No Harmful Code. To the Knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, or exflitrating any data or file without the user’s consent (collectively, “Harmful Code”).
Appears in 1 contract
Sources: Merger Agreement (FireEye, Inc.)
No Harmful Code. To the Knowledge knowledge of the Company, none of the Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exflitrating destroying any data or file without the user’s consent (collectively, “Harmful Code”).
Appears in 1 contract
Sources: Agreement and Plan of Reorganization (FireEye, Inc.)
No Harmful Code. To the Knowledge of the Company, none None of the Company Software contains which constitutes Company IP, as a result of Company’s intentional acts. includes any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any unauthorized manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exflitrating destroying any data or file without the user’s consent or command (collectively, collectively “Harmful Code”).
Appears in 1 contract
Sources: Merger Agreement (Instructure Inc)
No Harmful Code. To the Knowledge Except as set forth in Part 2.10(k) of the CompanyDisclosure Schedule, none of the Acquired Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, have any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exflitrating destroying any data or file without the user’s consent (collectively, “Harmful Code”)consent.
Appears in 1 contract
Sources: Merger Agreement (Yelp Inc)
No Harmful Code. To No Owned Company Software and, to the Knowledge of the Company, none of the no Licensed Company Software contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, have or capable of performing, would reasonably be expected to perform any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, damaging or exflitrating destroying any data or file without the user’s consent (collectively, “Harmful Code”)consent.
Appears in 1 contract
Sources: Merger Agreement (Yelp Inc)