Harmful Code. Using a recent version of a reputable virus-checking product (to the extent commercially available), Company will check its software and other systems used by Company to deliver the products or services to the School District for any harmful code, including, without limitation, any viruses, worms, or similar harmful code, and will use commercially reasonable efforts to eliminate any such harmful code that the Company discovers.
Harmful Code. No Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise materially impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.
Harmful Code. No Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; (b) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Seller Software.
Harmful Code. The Products shall be free from harmful code (such as spyware, malware, viruses, time bombs, and Trojan horses) and material programming errors that prevent the Products from operating in substantial conformity with the documentation therefor.
Harmful Code. The Seller Products do not contain any “viruses,” “worms,” “time-bombs,” “key-locks,” or any other devices that could disrupt or interfere with the operation of the Seller Products or equipment upon which the Seller Products operate.
Harmful Code. To the best of the knowledge of the Company, no Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.
Harmful Code. If either Party becomes aware that an unauthorized party has accessed Issuer Data, or Confidential Information, or that Harmful Code has infected a relevant network or system of such Party, then it shall notify the other Party as soon as reasonably practical, so the Parties can work together to mitigate any potential adverse effect and undertake any further steps that may be applicable or required by law. “Harmful Code” means computer instructions whose primary purpose or effect is to disrupt, damage or interfere with use of any computer or telecommunications facilities, including, without limitation, any automatic restraint, time-bomb, trap-door, virus, worm, Trojan horse, or other harmful code or instrumentality that will cause a system to cease to operate or to fail to conform to its specifications. Each Party shall take commercially reasonable precautions to avoid, prevent, stop, find and eliminate the spread of all Harmful Code on its hardware systems and networks.
Harmful Code. 23.3.1 The Service Provider must undertake reasonable efforts to detect and prevent any:
Harmful Code. GT represents and warrants to Company that, as of the Delivery Date, to the best of its knowledge, software utilized by GT in providing the service does not contain computer instructions, circuitry or other technological means whose purpose is to disrupt, damage or interfere with any use of either party's computer and communications facilities or equipment ("Harmful Code") and it has used commercially reasonable efforts to prevent the introduction of such "Harmful Code" to the services prior to delivery to or use by Company. For the purposes of this warranty, Harmful Code shall include, without limitation, any code containing viruses, Trojan horses, worms, or like destructive code or code that self-replicates. To the extent there is a breach of this Section 10.4 GT shall implement the problem investigation and correction procedures specified in Attachment D at no cost to Company.
Harmful Code. Ping Identity warrants that it will use commercially reasonable efforts, using industry standard practices, to ensure that the Products, in the form provided by Ping Identity to Customer, do not contain Malicious Code.