Malicious Code definition
Malicious Code means viruses, worms, time bombs, Trojan horses and other harmful or malicious code, files, scripts, agents or programs.
Malicious Code means any (i) program routine, device or other feature or hidden file, including any time bomb, virus, software lock, trojan horse, drop-dead device, worm, malicious logic or trap door that may delete, disable, deactivate, interfere with or otherwise harm any of the Judicial Branch Entities’ hardware, software, data or other programs, and (ii) hardware-limiting, software-limiting or services-limiting function (including any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.
Malicious Code means any computer virus, Trojan horse, worm, time bomb or similar code or component designed to disable, damage, disrupt, manipulate, amend or alter the operations of, permit unauthorised access to, or ease, destroy or modify any software, hardware, network or other technology.
Examples of Malicious Code in a sentence
Seller and Seller Affiliates have taken commercially reasonable steps designed to minimize the introduction of viruses, vulnerabilities, and other contaminants likely to disrupt, damage, or interfere with the operation or availability of the IT Systems or security of Personal Data (“Malicious Code”), and the IT Systems do not contain any Malicious Code that would be material to the Business.
More Definitions of Malicious Code
Malicious Code means any code, program, or sub-program whose known or intended purpose is to damage or interfere with the operation of the computer system containing the code, program or sub-program, or to halt, disable or interfere with the operation of the software, code, program, or sub-program, itself.
Malicious Code means any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” “ransomware,” or “worm” (as such terms are commonly understood in the software industry) or any other code designed or intended to have, or capable of performing, any of the following functions: (a) disrupting, disabling, harming, interfering with or otherwise impeding in any manner the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.
Malicious Code means any surreptitious computer code or other software routines or hardware components intentionally designed to permit unauthorized access to, disable or erase software, hardware or data, or to perform any other similar type of unauthorized activities (including viruses, Trojan horses, worms or other code, designs or routines (as these terms are commonly used in the computer software industry)).
Malicious Code means any virus, Trojan horse, worm or any other similar software program, code or script intentionally designed to insert itself into computer memory or onto a computer disk and spread itself from one computer to another.
Malicious Code has the meaning set forth in Section 3.12(l).
Malicious Code means any (i) “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” “ransomware,” or “worm” (as such terms are commonly understood in the software industry), or (ii) other code designed or intended to have any of the following functions: (a) disrupting, disabling, harming, interfering with or otherwise impeding in any manner the operation of, or providing unauthorized access to, a Company IT Asset on which such code is stored or installed; or (b) damaging or destroying any data or file without the user’s consent.
Malicious Code means any “back door,” “drop dead device,” “time bomb,” “Trojan horse,” “virus,” “worm,” “spyware” (as such terms are commonly understood in the software industry) or any other code designed to have any of the following functions: (a) disrupting, disabling or harming the operation of, or providing unauthorized access to, a computer system or network or other device on which such code is stored or installed or (b) compromising the privacy or data security of a user or damaging or destroying any data or file, in each case, without authorization and without the applicable user’s consent.