Unauthorized Code Sample Clauses

POPULAR SAMPLE Copied 2 times
Unauthorized Code. That QPX shall be free, at the time of receipt by Orbitz, of (1) any automatic restraints, computer viruses, software locks, time bombs or other such code that hinders Orbitz’s freedom fully to exercise its license rights under this Agreement; (2) harmful programs or data incorporated into QPX which destroy, erase, damage or otherwise disrupt the normal (i.e., in accordance with the provisions of this Agreement) operation of QPX or other programs, hardware or systems utilized by Orbitz or allow for unauthorized access to QPX or other programs, hardware or systems utilized by Orbitz; or (3) any mechanism, such as password checking, CPU serial number checking or time dependency, that hinders Orbitz’s freedom to fully exercise its license rights under this Agreement. The foregoing provisions of this paragraph (v) shall not be deemed violated by license files that disable functions in QPX which are not included in the license grant to Orbitz hereunder.
Unauthorized Code. The Digital Turbine App will contain no Unauthorized Code. Digital Turbine will not use the Digital Turbine App to engage in any fraudulent, illegal, or unauthorized use. Digital Turbine will continuously monitor the Digital Turbine App for the presence of any Unauthorized Code. In the event Digital Turbine detects the presence of any Unauthorized Code, it will: (a) notify Verizon in writing the same day the Unauthorized Code is detected; (b) promptly remove the Unauthorized Code; and (c) promptly remedy any condition caused by the Unauthorized Code.
Unauthorized Code. In the event a TW Company chooses to have AOL provide managed services, such TW Company represents and warrants that the Customer Site and any Updates as delivered will not contain any Unauthorized Code. Using a current version of a reputable “antivirus” program, such TW Company shall test the Customer Site and any Updates thereto for Unauthorized Code.
Unauthorized Code. WebIAm represents and warrants that, at the time WebIAm delivers Licensed Software to WEBiX, there will be no Unauthorized Code, as defined below, in the Licensed Software delivered by WebIAm at that time, or any portion thereof. "Unauthorized Code" means any virus, Trojan horse, worm or other software routines designed to permit unauthorized access by WebIAm or third parties; to disable, erase or otherwise harm Licensed Software, hardware or data; or to perform similar or other such actions.
Unauthorized Code. That the Licensed Software shall be free, at the time of receipt by Galileo, of (1) any automatic restraints, computer viruses, software locks, time bombs or other such code that hinders Galileo’s freedom fully to exercise its license rights under this Agreement; (2) harmful programs or data incorporated into the Licensed Software which destroy, erase, damage or otherwise disrupt the normal (i.e., in accordance with the provisions of this Agreement) operation of the Licensed Software or other programs, hardware or systems utilized by Galileo or allow for unauthorized access to the Licensed Software or other programs, hardware or systems utilized by Galileo; or (3) any mechanism, such as password checking, CPU serial number checking or time dependency, that hinders Galileo’s freedom to fully exercise its license rights under this Agreement. The foregoing provisions of this paragraph (v) shall not be deemed violated by license files that disable functions in the Licensed Software which are not included in the license grant to Galileo hereunder.
Unauthorized Code. That the Software shall be free, at the time of receipt by ChiLin, of any computer virus, software locks or other such unauthorized code. Unauthorized code includes harmful programs or data incorporated into the Software which destroys, erases, damages or otherwise disrupts the normal operation of the Software or other programs, hardware or systems utilized by ChiLin or allows for unauthorized access to the Software or other programs, hardware or systems utilized by ChiLin.
Unauthorized Code. Unauthorized Code means any virus, Trojan horse, worm, back door, trap door, time bomb, drop-dead device, timer, clock, counter or other limiting routine, as well as any other instructions, designs, software routines, or hardware components designed to: (a) disable, erase, or otherwise harm software, hardware, data, text or any other information stored in electronic form; (b) cause any of the foregoing with the passage of time; or (c) place a program or hardware under the positive control of a person other than an owner or licensee of the program or hardware. Unauthorized Code does not include software routines in a computer program, if any, designed to permit the owner or licensor of the program, or any other person acting by authority of the owner, or licensor, to obtain access to a licensee’s computer system(s) for purposes of maintenance or technical support.
Unauthorized Code. That the Gordian IP shall be free, at ----------------- the time of receipt by Lantronix, of any computer virus, software locks or other such unauthorized code incorporated therein by Gordian or at Gordian's direction. Unauthorized code includes harmful programs or data incorporated into the Gordian IP which are intended to destroy, erase, damage or otherwise disrupt the normal operation of the Gordian IP or other programs, hardware or systems utilized by Lantronix or allows for unauthorized access to the Gordian IP or other programs, hardware or systems utilized by Lantronix. Unauthorized code also includes any mechanism, such as password checking, CPU serial number checking or time dependency, that could hinder Lantronix freedom to fully exercise its rights under this Agreement.