfere with operations. ◼ Lifecycle of a software flaw:▪ Faulty programming, oversight, or changed circumstances (or intentionalespionage) creates a security vulnerability▪ Flaw discovered by testers, researchers, or threat actors (zero-day)▪ Preferred order of remediation steps:▪ Vendor becomes aware of the issue▪ Patch developed and made available▪ Flaw (and patch) cataloged and disclosed▪ Has the patch been applied? (n-day)◼ Enhanced reporting and cataloging of security flaws▪ Assigned CVE number by US CERT of DHS (and others)▪ Vulnerabilities Equities Process◼ High profile examples include: Equifax breach, "WannaCry" event Anti-virus is no longer the whole malware story: Unsupported and unpatched systems ◼ While there may be mere failures to update, often there are good reasons◼ Some software that contains a vulnerable component is no longer updated by vendor◼ Unsupported components are often required for compatibility with othersystems◼ In some installations, there aren’t mechanisms to update, even if anupdate is available If the fix was known, why the outbreaks?◼ In some cases, software is on equipment not controlled and managed by IT professionals◼ In some cases there is a lack of resources30 ◼ Typical software virus/malware warranties cover:▪ No malware present▪ No malware will be in...
Destructive Mechanisms means computer code that: (i) is designed to disrupt, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation of the Software or any other software, firmware, hardware, computer system or network (sometimes referred to as “viruses” or “worms”); (ii) would disable or impair the Software or any other software, firmware, hardware, computer systems or networks in any way where such disablement or impairment is caused by the passage of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (sometimes referred to as “time bombs,” “time locks” or “drop dead” devices); [cont’d] Warranties [cont.]Anti-Virus Warranty (iii) would permit Vendor to access the Software or any other software, firmware, hardware, computer systems or networks to cause such disablement or impairment (sometimes referred to as “traps,” “access codes” or “trap door” devices); or (iv) which contains any other similar harmful, malicious or hidden procedures, routines or mechanisms which would cause such programs to cease functioning or to damage or corrupt data, storage media, programs, equipment or communications or otherwise interfere with operations. Warranties [cont.] Phone Home Functionality Example: The Software will not contain any “phone-home,” metering, or other feature designed to periodically transmit usage, statistical or other data to Licensor. Licensee may prevent access to the internet with regard to any such features or functionality and doing so will not adversely impact operation of the Software. Warranties [cont.] Offshoring of Data Example: All Services shall be performed and rendered within the continental United States; and Vendor shall not transmit or make available any Customer Confidential Information, including Personal Data, to any entity or individual outside the continental United States. Warranties [cont.] Open Source and Third Party Software Example: Vendor represents and warrants that it shall not deliver to Customer any third party software, including open source software, that would require Customer to accept and be bound by any third party terms and conditions, except to the extent such terms and conditions are expressly identified in and attached to Exhibit A. Except as provided in Exhibit A, Customer hereby rejects all such third party terms and conditions. Warranties [cont.] Pass-Through Warranties Example: Vendor shall assign and pass-through to Customer all r...

Examples of Destructive Mechanisms in a sentence

  • Company represents and warrants that the Software shall not contain, and that Saint Luke’s shall not receive via access to or use of the Software, any Destructive Mechanisms, as defined below and Company shall not invoke such mechanisms at any time, including upon expiration or termination of the Agreement for any reason.

  • The Company has taken reasonable steps and implemented reasonable procedures designed to detect and prevent Destructive Mechanisms from the Computer Systems.

  • To the extent the Product(s) include Software, Company represents and warrants that the Software shall not contain, and that Saint Luke’s shall not receive via access to or use of the Software, any Destructive Mechanisms, as defined below and Company shall not invoke such mechanisms at any time, including upon expiration or termination of the Agreement for any reason.

  • The System, System Software, Hardware, Services, including Implementation Services, Hosting Services, Maintenance and Support Services, and/or Deliverables does not contain, and the Contractor shall not insert into the System, System Software, Hardware or any Deliverables or Services, including Implementation Services, Hosting Services, and Maintenance and Support Services, any Destructive Mechanisms.

  • Destructive Mechanisms which leads to escalation of the conflict (Uta Höhl- Spenceley, 2007) Based on Glassl´s theoretical ideas about conflicts, TA theory (especially game theory, analyses of transactions, frame of reference) and experiences in my practice you can define that one of the problems of conflict resolution is that how longer conflicts go on more and more the conflict parties develop dysfunctional/harmful patterns, which drive the conflict.

  • AT THE END OF THE DAY, UTILIZE THE COOL-DOWN MODE AND OPEN THE OVEN DOORS.


More Definitions of Destructive Mechanisms

Destructive Mechanisms means computer code that: (i) is designed to disrupt, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation of the Software or any other software, firmware, hardware, computer system or network (sometimes referred to as “viruses” or “worms”); (ii) would disable or impair the Software or any other software, firmware, hardware, computer systems or networks in any way where such disablement or impairment is caused by the passage of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (sometimes referred to as “time bombs,” “time locks” or “drop dead” devices); (iii) would permit Company to access the Software or any other software, firmware, hardware, computer systems or networks to cause such disablement or impairment (sometimes referred to as “traps,” “access codes” or “trap door” devices); or (iv) which contains any other similar harmful, malicious or hidden procedures, routines or mechanisms which would cause such programs to cease functioning or to damage or corrupt data, storage media, programs, equipment or communications or otherwise interfere with operations. Company represents and warrants that the occurrence of or use by the Software on dates or times that change (e.g. DST) will not adversely affect the performance of the Software with respect to date- dependent data, computations, output or other functions (including, without limitation, calculating, computing or sequencing), and the Software will create, store and generate output data related to or including such dates without errors or omissions.
Destructive Mechanisms means computer code that: (i) is designed to disrupt, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation of the Software or any other software, firmware, hardware, computer system or network (sometimes referred to as “viruses” or “worms”); (ii) would disable or impair the Software or any other software, firmware, hardware, computer systems or networks in any way where such disablement or impairment is caused by the passage of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (sometimes referred to as “time bombs,” “time locks” or “drop dead” devices); [ cont’d]
Destructive Mechanisms means computer code that: (a) is designed to or would disrupt, disable, harm, or otherwise impede in any manner, including aesthetic disruptions or distortions, the operation of any Computer Systems or Software (sometimes referred to as “viruses” or “worms”); (b) is designed to or would disable or impair any Computer Systems or Software in any way where such disablement or impairment is caused by the passage of time, exceeding an authorized number of copies, advancement to a particular date or other numeral (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices); (c) is designed to or would permit any Person to access any Computer Systems or Software in any unauthorized manner, including to cause such disablement or impairment (sometimes referred to as “traps,” “access codes,” or “trap door” devices); (d) contains any other similar harmful, malicious, or hidden procedures, routines, or mechanisms which are designed to or would cause any Computer Systems or Software to cease functioning or to damage or corrupt data, storage media, programs, equipment, or communications or otherwise interfere with operations; or (e) contains any “back door,” “malware,” “spyware,” or similar device or code.

Related to Destructive Mechanisms

  • Destructive device means (i) any explosive, incendiary, or poison gas, bomb, grenade, rocket having a propellant charge of more than four ounces, missile having an explosive or incendiary charge of more than one-quarter ounce, mine, or other similar device; (ii) any weapon, except a shotgun or a shotgun shell generally recognized as particularly suitable for sporting purposes, by whatever name known that will, or may be readily converted to, expel a projectile by the action of an explosive or other propellant, and that has any barrel with a bore of more than one-half inch in diameter that is homemade or was not made by a duly licensed weapon manufacturer, any fully automatic firearm, any sawed-off shotgun or sawed-off rifle as defined in § 18.2-299 or any firearm prohibited from civilian ownership by federal law; and (iii) any combination of parts either designed or intended for use in converting any device into any destructive device described in this subsection and from which a destructive device may be readily assembled. "Destructive device" does not include any device that is not designed or redesigned for use as a weapon, or any device originally designed for use as a weapon and that is redesigned for use as a signaling, pyrotechnic, line-throwing, safety, or other similar device, nor shall it include any antique firearm as defined in subsection G of § 18.2-308.2:2.

  • Destruction means physical destruction or removal of personal identifiers from information so that the information is no longer personally identifiable.

  • Disposable respirator means a respirator for which maintenance is not intended and that is designed to be discarded after excessive breathing resistance, sorbent exhaustion, physical damage, or end-of-service-life renders it unsuitable for use. Examples of this type of respirator are a disposable half-mask respirator or a disposable escape-only self-contained breathing apparatus (SCBA).

  • Acute toxicity means concurrent and delayed adverse effects that result from an acute exposure and occur within any short observation period, which begins when the exposure begins, may extend beyond the exposure period, and usually does not constitute a substantial portion of the life span of the organism.

  • Catastrophic Damage as used hereunder is major change or damage to In- cluded Timber on Sale Area, to Sale Area, to access to Sale Area, or a combination thereof:

  • Reconstructive breast surgery means surgery performed as a result of a mastectomy to reestablish symmetry between the two breasts and includes augmentation mammoplasty, reductive mammoplasty, and mastopexy.

  • Catastrophic illness or “injury” means an illness or injury that is expected to incapacitate the employee for an extended period of time, or that incapacitates a member of the employee’s family which incapacity requires the employee to take time off from work for an extended period of time to care for that family member, and taking extended time off work creates a financial hardship for the employee because he or she has exhausted all of his or her sick leave and other paid time off.

  • Chronic toxicity means concurrent and delayed adverse effects that occur only as a result of a chronic exposure.

  • Virus means any thing or device (including any software, code, file or programme) which may: prevent, impair or otherwise adversely affect the operation of any computer software, hardware or network, any telecommunications service, equipment or network or any other service or device; prevent, impair or otherwise adversely affect access to or the operation of any programme or data, including the reliability of any programme or data (whether by re-arranging, altering or erasing the programme or data in whole or part or otherwise); or adversely affect the user experience, including worms, trojan horses, viruses and other similar things or devices.

  • Constructive Sale means, with respect to any security, a short sale with respect to such security, entering into or acquiring a derivative contract with respect to such security, entering into or acquiring a futures or forward contract to deliver such security or entering into any other hedging or other derivative transaction that has the effect of either directly or indirectly materially changing the economic benefits or risks of ownership of such security.

  • Infection means the entry and development or multiplication of an infectious agent in the body of humans and animals that may constitute a public health risk;

  • Infiltration means water other than wastewater that enters a sewer system (including sewer system and foundation drains) from the ground through such means as defective pipes, pipe joints, connections, or manholes. Infiltration does not include, and is distinguished from, inflow.

  • Catastrophic Event : means an unforeseen event of biotic or abiotic nature caused by human action that leads to important disturbances of agricultural production systems and forest structures, eventually causing important economic damage to the farming or forestry sectors;

  • Insect means any of the numerous small invertebrate animals generally having the body more or less obviously segmented, for the most part belonging to the class Insecta, comprising six-legged, usually winged forms, as for example, beetles, bugs, bees, flies and to other allied classes of arthropods whose members are wingless and usually have more than six legs, as for example, spiders, mites, ticks, centipedes and wood lice.

  • Inherited Metabolic Disorder means a disease caused by an inherited abnormality of body chemistry that meets all of the following requirements:

  • Counterfeit substance means a controlled substance which, or the container or labeling of which, without authorization, bears the trademark, trade name, or other identifying mark, imprint, number or device, or any likeness thereof, of a manufacturer, distributor, or dispenser other than the person who in fact manufactured, distributed, or dispensed the substance.

  • Mental, Nervous or Psychological Disorder means a mental or nervous health condition including, but not limited to: anxiety, depression, neurosis, phobia, psychosis; or any related physical manifestation.

  • Cognitive Impairment means a deficiency in a person’s short-term or long-term memory; orientation as to person, place, and time; deductive or abstract reasoning; or judgment as it relates to safety awareness.

  • Physical impairment means any physiological disorder or condition, cosmetic disfigurement, or anatomical loss affecting one or more of the following body systems: neurological; musculoskeletal; special sense organs; respiratory, including speech organs; cardiovascular; reproductive, digestive, genito-urinary; hemic and lymphatic; skin; and endocrine.

  • Exposed conductive part means the conductive part which can be touched under the provisions of the protection degree IPXXB and which is not normally energized, but which can become electrically energized under isolation failure conditions. This includes parts under a cover that can be removed without using tools.

  • Psychological abuse which shall mean conduct by a custodian intentionally or recklessly causing, by verbal or non-verbal conduct, a substantial diminution of a service recipient's emotional, social or behavioral development or condition, supported by a clinical assessment performed by a physician, psychologist, psychiatric nurse practitioner, licensed clinical or master social worker or licensed mental health counselor, or causing the likelihood of such diminution. Such conduct may include but shall not be limited to intimidation, threats, the display of a weapon or other object that could reasonably be perceived by a service recipient as a means for infliction of pain or injury, in a manner that constitutes a threat of physical pain or injury, taunts, derogatory comments or ridicule.

  • Stroke means a cerebrovascular accident or infarction (death) of brain tissue, as diagnosed by a Physician, which is caused by hemorrhage, embolism, or thrombosis producing measurable, neurological deficit persisting for at least one hundred eighty (180) days following the occurrence of the Stroke. Stroke does not include Transient Ischemic Attack (TIA) or other cerebral vascular events.

  • Low-level radioactive waste or “waste” means radioactive material that consists of or contains class A, B, or C radioactive waste as defined by 10 C.F.R. 61.55, as in effect on January 26, 1983, but does not include waste or material that is any of the following:

  • Irritant means any substance, other than a corrosive, that on

  • Forfeiture Event means the occurrence of at least one of the following (a) the Corporation is required, pursuant to a determination made by the Securities and Exchange Commission or by the Audit Committee of the Board, to prepare a material accounting restatement due to the noncompliance of the Corporation with any financial reporting requirement under applicable securities laws as a result of misconduct, and the Committee determines that (1) the Participant knowingly engaged in the misconduct, (2) the Participant was grossly negligent with respect to such misconduct or (3) the Participant knowingly or grossly negligently failed to prevent the misconduct or (b) the Committee concludes that the Participant engaged in fraud, embezzlement or other similar misconduct materially detrimental to the Corporation.

  • Infectious waste means a solid waste that contains or may reasonably be