{"component": "definition", "props": {"groups": [{"samples": [{"hash": "f6bYUnso7Ot", "uri": "/contracts/f6bYUnso7Ot#malicious-code", "label": "Reseller Agreement (Brand Engagement Network Inc.)", "score": 36.8576316833, "published": true}, {"hash": "5phfP45Ra99", "uri": "/contracts/5phfP45Ra99#malicious-code", "label": "Master Purchase Agreement", "score": 36.246673584, "published": true}, {"hash": "9NNokF83jRw", "uri": "/contracts/9NNokF83jRw#malicious-code", "label": "Software Subscription Agreement", "score": 36.2457466125, "published": true}], "snippet": "means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.", "snippet_links": [], "size": 1259, "hash": "591bfc4bebd4323781a693a2eefd930f", "id": 1}, {"samples": [{"hash": "bkSPapiPXIr", "uri": "/contracts/bkSPapiPXIr#malicious-code", "label": "Master Agreement", "score": 36.1003417969, "published": true}, {"hash": "ddY9OfVosAC", "uri": "/contracts/ddY9OfVosAC#malicious-code", "label": "Standard Agreement", "score": 36.0596084595, "published": true}, {"hash": "96dB5BGY4Jp", "uri": "/contracts/96dB5BGY4Jp#malicious-code", "label": "Master Agreement", "score": 35.8738555908, "published": true}], "snippet": "means any (i) program routine, device or other feature or hidden file, including any time bomb, virus, software lock, trojan horse, drop-dead device, worm, malicious logic or trap door that may delete, disable, deactivate, interfere with or otherwise harm any of the Judicial Branch Entities\u2019 hardware, software, data or other programs, and (ii) hardware-limiting, software-limiting or services-limiting function (including any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.", "snippet_links": [{"key": "any-time", "type": "definition", "offset": [81, 89]}, {"key": "software-lock", "type": "clause", "offset": [103, 116]}, {"key": "trojan-horse", "type": "definition", "offset": [118, 130]}, {"key": "judicial-branch-entities", "type": "clause", "offset": [267, 291]}, {"key": "other-programs", "type": "clause", "offset": [321, 335]}], "size": 216, "hash": "3a4e2d1a8bc3f0b0d0a632ecabf9cf8f", "id": 2}, {"samples": [{"hash": "9gn8O8Siwm5", "uri": "/contracts/9gn8O8Siwm5#malicious-code", "label": "Share Trading Terms and Conditions", "score": 25.3189601898, "published": true}, {"hash": "ksJ4aMPNcMt", "uri": "/contracts/ksJ4aMPNcMt#malicious-code", "label": "Share Trading Terms and Conditions", "score": 24.8713207245, "published": true}, {"hash": "c82YTlzSNYL", "uri": "https://www.filesandimages.com/Brand/CityIndexAustralia/pdfs/SFA-Pro-Client-Terms-and-Conditions.pdf", "label": "www.filesandimages.com", "score": 20.3416519165, "published": false}], "snippet": "means any computer virus, Trojan horse, worm, time bomb or similar code or component designed to disable, damage, disrupt, manipulate, amend or alter the operations of, permit unauthorised access to, or ease, destroy or modify any software, hardware, network or other technology.", "snippet_links": [{"key": "computer-virus", "type": "clause", "offset": [10, 24]}, {"key": "trojan-horse", "type": "definition", "offset": [26, 38]}, {"key": "the-operations", "type": "clause", "offset": [150, 164]}, {"key": "access-to", "type": "definition", "offset": [189, 198]}, {"key": "other-technology", "type": "clause", "offset": [262, 278]}], "size": 78, "hash": "4faccee0d1a039656844ced76218ea7c", "id": 3}, {"samples": [{"hash": "1Lqx2mTFZV7", "uri": "/contracts/1Lqx2mTFZV7#malicious-code", "label": "Master Services Agreement (iShares Staked Ethereum Trust ETF)", "score": 37.1286773682, "published": true}, {"hash": "4EexeRhuIfq", "uri": "/contracts/4EexeRhuIfq#malicious-code", "label": "Master Services Agreement (BlackRock ETF Trust)", "score": 35.5242996216, "published": true}, {"hash": "fN8te0bSK5M", "uri": "/contracts/fN8te0bSK5M#malicious-code", "label": "Master Services Agreement (iShares Ethereum Trust)", "score": 35.4065704346, "published": true}], "snippet": "means any code, program, or sub-program whose known or intended purpose is to damage or interfere with the operation of the computer system containing the code, program or sub-program, or to halt, disable or interfere with the operation of the software, code, program, or sub-program, itself.", "snippet_links": [{"key": "intended-purpose", "type": "clause", "offset": [55, 71]}, {"key": "the-operation", "type": "clause", "offset": [103, 116]}, {"key": "the-computer-system", "type": "clause", "offset": [120, 139]}, {"key": "the-code", "type": "clause", "offset": [151, 159]}, {"key": "operation-of-the-software", "type": "clause", "offset": [227, 252]}], "size": 68, "hash": "679a5521da1ba3fcccaac62752528d2a", "id": 4}, {"samples": [{"hash": "g5OsCoCcCm8", "uri": "/contracts/g5OsCoCcCm8#malicious-code", "label": "Stock Purchase Agreement (OpenLocker Holdings, Inc.)", "score": 36.5345649719, "published": true}, {"hash": "8A0l1Bp9IbA", "uri": "/contracts/8A0l1Bp9IbA#malicious-code", "label": "Investment Agreement (Conns Inc)", "score": 34.9685134888, "published": true}, {"hash": "jVy7dM4VvEp", "uri": "/contracts/jVy7dM4VvEp#malicious-code", "label": "Merger Agreement (P&f Industries Inc)", "score": 34.7796020508, "published": true}], "snippet": "means any \u201cback door,\u201d \u201cdrop dead device,\u201d \u201ctime bomb,\u201d \u201cTrojan horse,\u201d \u201cvirus,\u201d \u201cransomware,\u201d or \u201cworm\u201d (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, interfering with or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user\u2019s consent.", "snippet_links": [{"key": "back-door", "type": "definition", "offset": [11, 20]}, {"key": "trojan-horse", "type": "definition", "offset": [57, 69]}, {"key": "software-industry", "type": "definition", "offset": [151, 168]}, {"key": "capable-of", "type": "definition", "offset": [221, 231]}, {"key": "operation-of", "type": "definition", "offset": [369, 381]}, {"key": "access-to", "type": "definition", "offset": [409, 418]}, {"key": "computer-system", "type": "clause", "offset": [422, 437]}, {"key": "other-device", "type": "definition", "offset": [452, 464]}, {"key": "the-user", "type": "definition", "offset": [563, 571]}], "size": 67, "hash": "a1278582baa1515f1afa9a979f7fa43d", "id": 5}, {"samples": [{"hash": "dZDD0B5N1Ep", "uri": "/contracts/dZDD0B5N1Ep#malicious-code", "label": "Licensed Material and Hosted Services Agreement", "score": 27.039648056, "published": true}, {"hash": "8qFHJlxy9Yu", "uri": "/contracts/8qFHJlxy9Yu#malicious-code", "label": "Licensed Material and Hosted Services Agreement", "score": 24.1348400116, "published": true}, {"hash": "bQlXZyZ8oRd", "uri": "/contracts/bQlXZyZ8oRd#malicious-code", "label": "Licensed Material and Hosted Services Agreement", "score": 23.6269683838, "published": true}], "snippet": "means any virus, worm, time bomb, Trojan horse or other code, file, script, agent, software program or device that may prevent, impair, or otherwise adversely affect the operation of any computer software, hardware or network, any telecommunications service, equipment or network or any other service or device; prevent, impair or otherwise adversely affect access to or the operation of any program or data, including the reliability of any program or data; or adversely affect the User experience.", "snippet_links": [{"key": "trojan-horse", "type": "definition", "offset": [34, 46]}, {"key": "software-program", "type": "definition", "offset": [83, 99]}, {"key": "adversely-affect", "type": "definition", "offset": [149, 165]}, {"key": "operation-of", "type": "definition", "offset": [170, 182]}, {"key": "computer-software", "type": "clause", "offset": [187, 204]}, {"key": "telecommunications-service", "type": "definition", "offset": [231, 257]}, {"key": "other-service", "type": "definition", "offset": [287, 300]}, {"key": "access-to", "type": "definition", "offset": [358, 367]}, {"key": "user-experience", "type": "definition", "offset": [483, 498]}], "size": 57, "hash": "c201287abacb64735e6c860dcf7de83e", "id": 6}, {"samples": [{"hash": "a2MyrjExQs7", "uri": "https://srghoa.com/wp-content/uploads/2023/12/NOW-Colorado-Full-Policy-2024-2025.pdf", "label": "srghoa.com", "score": 19.6627864838, "published": false}, {"hash": "WYGhbgxxdU", "uri": "https://www.oamic.com/wp-content/uploads/2024/03/OAMIC-2020-Cyber-Liability-Data-Breach-Language.pdf", "label": "www.oamic.com", "score": 18.7771949768, "published": false}, {"hash": "7UA5vDgR1Iv", "uri": "https://www.propertyprosteam.com/wp-content/uploads/2021/08/MR-Policy-Renewal.pdf", "label": "www.propertyprosteam.com", "score": 10.5400409698, "published": false}], "snippet": "means any virus, Trojan horse, worm or any other similar software program, code or script intentionally designed to insert itself into computer memory or onto a computer disk and spread itself from one computer to another.", "snippet_links": [{"key": "trojan-horse", "type": "definition", "offset": [17, 29]}, {"key": "software-program", "type": "definition", "offset": [57, 73]}, {"key": "computer-disk", "type": "clause", "offset": [161, 174]}], "size": 56, "hash": "3e86eb1a2d50808f6c2b92d2e7963ac5", "id": 7}, {"samples": [{"hash": "eeyqDywbXRv", "uri": "/contracts/eeyqDywbXRv#malicious-code", "label": "Stock Purchase Agreement (BALL Corp)", "score": 33.8309364319, "published": true}, {"hash": "iAH2wxvRflL", "uri": "/contracts/iAH2wxvRflL#malicious-code", "label": "Stock Purchase Agreement (BALL Corp)", "score": 33.5817947388, "published": true}, {"hash": "bN3hZA6p2BR", "uri": "/contracts/bN3hZA6p2BR#malicious-code", "label": "Stock Purchase Agreement (BALL Corp)", "score": 33.3463363647, "published": true}], "snippet": "means any surreptitious computer code or other software routines or hardware components intentionally designed to permit unauthorized access to, disable or erase software, hardware or data, or to perform any other similar type of unauthorized activities (including viruses, Trojan horses, worms or other code, designs or routines (as these terms are commonly used in the computer software industry)).", "snippet_links": [{"key": "computer-code", "type": "definition", "offset": [24, 37]}, {"key": "other-software", "type": "definition", "offset": [41, 55]}, {"key": "hardware-components", "type": "definition", "offset": [68, 87]}, {"key": "access-to", "type": "definition", "offset": [134, 143]}, {"key": "type-of", "type": "definition", "offset": [222, 229]}, {"key": "unauthorized-activities", "type": "clause", "offset": [230, 253]}, {"key": "these-terms", "type": "clause", "offset": [334, 345]}, {"key": "software-industry", "type": "definition", "offset": [380, 397]}], "size": 56, "hash": "1a06b72a6e63c7619400a6a8202d3a31", "id": 8}, {"samples": [{"hash": "jCsJx0aQCUL", "uri": "/contracts/jCsJx0aQCUL#malicious-code", "label": "Agreement and Plan of Merger (ZeroFox Holdings, Inc.)", "score": 34.2895278931, "published": true}, {"hash": "72PymWyJMA0", "uri": "/contracts/72PymWyJMA0#malicious-code", "label": "Agreement and Plan of Merger (Ideanomics, Inc.)", "score": 34.0841903687, "published": true}, {"hash": "hn0TPJHtS", "uri": "/contracts/hn0TPJHtS#malicious-code", "label": "Merger Agreement (Ideanomics, Inc.)", "score": 32.671459198, "published": true}], "snippet": "has the meaning set forth in Section 3.12(l).", "snippet_links": [], "size": 43, "hash": "93ad3c6b79e6786cff83a7f74431a1e7", "id": 9}, {"samples": [{"hash": "9Lg8Aynzulm", "uri": "/contracts/9Lg8Aynzulm#malicious-code", "label": "Merger Agreement (Electro Sensors Inc)", "score": 37.3175888062, "published": true}, {"hash": "dgoOIOFytvu", "uri": "/contracts/dgoOIOFytvu#malicious-code", "label": "Merger Agreement (Enzo Biochem Inc)", "score": 36.4770698547, "published": true}, {"hash": "7XQNDjMrWdY", "uri": "/contracts/7XQNDjMrWdY#malicious-code", "label": "Merger Agreement (Smartsheet Inc)", "score": 36.058177948, "published": true}], "snippet": "means any (i) \u201cback door,\u201d \u201cdrop dead device,\u201d \u201ctime bomb,\u201d \u201cTrojan horse,\u201d \u201cvirus,\u201d \u201cransomware,\u201d or \u201cworm\u201d (as such terms are commonly understood in the software industry), or (ii) other code designed or intended to have any of the following functions: (a) disrupting, disabling, harming, interfering with or otherwise impeding in any manner the operation of, or providing unauthorized access to, a Company IT Asset on which such code is stored or installed; or (b) damaging or destroying any data or file without the user\u2019s consent.", "snippet_links": [{"key": "back-door", "type": "definition", "offset": [15, 24]}, {"key": "trojan-horse", "type": "definition", "offset": [61, 73]}, {"key": "software-industry", "type": "definition", "offset": [155, 172]}, {"key": "operation-of", "type": "definition", "offset": [348, 360]}, {"key": "access-to", "type": "definition", "offset": [388, 397]}, {"key": "it-asset", "type": "definition", "offset": [409, 417]}, {"key": "the-user", "type": "definition", "offset": [516, 524]}], "size": 37, "hash": "81d1319742143cb16528c68d30f99e7c", "id": 10}], "next_curs": "ClsSVWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjcLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIXbWFsaWNpb3VzLWNvZGUjMDAwMDAwMGEMogECZW4YACAA", "definition": {"snippet": "means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.", "title": "Malicious Code", "size": 2783, "id": "malicious-code", "examples": ["The Company IT Assets are adequate in all material respects for, and perform the functions necessary to carry on the conduct of the Company\u2019s businesses, and, to the Company\u2019s Knowledge, the Company IT Assets and the Company Products are free of <strong>Malicious Code</strong>."], "related": [["malicious-software", "Malicious Software", "Malicious Software"], ["erasmus-code", "Erasmus Code", "Erasmus Code"], ["access-code", "Access Code", "Access Code"], ["viruses", "Viruses", "Viruses"], ["unauthorized-code", "Unauthorized Code", "Unauthorized Code"]], "related_snippets": [], "updated": "2026-05-17T04:23:05+00:00"}, "json": true, "cursor": ""}}