Trojan Horse definition
Examples of Trojan Horse in a sentence
Provider represents and warrants that any software licensed hereunder shall not contain any virus, worm, Trojan Horse, tracking software or be capable of identifying non-approved users or tracking any approved user, or any undocumented software locks or drop dead devices that would render inaccessible or impair in any way the operation of the software or any other hardware, software or data for which the software is designed to work with.
Provider represents and warrants that any software licensed hereunder shall not contain any virus, worm, Trojan Horse, tracking software or be capable of identifying non- approved users or tracking any approved user, or any undocumented software locks or drop dead devices that would render inaccessible or impair in any way the operation of the software or any other hardware, software or data for which the software is designed to work with.
The Contractor warrants that the work product and any other materials licensed hereunder do not knowingly contain any virus, worm, Trojan Horse, tracking software, or devices capable of identifying users or tracking use, or any undocumented software locks or drop-dead devices which would render inaccessible or impair in any way the operation of the work product or any other hardware, software, or data which the work product is designed to work with.
For purposes herein, “Illicit Code” will mean any key, node, lock, time-out, back door, trap door, booby trap, drop dead device, data scrambling device, Trojan Horse or other similar type means for enabling self-help, restraint, disabling program codes or other functions, whether implemented by electronic, mechanical or other means, which restricts or may restrict use or access to any portion of any Software or data or information created by or accessed using such Software.
Licensee and its subcontractors will ensure that each copy of the media containing the Software is manufactured under a quality assurance program designed to ensure that there is no virus or other embedded device or code in the Software (e.g., back door, time bomb, Trojan Horse or worm) that is intended to obstruct or prevent use of the Software.