Common use of Harmful Code Clause in Contracts

Harmful Code. No Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.

Appears in 3 contracts

Sources: Merger Agreement (Dot Hill Systems Corp), Merger Agreement (Websense Inc), Merger Agreement (Volcano CORP)

Harmful Code. No Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise materially impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.

Appears in 3 contracts

Sources: Merger Agreement (Website Pros Inc), Merger Agreement (WEB.COM, Inc.), Merger Agreement (Website Pros Inc)

Harmful Code. No To the Company’s Knowledge, no Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s consent.

Appears in 3 contracts

Sources: Merger Agreement (MoSys, Inc.), Loan and Security Agreement (Broadsoft Inc), Merger Agreement (Broadsoft Inc)

Harmful Code. No Company Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Seller Software.

Appears in 3 contracts

Sources: Asset Purchase Agreement (Nanometrics Inc), Asset Purchase Agreement (Esim LTD), Asset Purchase Agreement (Nanometrics Inc)

Harmful Code. No Company To the Knowledge of Seller, no Business Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.

Appears in 2 contracts

Sources: Asset Purchase Agreement (Mediabistro Inc.), Asset Purchase Agreement (Webmedia Brands Inc.)

Harmful Code. No Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (aA) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bB) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Merger Agreement (Ipass Inc)

Harmful Code. No Company Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Asset Purchase Agreement (Cavium Networks, Inc.)

Harmful Code. No To the Knowledge of the Company, no Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Merger Agreement (Cavium, Inc.)

Harmful Code. No Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; , or (bii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Asset Purchase Agreement (Intelligent Systems Corp)

Harmful Code. No Company Acquired Corporation Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Merger Agreement (Synopsys Inc)

Harmful Code. No Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Merger Agreement (Enernoc Inc)

Harmful Code. No Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Software.

Appears in 1 contract

Sources: Asset Purchase Agreement (Secure Computing Corp)

Harmful Code. No Company Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Asset Purchase Agreement (Turtle Beach Corp)

Harmful Code. No The Company Software contains does not contain any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any a malicious manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Merger Agreement (St. Bernard Software, Inc.)

Harmful Code. No To the best of the knowledge of the Company, no Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Merger Agreement (Patient Infosystems Inc)

Harmful Code. No The Company uses commercially reasonable efforts to prevent the Company Software contains from containing any "back door,” “" "drop dead device,” “" "time bomb,” “" "Trojan horse,” “" "virus," or "worm" (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s 's consent.

Appears in 1 contract

Sources: Agreement and Plan of Reorganization (Millennial Media Inc.)

Harmful Code. No Company To Seller’s knowledge, no Acquired Corporation Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Purchase and Sale Agreement (MoSys, Inc.)

Harmful Code. No Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) materially disrupting, disabling, harming, or otherwise materially impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) materially damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Merger Agreement (Servidyne, Inc.)