Surreptitious Code definition

Surreptitious Code means any virus, Trojan horse, worm, or other routine or component designed to permit unauthorized access to any Deliverables under this Contract, or to disable, erase, or otherwise harm any component of the Deliverables under this Contract, or any back door, time bomb, drop dead device, or other routine designed to disable Custom or Proprietary Software automatically with the passage of time or under the positive control of a party other than DSHS, or to perform any other such malicious, mischievous or disruptive actions. Surreptitious Code excludes routines designed to allow remote maintenance, upgrades or technical support under the positive control of the DSHS.
Surreptitious Code means any virus, Trojan horse, worm, or other routine or component designed to permit unauthorized access to the Platform, or to disable, erase, or otherwise harm any component of the Platform, or any back door, time bomb, drop dead device, or other routine designed to disable Custom or Proprietary Software automatically with the passage of time or under the positive control of a party other than DSHS, or to perform any other such malicious, mischievous or disruptive actions. Surreptitious Code excludes routines designed to allow remote maintenance, upgrades or technical support under the positive control of the DSHS.
Surreptitious Code means any virus, Trojan horse, worm, or other routine or component designed to permit unauthorized access to a system, or to disable, erase, or otherwise harm any component of a system or any back door, time bomb, drop dead device, or other routine designed to disable a software automatically with the passage of time or under the control of a party other than UEFA, or to perform any such other malicious, mischievous or disruptive actions;

Examples of Surreptitious Code in a sentence

  • To the extent permitted by law, the Contractor shall indemnify, defend and hold harmless the State from any claim, loss, or expense arising from Contractor’s breach of the No Surreptitious Code Warranty.

  • Code Indemnification To the extent permitted by law, the Contractor shall indemnify, defend and hold harmless the State from any claim, loss, or expense arising from Contractor’s breach of the No Surreptitious Code Warranty.

  • This warranty is referred to in this Contract as the “No Surreptitious Code Warranty.” As used in this Contract, “Self-Help Code” means any back door, time bomb, drop dead device, or other software routine designed to disable a computer program automatically with the passage of time or under the positive control of a person other than the licensee of the software.

  • The vendor shall defend the Commonwealth against any claim, and indemnify the Commonwealth against any loss or expense arising out of any breach of the No Surreptitious Code Warranty.

  • This warranty is referred to in this contract as the "No Surreptitious Code Warranty”.

  • To the extent permitted by law, the Contractor must indemnify, defend and hold harmless the State from any claim, loss, or expense arising from Contractor’s breach of the No Surreptitious Code Warranty.

  • This paragraph may only apply when software is involved.No Surreptitious Code Warranty.

  • This warranty is referred to in this Contract as the “No Surreptitious Code Warranty.”As used in this Contract, “Self-Help Code” means any back door, time bomb, drop dead device, or other software routine designed to disable a computer program automatically with the passage of time or under the positive control of a person other than the licensee of the software.

  • Contractor uses industry-leading technology to detect and remove Surreptitious Code from all Work Product and Deliverables.

  • This warranty is referred to in this Contract as the "No Surreptitious Code Warranty”.

Related to Surreptitious Code

  • Erasmus Code A unique identifier that every higher education institution that has been awarded with the Erasmus Charter for Higher Education receives. It is only applicable to higher education institutions located in Programme Countries. 5 Country code: ISO 3166-2 country codes available at: xxxxx://xxx.xxx.xxx/obp/ui/#search. 6 Any Programme Country enterprise or, more generally, any public or private organisation active in the labour market or in the fields of education, training and youth (training of staff members from Programme Country HEIs in Partner Country non-academic partners is not eligible).

  • Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.

  • Access Code means the Railways (Access) Code 2000;

  • Access Codes means the username and password given by the Company to the Client for accessing the Company’s website.

  • FILOT Act means Title 12, Chapter 44, of the Code, and all future acts successor or supplemental thereto or amendatory thereof.

  • Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.

  • JORC Code means the Australasian Code for Reporting of Exploration Results, Mineral Resources and Ore Reserves prepared by the Joint Ore Reserves Committee of the Australasian Institute of Mining and Metallurgy, Australian Institute of Geoscientists and Minerals Council of Australia, as amended;

  • Malware any thing or device (including any software, code, file or program) which may prevent, impair or otherwise adversely affect the access to or operation, reliability or user experience of any computer software, hardware or network, telecommunications service, equipment or network or any other service or device, including worms, trojan horses, viruses and other similar things or devices.

  • Your Content means all software, data (including Personal Data), text, images, audio, video, photographs, non-Oracle or third party applications, and other content and material, in any format, provided by You or any of Your Users that is stored in, or run on or through, the Services. Services under the Master Agreement, Oracle Software, other Oracle products and services, and Oracle intellectual property, and all derivative works thereof, do not fall within the meaning of the term “Your Content”. Your Content includes any Third Party Content that is brought by You into the Services, by Your use of the Services or any Oracle provided tools.

  • Viruses is broadly defined as known malware, which includes viruses, worms, and Trojan horses.

  • STCW Code means the Seafarers’ Training, Certification and Watchkeeping Code as adopted by resolution 2 of the 1995 Conference of Parties to the STCW Convention, in its up-to-date version;

  • Network Code means the network code prepared by National Grid pursuant to its gas transporters licence, as such code may be amended from time to time in accordance with the terms thereof and which incorporates the Uniform Network Code;

  • General Regulations means the Charitable Incorporated Organisations (General) Regulations 2012.

  • the 1996 Act means the Education Act 1996;

  • Disabling Code means any virus, back door, timer or other limiting routine, instruction or design, or other malicious, illicit or similar unrequested code that may have the consequence (whether by design or unintentionally) of disrupting, disabling, harming, circumventing security controls or otherwise impeding in any manner the normal operation or performance of (i) any software or service or (ii) any UNICEF information system or network.

  • Electricity Act means the Electricity Act, 1998, S.O. 1998, c. 15, Schedule A;

  • Takeovers Code means the Hong Kong Code on Takeovers and Mergers;

  • Terrorist Act means an act including but not limited to the use or threatened use of force or violence against person or property, or commission of an act dangerous to human life or property, or commission of an act that interferes with or disrupts an electronic or communication system, undertaken by any person or group, whether or not acting on behalf of or in connection with any organization, government, power, authority or military force, when the effect is to intimidate or coerce a government, the civilian population or any segment thereof, or to disrupt any segment of the economy.

  • Disabling Devices means undisclosed Software viruses, time bombs, logic bombs, trojan horses, trap doors, back doors, or other computer instructions, intentional devices or techniques that are designed to threaten, infect, assault, vandalize, defraud, disrupt, damage, disable, maliciously encumber, hack into, incapacitate, infiltrate or slow or shut down a computer system or any component of such computer system, including any such device affecting system security or compromising or disclosing user data in an unauthorized manner.

  • Building Code Act means the Building Code Act, 1992, S.O. 1992, c.23, as amended;

  • the 1961 Act means the Land Compensation Act 1961(d); “the 1965 Act” means the Compulsory Purchase Act 1965(e); “the 1980 Act” means the Highways Act 1980(f);

  • Criminal drug statute means a Federal or non-Federal criminal statute involving the manufacture, distribution, dispensing, possession or use of any controlled substance.

  • DOL Regulations The regulations promulgated by the DOL at 29 C.F.R.ss.2510.3-101.

  • the 1981 Act which means the Compulsory Purchase (Vesting Declarations) Act 1981.

  • QR Code means a matrix barcode that links to information about a battery model;

  • Uniform Network Code means the uniform network code as defined in Standard Special Condition A11(6) of National Grid’s transporters licence, as such code may be amended from time to time in accordance with the terms thereof.