Common use of Malicious Technology Clause in Contracts

Malicious Technology. Deliverables will not: (i) contain any Malicious Technology; (ii) contain any files or features that will disable or destroy any functionality of the Deliverables; (iii) monitor use of the Deliverables by Sprint; (iv) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (v) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If Company is in breach of this subsection, [*****] period will apply. Sprint reserves the right to pursue any available civil or criminal action against Company for violation of this provision. Company will not install, use or execute any software on any Sprint CPU without the written approval of Sprint. Company acknowledges that it does not have any right to electronically repossess or use any self-help related to the Deliverables. “Malicious Technology” means any software, electronic, mechanical or other means, device or function, e.g. (key, node, lock, time-out, “back door,” trapdoor,” “booby trap,” “drop dead device,” “data scrambling device,” “Trojan Horse”) that would allow Company or a third party to: (x) monitor or gain unauthorized access to any Sprint system; (y) use any electronic self-help mechanism; or (z) restrict, disable, limit or impair the performance of a Sprint system.

Appears in 2 contracts

Sources: Application and Services Agreement (TNAV Holdings, Inc.), Application and Services Agreement (TNAV Holdings, Inc.)