Illicit Code definition

Illicit Code means: (1) Any code UC would not reasonably expect to be present or operating; (2) Hidden software or functionality with adverse or undesired actions or consequences; (3) Code that replicates or transmits Institutional Information or activates operating systems or other similar services without the express knowledge and approval of UC; (4) Code that alters, damages, or erases any Institutional Information or software without the express knowledge and approval of UC; or (5) Code or apparatus that functions in any way as a: key lock, node lock, time-out, “back door,” “trap door,” “booby trap,” “dead drop device,” “data scrambling device,” or other function, regardless of how it is implemented, which is intended to alter or restrict the use of or access to any Institutional Information and/or IT Resources.
Illicit Code means any computer instructions in the Software that are not intended to provide the functionality described in the Software’s Documentation and that interfere with Motorola’s use or right to quiet enjoyment of its license to the Software or that interfere with or prevent Motorola’s use of the Software as provided in this Agreement. Illicit Code includes what is commonly known as computer viruses, Trojan Horses, self-destruction mechanisms, copy protection schemes, and such other computer instructions that can disable, destroy, or otherwise alter the software or hardware on which the Software executes; or reveal any data or other information accessed through or processed by the Software. Illicit Code shall also include any vulnerabilities that allow unauthorized destruction of, access to or control of i) the Products, ii) other elements of a system that include the Products or iii) any information residing on the Products or other elements of a system that include the Products.
Illicit Code is defined as any harmful or hidden programs or data incorporated therein that destroys or impairs the delivered code, thereby inhibiting or preventing UAB from using the code as warranted. Provider uses commercially available software to detect existence of illicit code prior to distributing such code; however, Provider cannot guarantee that any code is free of illicit codes and other defects. During the term of a warranty period (if any), if it is determined that Illicit Code is present, then Provider will use commercially reasonable efforts to correct the affected code and if it cannot do so in a reasonable period of time, replace the affected code. Provider represents and warrants that there are no methods for gaining access to the code or other computer resources or data of UAB (such as a master access key, ID password, back door or trap door) other than as otherwise set forth, and Provider will not embed any device in the code or take any action to disrupt or terminate UAB’s operation of the code.

Examples of Illicit Code in a sentence

  • If Illicit Code is enacted and UC is damaged, Supplier will be responsible for all damages (including but not limited to consequential, incidental and indirect damages) sustained by UC up to the amount of three times the amount of the fees paid by UC to the Supplier pursuant to this Agreement.

  • Supplier represents and warrants that it will take commercially reasonable steps to promptly remove Illicit Code.

  • Supplier represents and warrants that the Goods and/or Services do not contain Illicit Code.

  • Supplier represents and warrants that even if Illicit Code is installed, SUPPLIER WILL NEVER UTILIZE THE ILLICIT CODE.

  • Supplier represents and warrants that if Illicit Code is installed on UC data or Information Resources, Supplier will immediately provide UC with written notice of the installation of such Illicit Code.


More Definitions of Illicit Code

Illicit Code means any hidden files, any automatically replicating, transmitting or activating computer program, any virus (or other malicious computer program), or any hardware-limiting or software-limiting function (including, but not limited to, any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.
Illicit Code means any computer instructions commonly known as computer viruses, anomalies or any other computer instructions which interfere with or prevent Quest Diagnostics from using the Software as contemplated by this Agreement, but does not include errors or bugs in the Software.
Illicit Code means any computer viruses, spyware, rootkits, ransomware, Trojan horses, worms, software bombs or similar malicious scripts or code; but excluding code designed to enable Filmbankmedia to verify compliance with or enforce the Service restrictions in these Terms and Conditions and the subscription restrictions in the Booking Confirmation;
Illicit Code means any computer instructions in the Software that can disable, destroy, or otherwise alter the software or hardware [***]
Illicit Code means any (i) illicit code, (ii) hidden files, (iii) automatically replicating, transmitting or activating code, (iv) virus about which Supplier knows or should have known, or (v) key, node lock, time-out or other Product-limiting or Service-limiting function, whether implemented by electronic or other means. INSTALLATION DATE shall mean the date, as specified in a Category Agreement or Transaction Agreement, by which all Components of the applicable Product shall be installed at the applicable designated Site.
Illicit Code means any program, routine, device or other undisclosed feature or hidden file, not referenced in the Documentation, including without limitation, a time bomb, virus, software lock, trojan horse, drop-dead device, worm, malicious logic or trap door, that is designed to delete, disable, deactivate, interfere with or otherwise harm the Software or Customer's other software, hardware, data, any transmitting or activating computer program, or any hardware-limiting, software-limiting or services-limiting function (including, but not limited to, any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.
Illicit Code. Motive strictly warrants that no program that Motive provides to HP will: (1) contain hidden files; (2) have any "time bomb"; (3) replicate, transmit, or activate itself without control of a person operating computing equipment on which it resides; (4) alter, damage, or erase any data or computer programs without control of a person operating the computing equipment on which it resides; or (5) contain any key, node lock, time-out or other function [whether implemented by electronic, mechanical or other means] which restricts or may restrict use or access to programs or data based on residency on a specific hardware configuration, frequency or duration of use, or other limiting criteria. If this warranty is breached, notwithstanding anything elsewhere in this Agreement to the contrary, Motive shall be in material breach of this Agreement.