Unauthorized Code Sample Clauses

Unauthorized Code. The Digital Turbine App will contain no Unauthorized Code. Digital Turbine will not use the Digital Turbine App to engage in any fraudulent, illegal, or unauthorized use. Digital Turbine will continuously monitor the Digital Turbine App for the presence of any Unauthorized Code. In the event Digital Turbine detects the presence of any Unauthorized Code, it will: (a) notify Verizon in writing the same day the Unauthorized Code is detected; (b) promptly remove the Unauthorized Code; and (c) promptly remedy any condition caused by the Unauthorized Code.
AutoNDA by SimpleDocs
Unauthorized Code. In the event a TW Company chooses to have AOL provide managed services, such TW Company represents and warrants that the Customer Site and any Updates as delivered will not contain any Unauthorized Code. Using a current version of a reputable “antivirus” program, such TW Company shall test the Customer Site and any Updates thereto for Unauthorized Code.
Unauthorized Code. That the Software shall be free, at the time of receipt by ChiLin, of any computer virus, software locks or other such unauthorized code. Unauthorized code includes harmful programs or data incorporated into the Software which destroys, erases, damages or otherwise disrupts the normal operation of the Software or other programs, hardware or systems utilized by ChiLin or allows for unauthorized access to the Software or other programs, hardware or systems utilized by ChiLin.
Unauthorized Code. That QPX shall be free, at the time of receipt by Orbitz, of (1) any automatic restraints, computer viruses, software locks, time bombs or other such code that hinders Orbitz’s freedom fully to exercise its license rights under this Agreement; (2) harmful programs or data incorporated into QPX which destroy, erase, damage or otherwise disrupt the normal (i.e., in accordance with the provisions of this Agreement) operation of QPX or other programs, hardware or systems utilized by Orbitz or allow for unauthorized access to QPX or other programs, hardware or systems utilized by Orbitz; or (3) any mechanism, such as password checking, CPU serial number checking or time dependency, that hinders Orbitz’s freedom to fully exercise its license rights under this Agreement. The foregoing provisions of this paragraph (v) shall not be deemed violated by license files that disable functions in QPX which are not included in the license grant to Orbitz hereunder.
Unauthorized Code. That the Licensed Software shall be free, at the time of receipt by Galileo, of (1) any automatic restraints, computer viruses, software locks, time bombs or other such code that hinders Galileo’s freedom fully to exercise its license rights under this Agreement; (2) harmful programs or data incorporated into the Licensed Software which destroy, erase, damage or otherwise disrupt the normal (i.e., in accordance with the provisions of this Agreement) operation of the Licensed Software or other programs, hardware or systems utilized by Galileo or allow for unauthorized access to the Licensed Software or other programs, hardware or systems utilized by Galileo; or (3) any mechanism, such as password checking, CPU serial number checking or time dependency, that hinders Galileo’s freedom to fully exercise its license rights under this Agreement. The foregoing provisions of this paragraph (v) shall not be deemed violated by license files that disable functions in the Licensed Software which are not included in the license grant to Galileo hereunder.
Unauthorized Code. Unauthorized Code means any virus, Trojan horse, worm, back door, trap door, time bomb, drop-dead device, timer, clock, counter or other limiting routine, as well as any other instructions, designs, software routines, or hardware components designed to: (a) disable, erase, or otherwise harm software, hardware, data, text or any other information stored in electronic form; (b) cause any of the foregoing with the passage of time; or (c) place a program or hardware under the positive control of a person other than an owner or licensee of the program or hardware. Unauthorized Code does not include software routines in a computer program, if any, designed to permit the owner or licensor of the program, or any other person acting by authority of the owner, or licensor, to obtain access to a licensee’s computer system(s) for purposes of maintenance or technical support.
Unauthorized Code. WebIAm represents and warrants that, at the time WebIAm delivers Licensed Software to WEBiX, there will be no Unauthorized Code, as defined below, in the Licensed Software delivered by WebIAm at that time, or any portion thereof. "Unauthorized Code" means any virus, Trojan horse, worm or other software routines designed to permit unauthorized access by WebIAm or third parties; to disable, erase or otherwise harm Licensed Software, hardware or data; or to perform similar or other such actions.
AutoNDA by SimpleDocs
Unauthorized Code. That the Gordian IP shall be free, at ----------------- the time of receipt by Lantronix, of any computer virus, software locks or other such unauthorized code incorporated therein by Gordian or at Gordian's direction. Unauthorized code includes harmful programs or data incorporated into the Gordian IP which are intended to destroy, erase, damage or otherwise disrupt the normal operation of the Gordian IP or other programs, hardware or systems utilized by Lantronix or allows for unauthorized access to the Gordian IP or other programs, hardware or systems utilized by Lantronix. Unauthorized code also includes any mechanism, such as password checking, CPU serial number checking or time dependency, that could hinder Lantronix freedom to fully exercise its rights under this Agreement.

Related to Unauthorized Code

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act (8 U.S.C.A. & 1101, et seq.), as amended; and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this contract, and should the Federal Government impose sanctions against the City for such use of unauthorized aliens, Consultant hereby agrees to, and shall, reimburse City for the cost of all such sanctions imposed, together with any and all costs, including attorneys' fees, incurred by the City in connection therewith.

  • Unauthorized Leave (a) Any unauthorized absence of an employee from duty shall be deemed to be an absence without pay.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.

  • Unauthorized Acts Each Party agrees to:

  • Privacy of Customer Information (i) Seller’s Customer Information in the possession of Purchaser, other than information independently obtained by Purchaser and not derived in any manner from or using information obtained under or in connection with this Agreement, is and shall remain confidential and proprietary information of Seller. Except in accordance with this Section18(b), Purchaser shall not use any Seller’s Customer Information for any purpose, including the marketing of products or services to, or the solicitation of business from, customers, or disclose any Seller’s Customer Information to any Person, including any of Purchaser’s employees, agents or contractors or any third party not affiliated with Purchaser. Purchaser may use or disclose Seller’s Customer Information only to the extent necessary (1) for examination and audit of Purchaser’s activities, books and records by Purchaser’s regulatory authorities, (2) to protect or exercise Purchaser’s rights and privileges or (3) to carry out Purchaser’s express obligations under this Agreement and the other Program Documents (including providing Seller’s Customer Information to Takeout Buyers), and for no other purpose; provided that Purchaser may also use and disclose Seller’s Customer Information as expressly permitted by Seller in writing, to the extent that such express permission is in accordance with the Privacy Requirements. Purchaser shall take commercially reasonable steps to ensure that each Person to which Purchaser intends to disclose Seller’s Customer Information, before any such disclosure of information, agrees to keep confidential any such Seller’s Customer Information and to use or disclose such Seller’s Customer Information only to the extent necessary to protect or exercise Purchaser’s rights and privileges, or to carry out Purchaser’s express obligations, under this Agreement and the other Program Documents (including providing Seller’s Customer Information to Takeout Buyers). Xxxxxxxxx agrees to maintain an information security program and to assess, manage and control risks relating to the security and confidentiality of Seller’s Customer Information pursuant to such program in the same manner as Purchaser does in respect of its own customers’ information, and shall implement the standards relating to such risks in the manner set forth in the Interagency Guidelines Establishing Standards for Safeguarding Company Customer Information set forth in 12 CFR Parts 30, 168, 170, 208, 211, 225, 263, 308 and 364. Without limiting the scope of the foregoing sentence, Purchaser shall use at least the same physical and other security measures to protect all of Seller’s Customer Information in its possession or control as it uses for its own customers’ confidential and proprietary information.

Time is Money Join Law Insider Premium to draft better contracts faster.