Malicious Code definition

Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.
Malicious Code means any (i) program routine, device or other feature or hidden file, including any time bomb, virus, software lock, trojan horse, drop-dead device, worm, malicious logic or trap door that may delete, disable, deactivate, interfere with or otherwise harm any of the Judicial Branch Entities’ hardware, software, data or other programs, and (ii) hardware-limiting, software-limiting or services-limiting function (including any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.
Malicious Code means any computer virus, Trojan horse, worm, time bomb or similar code or component designed to disable, damage, disrupt, manipulate, amend or alter the operations of, permit unauthorised access to, or ease, destroy or modify any software, hardware, network or other technology.

Examples of Malicious Code in a sentence

  • Except as would not reasonably be expected to be material, individually or in the aggregate, to the Company and its Subsidiaries (taken as a whole), to the Knowledge of the Company, the IT Assets do not contain any Malicious Code.

  • The Company and its Subsidiaries have taken reasonable steps and implemented reasonable safeguards, consistent with industry practices, to protect the IT Assets from any unauthorized access or use and designed to ensure that they do not contain any Malicious Code.


More Definitions of Malicious Code

Malicious Code means any code, program, or sub-program whose known or intended purpose is to damage or interfere with the operation of the computer system containing the code, program or sub-program, or to halt, disable or interfere with the operation of the software, code, program, or sub-program, itself.
Malicious Code means any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” “ransomware,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, interfering with or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.
Malicious Code means any virus, Trojan horse, worm or any other similar software program, code or script intentionally designed to insert itself into computer memory or onto a computer disk and spread itself from one computer to another.
Malicious Code means computer instructions or software code whose purpose is to disrupt, damage or interfere with the Services or any Party’s computer or communications systems, networks, facilities or equipment, or to provide unauthorized access to such systems, networks, facilities or equipment. Examples of Malicious Code include, without limitation, any code containing viruses, Trojan horses, worms, traps, spyware, back doors, disabling devices or similar destructive code or code that self-replicates.
Malicious Code means any virus, worm, time bomb, Trojan horse or other code, file, script, agent, software program or device that may prevent, impair, or otherwise adversely affect the operation of any computer software, hardware or network, any telecommunications service, equipment or network or any other service or device; prevent, impair or otherwise adversely affect access to or the operation of any program or data, including the reliability of any program or data; or adversely affect the User experience.
Malicious Code has the meaning set forth in Section 3.12(l).
Malicious Code means any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” “worm,” “spyware” (as such terms are commonly understood in the software industry) or any other code designed to have any of the following functions: (a) disrupting, disabling or harming the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed or (b) compromising the privacy or data security of a user or damaging or destroying any data or file, in each case, without authorization and without the applicable user’s consent.