Surreptitious Code definition

Surreptitious Code means any virus, Trojan horse, worm, or other routine or component designed to permit unauthorized access to any Deliverables under this Contract, or to disable, erase, or otherwise harm any component of the Deliverables under this Contract, or any back door, time bomb, drop dead device, or other routine designed to disable Custom or Proprietary Software automatically with the passage of time or under the positive control of a party other than DSHS, or to perform any other such malicious, mischievous or disruptive actions. Surreptitious Code excludes routines designed to allow remote maintenance, upgrades or technical support under the positive control of the DSHS.
Surreptitious Code means any virus, Trojan horse, worm, or other routine or component designed to permit unauthorized access to the Platform, or to disable, erase, or otherwise harm any component of the Platform, or any back door, time bomb, drop dead device, or other routine designed to disable Custom or Proprietary Software automatically with the passage of time or under the positive control of a party other than DSHS, or to perform any other such malicious, mischievous or disruptive actions. Surreptitious Code excludes routines designed to allow remote maintenance, upgrades or technical support under the positive control of the DSHS.
Surreptitious Code means any virus, Trojan horse, worm, or other routine or component designed to permit unauthorized access to a system, or to disable, erase, or otherwise harm any component of a system or any back door, time bomb, drop dead device, or other routine designed to disable a software automatically with the passage of time or under the control of a party other than UEFA, or to perform any such other malicious, mischievous or disruptive actions;

Examples of Surreptitious Code in a sentence

  • This warranty is referred to in this contract as the "No Surreptitious Code Warranty”.

  • The vendor shall defend the Commonwealth against any claim, and indemnify the Commonwealth against any loss or expense arising out of any breach of the No Surreptitious Code Warranty.

  • To the extent permitted by law, the Contractor must indemnify, defend and hold harmless the State from any claim, loss, or expense arising from Contractor’s breach of the No Surreptitious Code Warranty.

  • The Vendor shall defend City against any claim, and indemnify the City against any loss or expense arising out of any breach of the No Surreptitious Code Warranty.

  • The Contractor must indemnify, defend and hold harmless the State from any claim, loss, or expense arising from Contractor’s breach of the No Surreptitious Code Warranty.

  • This warranty is referred to in this Contract as the “No Surreptitious Code Warranty.” As used in this Contract, “Self-Help Code” means any back door, time bomb, drop dead device, or other software routine designed to disable a computer program automatically with the passage of time or under the positive control of a person other than the licensee of the software.

  • To the extent permitted by law, the Contractor shall indemnify, defend and hold harmless the State from any claim, loss, or expense arising from Contractor’s breach of the No Surreptitious Code Warranty.

  • Contractor uses industry-leading technology to detect and remove Surreptitious Code from all Work Product and Deliverables.

  • This warranty is referred to in this Agreement as the “No Surreptitious Code Warranty.” As used in this Agreement, “Self-help Code” means any back door, time bomb, drop dead device, or other Software routine designed to disable a computer program automatically with the passage of time or under the positive control of a person other than the licensee of the Software.

  • The Vendor shall defend the Commonwealth against any claim, and indemnify the Commonwealth against any loss or expense arising out of any breach of the No Surreptitious Code Warranty.

Related to Surreptitious Code

  • Erasmus Code A unique identifier that every higher education institution that has been awarded with the Erasmus Charter for Higher Education receives. It is only applicable to higher education institutions located in Programme Countries. 5 Country code: ISO 3166-2 country codes available at: xxxxx://xxx.xxx.xxx/obp/ui/#search. 6 Any Programme Country enterprise or, more generally, any public or private organisation active in the labour market or in the fields of education, training and youth (training of staff members from Programme Country HEIs in Partner Country non-academic partners is not eligible).

  • Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.

  • Access Code means the Railways (Access) Code 2000;

  • Access Codes means the unique codes which the Client will determine to enable his/her access to the trading platform of the Company and/or to his/her Trading Account through the Company’s electronic systems.

  • FILOT Act means Title 12, Chapter 44, of the Code, and all future acts successor or supplemental thereto or amendatory thereof.

  • Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.

  • JORC Code means the Australasian Code for Reporting of Exploration Results, Mineral Resources and Ore Reserves prepared by the Joint Ore Reserves Committee of the Australasian Institute of Mining and Metallurgy, Australian Institute of Geoscientists and Minerals Council of Australia, as amended;

  • Malware any thing or device (including any software, code, file or program) which may prevent, impair or otherwise adversely affect the access to or operation, reliability or user experience of any computer software, hardware or network, telecommunications service, equipment or network or any other service or device, including worms, trojan horses, viruses and other similar things or devices.

  • Your Content means all software, data (including Personal Data), text, images, audio, video, photographs, non-Oracle or third party applications, and other content and material, in any format, provided by You or any of Your Users that is stored in, or run on or through, the Services. Services under the Master Agreement, Oracle Software, other Oracle products and services, and Oracle intellectual property, and all derivative works thereof, do not fall within the meaning of the term “Your Content”. Your Content includes any Third Party Content that is brought by You into the Services, by Your use of the Services or any Oracle provided tools.

  • Viruses means any malicious computer code or instructions that have a material adverse effect on the operation, security or integrity of (a) a computing, telecommunications or other electronic operating or processing system or environment, (b) software programs, data, databases or other computer files or libraries or (c) computer hardware, networking devices or telecommunications equipment, including (i) viruses, Trojan horses, malware, time bombs, undisclosed back door devices, worms or any other software routine or hardware component designed to permit unauthorized access, disable, erase or otherwise harm software, hardware or data or perform any other such harmful or unauthorized actions and (ii) similar malicious code or data.

  • STCW Code means the Seafarers’ Training, Certification and Watchkeeping Code as adopted by resolution 2 of the 1995 Conference of Parties to the STCW Convention, in its up-to-date version;

  • Network Code means the document now known as the Network Code and formerly known as the Railtrack Track Access Conditions 1995;

  • General Regulations means the Charitable Incorporated Organisations (General) Regulations 2012.

  • the 1996 Act means the Education Act 1996;

  • Disabling Code means any virus, back door, timer or other limiting routine, instruction or design, or other malicious, illicit or similar unrequested code that may have the consequence (whether by design or unintentionally) of disrupting, disabling, harming, circumventing security controls or otherwise impeding in any manner the normal operation or performance of (i) any software or service or (ii) any UNICEF information system or network.

  • Electricity Act means the Electricity Act, 1998, S.O. 1998, c. 15, Schedule A;

  • Takeovers Code means the Hong Kong Code on Takeovers and Mergers;

  • Terrorist Act means any actual or threatened use of force or violence directed at or causing damage, injury, harm or disruption, or commission of an act dangerous to human life or property, against any individual, property or government, with the stated or unstated objective of pursuing economic, ethnic, nationalistic, political, racial or religious interests, whether such interests are declared or not. Criminal acts, primarily committed for personal gain and acts arising primarily from prior personal relationships between perpetrator(s) and victim(s) shall not be considered terrorist acts. Terrorist act also includes any act, which is verified or recognised by the (relevant) Government as an act of terrorism.

  • Disabling Devices means Software viruses, time bombs, logic bombs, trojan horses, trap doors, back doors, or other computer instructions, intentional devices or techniques that are designed to threaten, infect, assault, vandalize, defraud, disrupt, damage, disable, maliciously encumber, hack into, incapacitate, infiltrate or slow or shut down a computer system or any component of such computer system, including any such device affecting system security or compromising or disclosing user data in an unauthorized manner.

  • Building Code Act means the Building Code Act, 1992, S.O. 1992, c.23, as amended;

  • the 1961 Act means the Land Compensation Act 1961(d); “the 1965 Act” means the Compulsory Purchase Act 1965(e); “the 1980 Act” means the Highways Act 1980(f);

  • Criminal drug statute means a Federal or non-Federal criminal statute involving the manufacture, distribution, dispensing, possession or use of any controlled substance.

  • DOL Regulations The regulations promulgated by the DOL at 29 C.F.R.ss.2510.3-101.

  • the 1981 Act which means the Compulsory Purchase (Vesting Declarations) Act 1981.

  • Explosives or munitions emergency response means all immediate response activities by an explosives and munitions emergency response specialist to control, mitigate, or eliminate the actual or potential threat encountered during an explosives or munitions emergency. An explosives or munitions emergency response may include in-place render-safe procedures, treatment or destruction of the explosives or munitions and/or transporting those items to another location to be rendered safe, treated, or destroyed. Any reasonable delay in the completion of an explosives or munitions emergency response caused by a necessary, unforeseen, or uncontrollable circumstance will not terminate the explosives or munitions emergency. Explosives and munitions emergency responses can occur on either public or private lands and are not limited to responses at RCRA facilities.

  • QR Code means a matrix barcode that links to information about a battery model;