Common use of Malware Clause in Contracts

Malware. The Company Products are free of any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” “harmful code,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of any Company Product or any product or system incorporating a Company Product (or parts thereof) or any associated data or other software, or otherwise cause them to be incapable of being used in the full manner contemplated in the applicable documentation.

Appears in 2 contracts

Samples: Agreement and Plan of Merger (Logitech International Sa), Agreement and Plan of Merger (Limelight Networks, Inc.)

AutoNDA by SimpleDocs

Malware. The Company Products and Services are free of any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” “harmful code,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of any Company Product or Service (or any product products or system incorporating systems that interoperate with a Company Product (or parts thereofService) or any associated data or other software, or otherwise cause them to be incapable of being used in the full manner contemplated in the applicable documentation.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Solta Medical Inc)

AutoNDA by SimpleDocs

Malware. The Company Products Company’s products are free of any disabling codes or instructions, timer, copy protection device, clock, counter or other limiting design or routing and any “back door,” “time bomb,” “Trojan horse,” “worm,” “drop dead device,” “virus,” “harmful code,” or other software routines or hardware components that in each case permit unauthorized access or the unauthorized disablement or unauthorized erasure of any Company Product product or any product or system incorporating a Company Product product (or parts thereof) or any associated data or other software, or otherwise cause them to be incapable of being used in the full manner contemplated in the applicable documentation.

Appears in 1 contract

Samples: Agreement and Plan of Merger (Actividentity Corp)

Time is Money Join Law Insider Premium to draft better contracts faster.