Common use of Harmful Code Clause in Contracts

Harmful Code. To the Knowledge of the Company, no Company Software owned by the Acquired Corporations or software licensed to any of the Acquired Corporations for use in or in conjunction with the current version of any Company Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user’s consent.

Appears in 2 contracts

Sources: Merger Agreement (Ixys Corp /De/), Merger Agreement (Zilog Inc)

Harmful Code. To the Knowledge of the each Acquired Company’s Knowledge, no Company Software owned by the Acquired Corporations or software licensed to any of the Acquired Corporations for use in or in conjunction with the current version of any Company Product contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code (other than time-based license locks and other similar license key or similar security or authorization systems directly employed by Company in any Acquired Company Product) designed or intended to have, or capable of performing, any of the following functions: (ia) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (iib) damaging or destroying any data or file without the user’s consent.

Appears in 1 contract

Sources: Merger Agreement (Cavium Networks, Inc.)