No Malicious Software Sample Clauses

No Malicious Software. None of the Company Products contains any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing or without user intent will cause, any of the following functions (except as may be necessary to legitimately manage the authorized use of Company’s Product): (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed, (ii) damaging or destroying any data or file without the user’s consent, or (iii) sending information to Company, any of its Subsidiaries or any third party without the user’s consent. None of the Company Products (i) constitutes or is considered “spyware” or “trackware” as such term is commonly understood in the software industry, (ii) is installed on a user’s computer without their knowledge, (iii) records a user’s actions without their knowledge, (iv) employs a user’s Internet connection without their knowledge to gather or transmit information on the user or their behavior, or (v) will load whenever a browser starts or share the browser’s memory context. For the purposes of this paragraph, “without a user’s knowledge” includes but is not limited to (x) without explicitly informing the user and (y) without being expected by a reasonable user even if the text of a license agreement, help file, or other user information file does explicitly inform such user.
AutoNDA by SimpleDocs
No Malicious Software. None of the Company Products currently being distributed, offered, made available, used, or supported contain any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing or without user intent will cause, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed, (ii) damaging or destroying any data or file without a customer’s specific consent, or (iii) sending information to the Company, a Company Subsidiary or any third party without a customer’s specific consent. None of the Company Products currently being distributed, offered, made available, used, or supported (i) is installed on a customer’s computer without their knowledge, (ii) records customer’s actions without their knowledge, (iii) employs a customer’s Internet connection without their knowledge to gather or transmit information on the customer or their behavior, or (iv) will load whenever a browser starts or share the browser’s memory context (all of the foregoing, collectively, “Malware”); provided, however, that no representation or warranty is made in this sentence with respect to any Malware that may be transmitted by the Company’s customers via Company Products, where any such Malware (i) is not and was not contained in or transmitted with the Company Products as made available by the Company or its Subsidiaries and (ii) could not have been detected and removed using reasonable efforts of the Company or its Subsidiaries. For the purposes of this paragraph, “without customer’s knowledge” includes but is not limited to (a) without explicitly informing the customer or (b) without being expected by a reasonable customer, even if the text of a license agreement, help file, or other user information file does explicitly inform such customer. For purposes of this Section 3.13(k), “customer” includes paid and unpaid customers and other users of such Company Products. The Company and each of its Subsidiaries have taken reasonable steps to protect the Company Products and the information technology systems used in connection with the operation of the Company and each of its Subsidiaries from Malware.
No Malicious Software. No Company Product contains any computer code designed to improperly disrupt, disable or harm in any manner the operation of any software or hardware. None of the Company’s Products contains any worm, bomb, backdoor, clock, timer or other disabling device, code, design or routine which improperly causes the software or any portion thereof to be erased, inoperable or otherwise incapable of being used, either automatically, with the passage of time or upon command by any party. The Company has a policy and procedure for tracking material bugs, errors and defects of which it becomes aware in any Company Products, and maintains a database covering the foregoing. For all Software currently used by the Company in providing Company Products, or in developing or making available any of the Company Products, the Company has, to the extent commercially appropriate, implemented any and all material security patches or material security upgrades that to the Company’s Knowledge are generally available for that Software. The term “material security patches or material security upgrades” means, for purposes of the foregoing sentence, security patches and security upgrades the implementation of which other companies developing and marketing software products similar to the Company’s Products would reasonably consider prudent.

Related to No Malicious Software

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • No Improper Use of Materials During his or her employment with the Company, Employee will not improperly use or disclose any Confidential Information or trade secrets, if any, of any former employer or any other person to whom Employee has an obligation of confidentiality, and Employee will not bring onto the premises of the Company any unpublished documents or any property belonging to any former employer or any other person to whom Employee has an obligation of confidentiality unless consented to in writing by that former employer or person.

  • Malicious Code You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.

Time is Money Join Law Insider Premium to draft better contracts faster.