Common use of Harmful Code Clause in Contracts

Harmful Code. No Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; (b) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Seller Software.

Appears in 3 contracts

Sources: Asset Purchase Agreement (Nanometrics Inc), Asset Purchase Agreement (Esim LTD), Asset Purchase Agreement (Nanometrics Inc)

Harmful Code. No To the Knowledge of the Seller, no Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Seller Software.

Appears in 1 contract

Sources: Asset Purchase Agreement (Broadsoft Inc)

Harmful Code. No Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; (b) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Seller Software.

Appears in 1 contract

Sources: Asset Purchase Agreement (Secure Computing Corp)

Harmful Code. No Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Seller Software.

Appears in 1 contract

Sources: Asset Purchase Agreement (Turtle Beach Corp)

Harmful Code. No Seller Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Seller Software.

Appears in 1 contract

Sources: Asset Purchase Agreement (Cavium Networks, Inc.)

Harmful Code. No Seller To Seller’s knowledge, no Acquired Corporation Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (ai) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (bii) damaging or destroying any data or file without the user’s consent; or (c) otherwise interfering with the operation of such Seller Software.

Appears in 1 contract

Sources: Purchase and Sale Agreement (MoSys, Inc.)