Common use of Malicious Technology Clause in Contracts

Malicious Technology. The Licensor Products will not: (i) contain any Malicious Technology, (ii) contain any files or features that will disable or destroy any functionality of the Licensor Products, (iii) monitor Pear's or its Users' use of the Integrated Products; (iv) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (v) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If the Licensor is in breach of this Section, no "right to cure" period will apply. Pear reserves the right to pursue any available civil or criminal action against Licensor for violation of this provision. Licensor will not install, use or execute any software on any Pear CPUs without Pear's written approval. "Malicious Technology" means any software, electronic, mechanical or other means, device or function , e.g. (key node, lock, time-out, "back door," trapdoor," "booby trap," "drop dead device," "data scrambling device," "Trojan Horse,") that would allow Licensor or a third party to: (i) monitor or gain unauthorized access to any Pear system, (ii) use any electronic self-help mechanism or (iii) restrict, disable, limit or impair the performance of a Pear system or network.

Appears in 1 contract

Sources: Software License Agreement (2304101 Ontario Inc.)

Malicious Technology. The Licensor Products as delivered to Pear will not: (i) contain any Malicious Technology, (ii) contain any files or features that will disable or destroy any functionality of the Licensor Products, (iii) monitor Pear's ’s or its Users' use of the Integrated Products; (iv) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (v) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If the Licensor is in breach of this Section, no "right to cure" period will apply. Pear reserves the right to pursue any available civil or criminal action against Licensor for violation of this provision. Licensor will not install, use or execute any software on any Pear CPUs without Pear's ’s written approval. "Malicious Technology" means any software, electronic, mechanical or other means, device or function function, e.g. (key node, lock, time-out, "back door," trapdoor," "” “booby trap," "” “drop dead device," "” “data scrambling device," "” “Trojan Horse,") that would allow Licensor or a third party to: (i) monitor or gain unauthorized access to any Pear system, (ii) use any electronic self-help mechanism or (iii) restrict, disable, limit or impair the performance of a Pear system or network.

Appears in 1 contract

Sources: Software License Agreement (Thimble Point Acquisition Corp.)