Malicious Technology Clause Samples
The Malicious Technology clause defines the prohibition and handling of harmful or unauthorized technological components within a product or service. It typically addresses issues such as the introduction of viruses, malware, spyware, or other code designed to disrupt, damage, or gain unauthorized access to systems and data. This clause often requires parties to ensure their software is free from such threats and may outline remedies or liabilities if malicious technology is discovered. Its core function is to protect parties from security risks and operational disruptions caused by intentionally harmful technology.
POPULAR SAMPLE Copied 1 times
Malicious Technology. Supplier warrants that the Deliverables as delivered and unmodified form will not: (i) contain any Malicious Technology, (ii) contain any files or features that will disable or destroy any functionality of the Deliverables, (iii) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (iv) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If the Supplier is in breach of this subsection, no “right to cure” period will apply. Embarq reserves the right to pursue any available civil or criminal action against Supplier for violation of this provision. Supplier will not install, use or execute any software on any Embarq CPUs without Embarq’s written approval. “
Malicious Technology. Service Provider warrants that the Deliverables or Services will not at the time of leaving the Service Provider’s data center network edge (i) contain any Malicious Technology or Disabling Device, (ii) contain any files or features that will disable or destroy any functionality of the Deliverables or Services, (iii) monitor Sprint’s use of the Deliverables or Services where not specifically permitted in Section 5.9 [Monitoring] of this Fourteenth Amendment or otherwise as part of the Services provided such monitoring is approved by Sprint as part of the Service Provider obligations under this Fourteenth
Malicious Technology. Deliverables will not: (i) contain any Malicious Technology; (ii) contain any files or features that will disable or destroy any functionality of the Deliverables; (iii) monitor use of the Deliverables by Sprint; (iv) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (v) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If Company is in breach of this subsection, [*****] period will apply. Sprint reserves the right to pursue any available civil or criminal action against Company for violation of this provision. Company will not install, use or execute any software on any Sprint CPU without the written approval of Sprint. Company acknowledges that it does not have any right to electronically repossess or use any self-help related to the Deliverables. “Malicious Technology” means any software, electronic, mechanical or other means, device or function, e.g. (key, node, lock, time-out, “back door,” trapdoor,” “booby trap,” “drop dead device,” “data scrambling device,” “Trojan Horse”) that would allow Company or a third party to: (x) monitor or gain unauthorized access to any Sprint system; (y) use any electronic self-help mechanism; or (z) restrict, disable, limit or impair the performance of a Sprint system.
Malicious Technology. The Licensor Products will not: (i) contain any Malicious Technology, (ii) contain any files or features that will disable or destroy any functionality of the Licensor Products, (iii) monitor Pear's or its Users' use of the Integrated Products; (iv) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (v) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If the Licensor is in breach of this Section, no "right to cure" period will apply. Pear reserves the right to pursue any available civil or criminal action against Licensor for violation of this provision. Licensor will not install, use or execute any software on any Pear CPUs without Pear's written approval. "Malicious Technology" means any software, electronic, mechanical or other means, device or function , e.g. (key node, lock, time-out, "back door," trapdoor," "booby trap," "drop dead device," "data scrambling device," "Trojan Horse,") that would allow Licensor or a third party to: (i) monitor or gain unauthorized access to any Pear system, (ii) use any electronic self-help mechanism or (iii) restrict, disable, limit or impair the performance of a Pear system or network.
Malicious Technology. Deliverables and Systems and any Software, Machines and any other technology or items furnished by Supplier to provide the Services will not (i) contain any Malicious Technology; (ii) contain any files or features that will disable or destroy any functionality of the Deliverables; (iii) monitor use of the Deliverables by Sprint; (iv) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (v) execute, invoke or activate any Disabling Device. Sprint reserves the right to pursue any available civil or criminal action against Supplier for violation of this provision. Supplier will not install, use or execute any software on any Sprint CPU without the written approval of Sprint. Supplier acknowledges that it does not have any right to electronically repossess or use any self-help related to the Deliverables. “Malicious Technology” means any software, electronic, mechanical or other means, device or function (e.g. key, node, lock, time-out, “back door,” trapdoor,” “booby trap,” “drop dead device,” “data scrambling device,” “Trojan Horse”) that would allow Supplier or a third party to: (x) monitor or gain unauthorized access to any Sprint system; or (y) use any electronic self-help mechanism;
Malicious Technology. Deliverables will not: (a) contain any Malicious Technology; (b) contain any files or features that will disable or destroy any functionality of the Deliverables; (c) monitor use of the Deliverables by Sprint; (d) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (e) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If Supplier is in breach of this subsection, no “right to cure” period will apply. Sprint reserves the right to pursue any available civil or criminal action against Supplier for violation of this provision. Supplier will not install, use or execute any software on any Sprint CPU without the written approval of Sprint. Supplier acknowledges that it does not have any right to electronically repossess or use any self-help related to the Deliverables. “
Malicious Technology. SODALES represents and warrants that the Cloud Extension Apps Service will not: (a) contain any Malicious Technology, (b) contain any files or features that will disable or destroy any functionality of the Cloud Extension Apps Service, (c) monitor Customer’s use of the Cloud Extension Apps Service; (d) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (e) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If SODALES is in breach of this subsection, no “right to cure” period will apply. Customer reserves the right to pursue any available civil or criminal action against SODALES and SODALES’s Personnel for violation of this provision. SODALES will not install, use or execute any software on any CPUs of Customer without Customer’s written approval. SODALES acknowledges that it does not have any right to electronically repossess or use any self-help related to the Cloud Extension Apps Service. “
