Illicit Code. Except for the functions and features expressly disclosed in Supplier's documentation made available to Accenture, Deliverables will be free of any programs, subroutines, code, instructions, data or functions, (including but not limited to viruses, malware, worms, date bombs, time bombs, shut-down devices, keys, authorization codes, back doors or passwords allowing Supplier access) that may result in any inoperability, damage, interruption, or interference of the Deliverables or any equipment on which the Deliverables reside or with which the Deliverables are capable of communicating.
Illicit Code. Licensor warrants unless (i) authorized in writing by Lilly or (ii) necessary to perform valid duties under this Agreement, any Software provided to Lilly by Licensor for use by Licensor or Lilly shall; (a) contain no hidden files, (b) as set up in the default installation, not replicate, transmit or activate itself without control of a person operating computing equipment on which it resides; (c) not alter, damage, or erase any data or computer programs without control of a person operating the computing equipment on which it resides; (d) contain no key, node lock, time-out or other function, whether implemented by electronic, mechanical or other means, which restricts or may restrict use or access to any programs or data developed under this Agreement, based on residency on a specific hardware configuration, frequency of duration of use, or other limiting criteria ("Illicit Code"). Provided and to the extent any program has any of the foregoing attributes, and notwithstanding anything elsewhere in this Agreement to the contrary. Licensor shall be in default of this Agreement, and a thirty (30) day cure period shall apply. In addition to any other remedies available to it under this Agreement, Lilly reserves the right to pursue any civil and/or criminal penalties available to it against the Licensor.
Illicit Code. The Licensed Software, when delivered and installed by Tyler, does not contain, and Tyler has not knowingly introduced through any media, any virus, worm, trap door, back door, bomb, bug, or other contaminant or disabling device, including, without limitation, any timer, clock, counter or other limiting routines, codes, commands, or instructions that may have the effect or be used to access, alter, delete, limit, control, damage, or disable any Purchaser property. EXCEPT AS SPECIFICALLY SET FORTH IN THIS SECTION 11 OR ELSEWHERE IN THIS AGREEMENT, TYLER DISCLAIMS ALL OTHER WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Illicit Code. For any software or software development provided by Contractor the following provisions shall apply: Illicit Code is defined as any harmful or hidden programs or data incorporated therein that destroys or impairs the Software and/or data, thereby inhibiting or preventing University from using the Licensed Software as warranted. Contractor uses commercially available software to detect existence of illicit code prior to distributing such Licensed Software; however, Contractor cannot guarantee that any Licensed Software is free of illicit codes and other defects. During the term of a Licensed Software warranty period, or during the term of any Software Support Services as the case may be, like with any other material Licensed Software defect, if it is determined that Illicit Code is present, then Contractor will use commercially reasonable efforts to correct the affected Software and if it cannot do so in a reasonable period of time, replace the affected Software. Contractor will also reasonably assist University in curtailing the spread of the Illicit Code. Contractor represents and warrants that there are no methods for gaining access to the Licensed Software or other computer resources or data of University (such as a master access key, ID password, back door or trap door) other than as otherwise set forth, and Contractor will not embed any device in the Licensed Software or take any action to disrupt or terminate University’s operation of the Licensed Software.
Illicit Code. CrossWorlds shall use its best efforts to ensure that no Illicit Code (as defined herein) is coded or introduced into the Software by CrossWorlds or CrossWorlds' representatives. In the event that any Illicit Code is found to have been coded or introduced into the Software by CrossWorlds or CrossWorlds' representatives, CrossWorlds shall use best efforts, at no additional charge, to assist Customer in reducing the effects of the Illicit Code, including assisting customer in mitigating and restoring any damaged or lost data. "Illicit Code" means any program, routine, device or other undisclosed feature or hidden file, not referenced in the Documentation, including without limitation, a time bomb, virus, software lock, trojan horse, drop-dead device, worm, malicious logic or trap door, that is designed to delete, disable, deactivate, interfere with or otherwise harm the Software or Customer's other software, hardware, data, any transmitting or activating computer program, or any hardware-limiting, software-limiting or services-limiting function (including, but not limited to, any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.
Illicit Code. Except for the functions and features expressly disclosed in Provider's documentation provided or made available to Accenture, Provider represents and warrants that the Provider Services, deliverables, and software and equipment that process, store or transmit Accenture Data do not and will not knowingly contain any malicious code, including, but not limited to, viruses, malware, worms, malicious backdoors, date/time bombs, ransomware, spyware, rogue software, trojan horses or any disabling code.
Illicit Code. Supplier represents and warrants: (i) that Supplier maintains documented processes for installation and maintenance of Illicit Code protection for systems used directly or indirectly in support of ABA business, including at a minimum active virus detection software installed with real-time protection enabled and automated processes to apply the latest available virus definitions to all computer systems; and (ii) that to the best of Supplier’s information and belief, the Services shall not cause the introduction of Illicit Code into ABA’s environment. If the Services cause the introduction of Illicit Code into ABA's environment, Supplier shall use reasonable and diligent efforts to assist ABA in eliminating the Illicit Code and its effects. If Supplier fails to eliminate such Illicit Code within a reasonable time (not to exceed sixty (60) days from the date of introduction), ABA may immediately terminate the Services, the applicable Schedule of Services, or this Agreement, at no liability to ABA, and Supplier shall pay ABA the costs incurred by ABA in transferring the Services to ABA or to a third-party designated by ABA.
Illicit Code. (A) Unless authorized in writing by Customer, or necessary to perform valid duties under this Software Licensing Agreement and any applicable Transaction Agreement, any Software developed by Supplier under this Software Licensing Agreement or otherwise provided to Customer by Supplier for use by Supplier or Customer shall contain no Illicit Code.
Illicit Code. Supplier agrees that: (i) unless authorized in writing by an Eligible Recipient; or (ii) necessary to perform valid duties under this ASP Agreement, any products provided to Eligible Recipient by Supplier for use by Supplier or Eligible Recipient shall: (a) contain no hidden files; (b) not replicate, transmit or activate itself without control of a person operating computing equipment on which it resides; (c) not alter, damage, or erase any data or computer programs without control of a person operating the computing equipment on which it resides; or (d) contain no key, node lock, time out or other function, whether implemented by electronic, mechanical or other means, which restricts or may restrict use or access to any programs or data developed under this ASP Agreement, based on residency on a specific hardware configuration, frequency or duration of use, or other limiting criteria (“Illicit Code”). If any products contain Illicit Code, Supplier shall, via a document specific to this provision, notify Eligible Recipient in writing and receive a signed acknowledgement of receipt from Eligible Recipient. Such notification shall specifically inform Eligible Recipient of the full extent and nature of the Illicit Code and provide Eligible Recipient with instructions for overriding such Illicit Code in emergencies.
Illicit Code. The Outsource Services, and any other software code provided by Provider, are provided free of: (i) any malicious computer code or instructions that may disrupt, damage or interfere with Clients use of the Outsource Services or its own computer facilities, e.g. viruses, Trojan horses, worms or similar types of malicious code (excepting) the content of Client attachments and other Client Data); or (ii) any computer instructions or software code with alters, damages, or erases any Client Data, which alteration, damage or erasure was not initiated by the relevant user. Provider also represents and warrants to Client that it has developed and engineered its Outsource Services and related software without any ‘back doors’ or ‘trap doors’ which allow for access to Client Data by anyone other than authorized parties through the bypassing of any security features.