Trojan Horses definition

Trojan Horses means a computer program containing a hidden function that causes damage to other programs while appearing to perform a valid function.
Trojan Horses. “back doors”, “trap doors”, “worms”, viruses, bugs, faults or other devices or effects that (A) enable or assist any person to access without authorization the IT Assets, or (B) otherwise significantly adversely affect the functionality of the IT Assets. To the Company’s Knowledge, no person has gained unauthorized access to the IT Assets. The Company and its Subsidiaries maintain and utilize the IT Assets in accordance with all applicable licenses, agreements and other Contracts. The Company and its Subsidiaries have implemented and maintain reasonable backup, security and disaster recovery technology. The Company and its Subsidiaries take reasonable measures adequate to comply with all applicable Law and their respective contractual and privacy commitments, to protect the confidentiality of customer financial and other data.
Trojan Horses backdoors, "trap doors", "worms", viruses or other similar devices or effects that (A) enable any Person to access such computer systems without authorization or (B) otherwise hinder the material functionality of such computer systems. To the knowledge of the Seller, the Company and the Subsidiary have taken all steps and implemented procedures necessary to ensure, so far as commercially reasonably possible, that such systems are free from such devices and effects and will continue to take such steps until the Closing Date. All material computer software that is Owned Intellectual Property has been exclusively developed either (A) internally by employees of the Company or the Subsidiary working within the scope of their employment or (B) by third parties pursuant to written work made for hire and assignment agreements placing ownership of such computer software with the Company or the Subsidiary. True and complete copies of all such agreements have been provided to the Buyer.

Examples of Trojan Horses in a sentence

  • Licensor warrants that the licensed product as delivered by Licensor does not contain any viruses, worms, Trojan Horses, or other malicious or destructive code to allow unauthorized intrusion upon, disabling of, or erasure of the licensed products (each a “Virus”).

  • The Licensor warrants that the Licensed Products as delivered by the Licensor does not contain any viruses, worms, Trojan Horses, or other malicious or destructive code to allow unauthorized intrusion upon, disabling of, or erasure of the Licensed Products (each a “Virus”).

  • Mails, Code Or Files Which Contain Computer Viruses Or Corrupted Data Or Trojan Horses Or Tools Which Compromise The Security Of Web Sites Or User Data.

  • This software must (i) be configured to continuously monitor the systems and files for characteristics of viruses, worms, spyware, and Trojan Horses; (ii) be capable of generating detailed audit logs; and (iii) be installed in auto-protect, full-time, or real-time mode.

  • Licensor warrants that the Licensed Product as delivered by Licensor does not contain any viruses, worms, Trojan Horses, or other malicious or destructive code to allow unauthorized intrusion upon, disabling of, or erasure of the Licensed Products (each a “Virus”).

  • You may not knowingly, willfully, or negligently incorporate any malicious or harmful code, viruses, Trojan Horses, worms, time bombs, cancelbots, or other malware in your Developer Software.

  • Code Or Files Which Contain Computer Viruses Or Corrupted Data Or Trojan Horses Or Tools Which Compromise The Security Of Web Sites Or User Data.

  • We use industry standard practices to avoid the inclusion of any program, routine, subroutine, or data (including malicious software or “malware,” viruses, worms, and Trojan Horses) in applications running within Genesys services.

  • This includes but is not limited to Trojan Horses, Worms and Time or Logic Bombs.

  • Distributing information regarding the creation of and sending Internet viruses, worms, Trojan Horses, pinging, flooding, mailbombing, or denial of service attacks.