Malicious Code definition
Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.
Malicious Code means any (i) program routine, device or other feature or hidden file, including any time bomb, virus, software lock, trojan horse, drop-dead device, worm, malicious logic or trap door that may delete, disable, deactivate, interfere with or otherwise harm any of the Judicial Branch Entities’ hardware, software, data or other programs, and (ii) hardware-limiting, software-limiting or services-limiting function (including any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.
Malicious Code means any computer virus, Trojan horse, worm, time bomb or similar code or component designed to disable, damage, disrupt, manipulate, amend or alter the operations of, permit unauthorised access to, or ease, destroy or modify any software, hardware, network or other technology.
Examples of Malicious Code in a sentence
The Customer will not introduce any Malicious Code, and Customer will not allow anyone it allows to use the Services to intentionally or unintentionally install any Malicious Code or any other program or device which in any manner interferes with CoinList’s Services or CoinList’s use or ownership of its software or intellectual property rights or restricts CoinList from accessing its data files or in any way interferes with the transaction of CoinList’s business.
The Company IT Assets are adequate for, and perform the functions necessary to carry on the conduct of their respective businesses, and the Company IT Assets and the Company Products are free of Malicious Code.
More Definitions of Malicious Code
Malicious Code means any code, program, or sub-program whose known or intended purpose is to damage or interfere with the operation of the computer system containing the code, program or sub-program, or to halt, disable or interfere with the operation of the software, code, program, or sub-program, itself.
Malicious Code means any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” “ransomware,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, interfering with or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.
Malicious Code means any virus, Trojan horse, worm or any other similar software program, code or script intentionally designed to insert itself into computer memory or onto a computer disk and spread itself from one computer to another.
Malicious Code means any surreptitious computer code or other software routines or hardware components intentionally designed to permit unauthorized access to, disable or erase software, hardware or data, or to perform any other similar type of unauthorized activities (including viruses, Trojan horses, worms or other code, designs or routines (as these terms are commonly used in the computer software industry)).
Malicious Code means software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system, and may include a virus, worm, Trojan horse, or other code-based entity that infects a host.
Malicious Code has the meaning set forth in Section 3.12(l).
Malicious Code means any (i) “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” “ransomware,” or “worm” (as such terms are commonly understood in the software industry), or (ii) other code designed or intended to have any of the following functions: (a) disrupting, disabling, harming, interfering with or otherwise impeding in any manner the operation of, or providing unauthorized access to, a Company IT Asset on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.