Examples of Trojan in a sentence
The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company and its subsidiaries as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants.
The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants.
You must not make undue use of this website by intentionally introducing a virus, Trojan horse, worm, logic bombs or any other software or technologically damaging or harmful material.
You are responsible for taking precautions as necessary to protect yourself and your computer systems from viruses, worms, Trojan horses, and other harmful or destructive content.
The Transfer Agent also agrees to implement commercially reasonable software and other appropriate measures to scan for, detect and prevent the transmission from Transfer Agent’s computers, hardware, networks and systems of any virus, malware, Trojan horse, worm, time bomb, drop dead device, or other malicious code.
Uploading, downloading, creating, or transmitting a computer virus, worm, Trojan horse, or other harmful component or corrupted data.
BNY Mellon makes no guarantee and does not warrant that Electronic Access or the information and data provided through the Electronic Access are or will be virus-free or will be free of viruses, worms, Trojan horses or other code with contaminating or destructive properties.
The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, and is not known by the Company to contain any material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants.
The Company and its subsidiaries’ information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants.
Licensor warrants that the licensed product as delivered by Licensor does not contain any viruses, worms, Trojan Horses, or other malicious or destructive code to allow unauthorized intrusion upon, disabling of, or erasure of the licensed products (each a “Virus”).