{"component": "clause", "props": {"groups": [{"snippet": "No Company Software contains any \u201cback door,\u201d \u201cdrop dead device,\u201d \u201ctime bomb,\u201d \u201cTrojan horse,\u201d \u201cvirus,\u201d or \u201cworm\u201d (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user\u2019s consent.", "size": 27, "snippet_links": [{"key": "company-software", "type": "clause", "offset": [3, 19]}, {"key": "back-door", "type": "definition", "offset": [34, 43]}, {"key": "trojan-horse", "type": "definition", "offset": [80, 92]}, {"key": "software-industry", "type": "definition", "offset": [160, 177]}, {"key": "capable-of", "type": "definition", "offset": [230, 240]}, {"key": "operation-of", "type": "definition", "offset": [361, 373]}, {"key": "access-to", "type": "definition", "offset": [401, 410]}, {"key": "computer-system", "type": "clause", "offset": [414, 429]}, {"key": "other-device", "type": "definition", "offset": [444, 456]}, {"key": "the-user", "type": "clause", "offset": [555, 563]}], "samples": [{"hash": "kHnbm47AoJU", "uri": "/contracts/kHnbm47AoJU#harmful-code", "label": "Merger Agreement (Dot Hill Systems Corp)", "score": 21.0109519958, "published": true}, {"hash": "lGa6w6EqZqp", "uri": "/contracts/lGa6w6EqZqp#harmful-code", "label": "Merger Agreement (Websense Inc)", "score": 21.0, "published": true}, {"hash": "5Qh5vdb7Wwp", "uri": "/contracts/5Qh5vdb7Wwp#harmful-code", "label": "Merger Agreement (Volcano CORP)", "score": 21.0, "published": true}], "hash": "47b5eb217f1029487020c22a1022ac54", "id": 2}, {"snippet": "Using a recent version of a reputable virus-checking product (to the extent commercially available), Company will check its software and other systems used by Company to deliver the products or services to the School District for any harmful code, including, without limitation, any viruses, worms, or similar harmful code, and will use commercially reasonable efforts to eliminate any such harmful code that the Company discovers.", "size": 55, "snippet_links": [{"key": "to-the-extent", "type": "clause", "offset": [62, 75]}, {"key": "commercially-available", "type": "definition", "offset": [76, 98]}, {"key": "company-will", "type": "clause", "offset": [101, 113]}, {"key": "other-systems", "type": "clause", "offset": [137, 150]}, {"key": "by-company", "type": "clause", "offset": [156, 166]}, {"key": "the-school-district", "type": "clause", "offset": [206, 225]}, {"key": "without-limitation", "type": "clause", "offset": [259, 277]}, {"key": "use-commercially-reasonable-efforts", "type": "clause", "offset": [333, 368]}, {"key": "the-company", "type": "clause", "offset": [409, 420]}], "samples": [{"hash": "5sHuglv47Cn", "uri": "/contracts/5sHuglv47Cn#harmful-code", "label": "Data Privacy Addendum", "score": 33.7717247009, "published": true}, {"hash": "gmgN9lqkAwF", "uri": "/contracts/gmgN9lqkAwF#harmful-code", "label": "Data Privacy Addendum", "score": 33.6942214966, "published": true}, {"hash": "iIgboK7TkAP", "uri": "/contracts/iIgboK7TkAP#harmful-code", "label": "Data Privacy Addendum", "score": 33.6809272766, "published": true}], "hash": "245d428fb740f7ed0e3aaa0ca48b6ee2", "id": 1}, {"snippet": "Ping Identity warrants that it will use commercially reasonable efforts, using industry standard practices, to ensure that the Products, in the form provided by Ping Identity to Customer, do not contain Malicious Code.", "size": 3, "snippet_links": [{"key": "use-commercially-reasonable-efforts", "type": "clause", "offset": [36, 71]}, {"key": "industry-standard-practices", "type": "clause", "offset": [79, 106]}, {"key": "to-ensure", "type": "clause", "offset": [108, 117]}, {"key": "the-products", "type": "clause", "offset": [123, 135]}, {"key": "to-customer", "type": "clause", "offset": [175, 186]}, {"key": "malicious-code", "type": "clause", "offset": [203, 217]}], "samples": [{"hash": "gxXlidlabCg", "uri": "/contracts/gxXlidlabCg#harmful-code", "label": "Subscription Agreement", "score": 31.9303092957, "published": true}, {"hash": "cyKQRtp54Cr", "uri": "/contracts/cyKQRtp54Cr#harmful-code", "label": "Subscription Agreement", "score": 26.5441474915, "published": true}, {"hash": "fqQDbJI8Y9y", "uri": "/contracts/fqQDbJI8Y9y#harmful-code", "label": "Subscription Agreement", "score": 26.3073234558, "published": true}], "hash": "2afa80bdfde94c6cbed777d1e69eb952", "id": 7}, {"snippet": "The Products shall be free from harmful code (such as spyware, malware, viruses, time bombs, and Trojan horses) and material programming errors that prevent the Products from operating in substantial conformity with the documentation therefor.", "size": 5, "snippet_links": [{"key": "the-products", "type": "clause", "offset": [0, 12]}, {"key": "conformity-with", "type": "clause", "offset": [200, 215]}], "samples": [{"hash": "dMujhZJtLWj", "uri": "/contracts/dMujhZJtLWj#harmful-code", "label": "End User License Agreement", "score": 23.0468444824, "published": true}, {"hash": "cm10jJRZte2", "uri": "/contracts/cm10jJRZte2#harmful-code", "label": "End User License Agreement", "score": 23.0468444824, "published": true}, {"hash": "c1mjgQ913Y6", "uri": "/contracts/c1mjgQ913Y6#harmful-code", "label": "End User License Agreement", "score": 23.0468444824, "published": true}], "hash": "012e3fb163418da9c32c838ff6aed384", "id": 3}, {"snippet": "The Seller Products do not contain any \u201cviruses,\u201d \u201cworms,\u201d \u201ctime-bombs,\u201d \u201ckey-locks,\u201d or any other devices that could disrupt or interfere with the operation of the Seller Products or equipment upon which the Seller Products operate.", "size": 5, "snippet_links": [{"key": "seller-products", "type": "clause", "offset": [4, 19]}, {"key": "other-devices", "type": "clause", "offset": [93, 106]}, {"key": "operation-of-the-seller", "type": "clause", "offset": [148, 171]}], "samples": [{"hash": "ezPEN5Z84hj", "uri": "/contracts/ezPEN5Z84hj#harmful-code", "label": "Asset Purchase Agreement (Medical Transcription Billing, Corp)", "score": 27.1273097992, "published": true}, {"hash": "hcqHhVOEZOg", "uri": "/contracts/hcqHhVOEZOg#harmful-code", "label": "Asset Purchase Agreement (Medical Transcription Billing, Corp)", "score": 24.9671459198, "published": true}, {"hash": "eNh76ytnewv", "uri": "/contracts/eNh76ytnewv#harmful-code", "label": "Asset Purchase Agreement (Medical Transcription Billing, Corp)", "score": 23.2258720398, "published": true}], "hash": "5154f083ee2a62114748d891105a47e4", "id": 4}, {"snippet": "GT represents and warrants to Company that, as of the Delivery Date, to the best of its knowledge, software utilized by GT in providing the service does not contain computer instructions, circuitry or other technological means whose purpose is to disrupt, damage or interfere with any use of either party's computer and communications facilities or equipment (\"Harmful Code\") and it has used commercially reasonable efforts to prevent the introduction of such \"Harmful Code\" to the services prior to delivery to or use by Company. For the purposes of this warranty, Harmful Code shall include, without limitation, any code containing viruses, Trojan horses, worms, or like destructive code or code that self-replicates. To the extent there is a breach of this Section 10.4 GT shall implement the problem investigation and correction procedures specified in Attachment D at no cost to Company.", "size": 3, "snippet_links": [{"key": "delivery-date", "type": "clause", "offset": [54, 67]}, {"key": "providing-the-service", "type": "clause", "offset": [126, 147]}, {"key": "either-party", "type": "definition", "offset": [292, 304]}, {"key": "facilities-or-equipment", "type": "definition", "offset": [335, 358]}, {"key": "commercially-reasonable-efforts", "type": "clause", "offset": [392, 423]}, {"key": "to-the-services", "type": "clause", "offset": [475, 490]}, {"key": "prior-to-delivery", "type": "clause", "offset": [491, 508]}, {"key": "use-by-company", "type": "clause", "offset": [515, 529]}, {"key": "for-the-purposes-of", "type": "clause", "offset": [531, 550]}, {"key": "without-limitation", "type": "clause", "offset": [594, 612]}, {"key": "destructive-code", "type": "definition", "offset": [673, 689]}, {"key": "to-the-extent", "type": "clause", "offset": [720, 733]}, {"key": "breach-of-this-section", "type": "clause", "offset": [745, 767]}, {"key": "the-problem", "type": "clause", "offset": [792, 803]}, {"key": "investigation-and-correction", "type": "clause", "offset": [804, 832]}, {"key": "attachment-d", "type": "definition", "offset": [857, 869]}, {"key": "cost-to-company", "type": "definition", "offset": [876, 891]}], "samples": [{"hash": "lm1IEgjs7mZ", "uri": "/contracts/lm1IEgjs7mZ#harmful-code", "label": "Gt Services Agreement (Getthere Com)", "score": 18.0, "published": true}, {"hash": "e4CGaetely", "uri": "/contracts/e4CGaetely#harmful-code", "label": "Gt Services Agreement (Getthere Com)", "score": 18.0, "published": true}, {"hash": "3KsZuo2ZSTO", "uri": "/contracts/3KsZuo2ZSTO#harmful-code", "label": "Gt Services Agreement (Getthere Com)", "score": 18.0, "published": true}], "hash": "ac9e5ced978ea948b41675531764414e", "id": 8}, {"snippet": "If either Party becomes aware that an unauthorized party has accessed Issuer Data, or Confidential Information, or that Harmful Code has infected a relevant network or system of such Party, then it shall notify the other Party as soon as reasonably practical, so the Parties can work together to mitigate any potential adverse effect and undertake any further steps that may be applicable or required by law. \u201cHarmful Code\u201d means computer instructions whose primary purpose or effect is to disrupt, damage or interfere with use of any computer or telecommunications facilities, including, without limitation, any automatic restraint, time-bomb, trap-door, virus, worm, Trojan horse, or other harmful code or instrumentality that will cause a system to cease to operate or to fail to conform to its specifications. Each Party shall take commercially reasonable precautions to avoid, prevent, stop, find and eliminate the spread of all Harmful Code on its hardware systems and networks.", "size": 4, "snippet_links": [{"key": "if-either-party", "type": "clause", "offset": [0, 15]}, {"key": "issuer-data", "type": "definition", "offset": [70, 81]}, {"key": "confidential-information", "type": "definition", "offset": [86, 110]}, {"key": "relevant-network", "type": "definition", "offset": [148, 164]}, {"key": "such-party", "type": "clause", "offset": [178, 188]}, {"key": "notify-the", "type": "clause", "offset": [204, 214]}, {"key": "other-party", "type": "definition", "offset": [215, 226]}, {"key": "the-parties", "type": "clause", "offset": [263, 274]}, {"key": "to-mitigate", "type": "definition", "offset": [293, 304]}, {"key": "adverse-effect", "type": "definition", "offset": [319, 333]}, {"key": "further-steps", "type": "clause", "offset": [352, 365]}, {"key": "required-by-law", "type": "definition", "offset": [392, 407]}, {"key": "primary-purpose", "type": "definition", "offset": [458, 473]}, {"key": "telecommunications-facilities", "type": "definition", "offset": [547, 576]}, {"key": "without-limitation", "type": "clause", "offset": [589, 607]}, {"key": "trojan-horse", "type": "definition", "offset": [669, 681]}, {"key": "to-operate", "type": "definition", "offset": [758, 768]}, {"key": "each-party", "type": "definition", "offset": [814, 824]}, {"key": "reasonable-precautions", "type": "clause", "offset": [849, 871]}, {"key": "systems-and-networks", "type": "definition", "offset": [963, 983]}], "samples": [{"hash": "5K09SxUbl9B", "uri": "/contracts/5K09SxUbl9B#harmful-code", "label": "Platform Services, Transfer Agent and Registrar Agreement (Hygienic Dress League Corp)", "score": 34.0650253296, "published": true}, {"hash": "hTx0HVhm9kd", "uri": "/contracts/hTx0HVhm9kd#harmful-code", "label": "Platform Services, Transfer Agent and Registrar Agreement (Arca U.S. Treasury Fund)", "score": 33.3203277588, "published": true}, {"hash": "3oUom1ASppY", "uri": "/contracts/3oUom1ASppY#harmful-code", "label": "Platform Services, Transfer Agent and Registrar Agreement (Hygienic Dress League Corp)", "score": 33.1670074463, "published": true}], "hash": "4261a3b3c77cc5bbbf7c1199ddcb500b", "id": 5}, {"snippet": "23.3.1 The Service Provider must undertake reasonable efforts to detect and prevent any:\n(a) unauthorised access to Confidential Information and Personal Information in its systems, and\n(b) any Harmful Code from being introduced by the Service Provider, its Personnel or Subcontractors into Finance or the Agency\u2019s systems or sent from Finance or the Agency\u2019s systems by the Service Provider, its Personnel or Subcontractors, in the course of the Services, including by:\ni. implementing practices and procedures that are consistent with industry best practice for an engagement similar to the Services;\nii. use of appropriate and up-to-date virus detection software for preventing and detecting Harmful Code; and\niii. without limiting paragraphs (a) or (b), pro-actively informing itself of developments in threats of Harmful Code, and taking reasonable precautions against such known threats.\n23.3.2 If the Service Provider becomes aware that any Harmful Code is found to have been detected the Service Provider must:\n(a) notify Finance or the Agency promptly and in any event within 24 hours of discovery;\n(b) provide all information known by the Service Provider and reasonably requested by Finance or the Agency in relation to the Harmful Code, its manner of introduction and the effect the Harmful Code has had or is likely to have; and\n(c) retain evidence and logs regarding the incident to help in determining the cause, damage and likely source.\n23.3.3 The Service Provider must perform its obligations under this clause 23.3 at no additional cost to Finance or the Agency.", "size": 3, "snippet_links": [{"key": "the-service-provider-must", "type": "clause", "offset": [7, 32]}, {"key": "reasonable-efforts", "type": "clause", "offset": [43, 61]}, {"key": "confidential-information-and-personal-information", "type": "clause", "offset": [116, 165]}, {"key": "by-the-service-provider", "type": "clause", "offset": [229, 252]}, {"key": "the-agency", "type": "clause", "offset": [302, 312]}, {"key": "in-the-course-of", "type": "definition", "offset": [426, 442]}, {"key": "practices-and-procedures", "type": "clause", "offset": [487, 511]}, {"key": "consistent-with", "type": "definition", "offset": [521, 536]}, {"key": "industry-best-practice", "type": "clause", "offset": [537, 559]}, {"key": "to-the-services", "type": "clause", "offset": [586, 601]}, {"key": "virus-detection", "type": "clause", "offset": [641, 656]}, {"key": "without-limiting", "type": "definition", "offset": [718, 734]}, {"key": "reasonable-precautions", "type": "clause", "offset": [843, 865]}, {"key": "hours-of", "type": "clause", "offset": [1088, 1096]}, {"key": "provide-all-information", "type": "clause", "offset": [1112, 1135]}, {"key": "requested-by", "type": "clause", "offset": [1181, 1193]}, {"key": "in-relation-to", "type": "clause", "offset": [1216, 1230]}, {"key": "manner-of", "type": "definition", "offset": [1253, 1262]}, {"key": "likely-to-have", "type": "clause", "offset": [1322, 1336]}, {"key": "incident-to", "type": "definition", "offset": [1385, 1396]}, {"key": "this-clause", "type": "clause", "offset": [1517, 1528]}, {"key": "no-additional-cost", "type": "clause", "offset": [1537, 1555]}], "samples": [{"hash": "dFMn12paxdK", "uri": "/contracts/dFMn12paxdK#harmful-code", "label": "Panel Head Agreement", "score": 27.0602321625, "published": true}, {"hash": "k1wueJUELZs", "uri": "/contracts/k1wueJUELZs#harmful-code", "label": "Panel Head Agreement", "score": 26.8535251617, "published": true}, {"hash": "3mR7AOWa3Mo", "uri": "/contracts/3mR7AOWa3Mo#harmful-code", "label": "Panel Head Agreement", "score": 26.7481174469, "published": true}], "hash": "7d0a79c5b617249c24afc0d61fc32e37", "id": 6}, {"snippet": "To the Knowledge of the Company, no Company Software owned by the Acquired Corporations or software licensed to any of the Acquired Corporations for use in or in conjunction with the current version of any Company Product contains any \u201cback door,\u201d \u201cdrop dead device,\u201d \u201ctime bomb,\u201d \u201cTrojan horse,\u201d \u201cvirus,\u201d or \u201cworm\u201d (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user\u2019s consent.", "size": 3, "snippet_links": [{"key": "knowledge-of-the-company", "type": "definition", "offset": [7, 31]}, {"key": "company-software", "type": "clause", "offset": [36, 52]}, {"key": "owned-by", "type": "definition", "offset": [53, 61]}, {"key": "acquired-corporations", "type": "clause", "offset": [66, 87]}, {"key": "current-version", "type": "clause", "offset": [183, 198]}, {"key": "company-product", "type": "definition", "offset": [206, 221]}, {"key": "back-door", "type": "definition", "offset": [236, 245]}, {"key": "trojan-horse", "type": "definition", "offset": [282, 294]}, {"key": "software-industry", "type": "definition", "offset": [362, 379]}, {"key": "capable-of", "type": "definition", "offset": [432, 442]}, {"key": "operation-of", "type": "definition", "offset": [563, 575]}, {"key": "access-to", "type": "definition", "offset": [603, 612]}, {"key": "computer-system", "type": "clause", "offset": [616, 631]}, {"key": "other-device", "type": "definition", "offset": [646, 658]}, {"key": "the-user", "type": "clause", "offset": [758, 766]}], "samples": [{"hash": "bXnL1KX2o3j", "uri": "/contracts/bXnL1KX2o3j#harmful-code", "label": "Merger Agreement (Ixys Corp /De/)", "score": 21.0, "published": true}, {"hash": "4IXqldydY63", "uri": "/contracts/4IXqldydY63#harmful-code", "label": "Merger Agreement (Zilog Inc)", "score": 21.0, "published": true}], "hash": "8e2a6f16d64fd22b1f538ba0d160f4ff", "id": 9}, {"snippet": "The Parties will each use all reasonable commercial endeavours to avoid introduction of any virus or other contaminant (including any bugs, worms, logic bombs, Trojan horses or any other self- propagating program) that may infect or cause damage to the Service or other disrupt the access and use of the Service (Harmful Code) including by utilising industry standard protection mechanisms;", "size": 3, "snippet_links": [{"key": "the-parties-will", "type": "clause", "offset": [0, 16]}, {"key": "to-the-service", "type": "clause", "offset": [246, 260]}, {"key": "access-and-use-of-the-service", "type": "clause", "offset": [282, 311]}, {"key": "industry-standard", "type": "definition", "offset": [350, 367]}, {"key": "protection-mechanisms", "type": "clause", "offset": [368, 389]}], "samples": [{"hash": "6iKuMBkrRT0", "uri": "/contracts/6iKuMBkrRT0#harmful-code", "label": "Terms of Use", "score": 24.8904857635, "published": true}], "hash": "02f64e927e7e5190bdfd6f9e20abc9eb", "id": 10}], "next_curs": "ClUST2oVc35sYXdpbnNpZGVyY29udHJhY3RzcjELEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhVoYXJtZnVsLWNvZGUjMDAwMDAwMGEMogECZW4YACAA", "clause": {"parents": [["miscellaneous", "Miscellaneous"], ["intellectual-property-privacy", "Intellectual Property Privacy"], ["intellectual-property", "Intellectual Property"], ["representations-and-warranties-of-the-company", "REPRESENTATIONS AND WARRANTIES OF THE COMPANY"], ["representations-and-warranties", "Representations and Warranties"]], "children": [["", ""], ["preexisting-materials", "Preexisting Materials"], ["transition-period", "Transition Period"], ["request-for-review-of-prices-for-existing-customers", "Request for Review of Prices for Existing Customers"], ["warranty-redemption", "Warranty Redemption"]], "size": 178, "title": "Harmful Code", "id": "harmful-code", "related": [["disabling-code", "Disabling Code", "Disabling Code"], ["malicious-code", "Malicious Code", "Malicious Code"], ["illicit-code", "Illicit Code", "Illicit Code"], ["personal-data-protection-act", "PERSONAL DATA PROTECTION ACT", "PERSONAL DATA PROTECTION ACT"], ["toxic-substances", "TOXIC SUBSTANCES", "TOXIC SUBSTANCES"]], "related_snippets": [], "updated": "2026-04-15T04:23:14+00:00", "also_ask": ["What minimum definitions and scope should be included to cover all forms of harmful code?", "How can liability and indemnification be strategically allocated in case harmful code is introduced?", "What are the most common loopholes or fatal flaws in harmful code clauses?", "How do courts interpret intent and knowledge requirements in harmful code disputes?", "How does this clause compare to industry standards and regulatory requirements for cybersecurity?"], "drafting_tip": "Define 'Harmful Code' precisely to avoid ambiguity; specify prohibited actions to ensure enforceability; require prompt remediation to minimize operational risk.", "explanation": "A Harmful Code clause is designed to prevent the introduction or transmission of malicious software, such as viruses, worms, or other harmful code, within the scope of a contract. This clause typically requires parties to ensure that any software, files, or electronic communications provided are free from code that could damage, disrupt, or compromise systems and data. By including this provision, the contract aims to protect parties from security breaches, data loss, or operational disruptions caused by harmful code, thereby allocating risk and ensuring a safer exchange of digital materials."}, "json": true, "cursor": ""}}