time bomb, definition

time bomb,. Trojan horse," "virus," or "worm" (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user's consent.
time bomb,. Trojan horse," "worm," "drop dead device," "virus" (as these terms are commonly used in the computer software industry), or other software routines designed to permit unauthorized access, to disable or erase software or data, or to perform any other similar type of functions.
time bomb,. Trojan horse,” “virus,” “worm,” “spyware” or “adware” (as such terms are commonly understood in the software industry) or any other code designed or intended to have or capable of performing or facilitating, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed or (ii) compromising the privacy or data security of a user or damaging or destroying any data or file without the user’s consent (collectively, “Malicious Code”). The Company has implemented and maintains reasonable measures designed to prevent the introduction of Malicious Code into Company Software, including firewall protections and regular virus scans and for taking and storing on-site and off-site back-up copies of Company Software.

More Definitions of time bomb,

time bomb,. Trojan horse,” “virus” or “worm” (as such terms are commonly understood in the software industry) or any other disrupting, disabling, harming or malicious code.
time bomb,. Trojan horse,” “virus,” “worm,” “spyware” or “adware” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing or facilitating, any of the following functions: (i) disrupting, disabling, harming, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed or (ii) compromising the privacy or data security of a user or damaging or destroying any data or file without the user’s consent (collectively, “Malicious Code”). Seller implements commercially reasonable measures designed to prevent the introduction of Malicious Code into Company Software, including firewall protections and regular virus scans.
time bomb,. Trojan horse,” “virus,” “worm,” “spyware” or “adware” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing or facilitating, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed or (ii) compromising the privacy or data security of a user or damaging or destroying any data or file without the user’s consent.
time bomb,. Trojan horse," "virus," or "worm" (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging or destroying any data or file without the user's consent. No source code for any Larscom Software has been delivered, licensed, or made available to any escrow agent or other person or entity. To the knowledge of Larscom, no event has occurred, and no circumstance or condition exists, that (with or without notice or lapse of time) will, or could reasonably be expected to, result in the delivery, license, or disclosure of the source code for any Larscom Software to any other person.
time bomb,. Trojan horse," "virus," "worm," "spyware" or "adware" (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing or facilitating, any of the following functions: disrupting, disabling, harming, or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed (collectively, "Malicious Code"). The Company Group implements reasonable measures designed to prevent the introduction of Malicious Code into Company Proprietary Software and Business Systems (if within the Company's control), including firewall protections and regular virus scans.
time bomb,. Trojan horse,” “virus,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (i) disrupting, disabling, harming or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (ii) damaging, destroying, taking, appropriating, or exfiltrating any data or file without the user’s consent (collectively, “Harmful Code”). There has not been any breakdown, malfunction, error, defect, or failure of any Systems.
time bomb,. “malware,” “malicious code,” “Trojan horse,” “worm,” “drop dead device,” “virus” or other software routines or hardware components designed to permit unauthorized access or to disable or erase software, hardware or data. “WARN Act” has the meaning set forth in Section 3.23(g). “Working Capital” means without duplication, total current assets of the Company (including accounts receivable, prepaid expenses (other than the Prepaid Deposit Amount) but excluding Tax assets, security deposits, the Prepaid Deposit Amount, cash and cash equivalents, less total current liabilities of the Company (including accounts payable, accrued or deferred expenses, payroll liabilities, Tax liabilities, deferred revenue, deferred income, and dividends payable or other similar obligations, but excluding Transaction Expenses and Indebtedness, in each case as determined on a basis consistent with the Company’s past practices and historical procedures used in preparing the Company Financial Statements. A sample calculation of Working Capital is attached hereto as Schedule 1.1(e). “Working Capital Adjustment Amount” has the meaning set forth in Section 2.7(c). “Working Capital Target” means $415,000. 2. The Transaction.