Common use of No Defects Clause in Contracts

No Defects. The Company Products, Company Data, and the Company Intellectual Property are free from material defects, inaccuracies, data integrity defects and bugs, and substantially conforms to the applicable specifications, documentation, and samples therefor. The software included in the Company Products or the Company Intellectual Property does not contain (i) any clock, timer, counter, or other limiting or disabling code, design, routine, or any viruses, Trojan horses, or other disabling or disruptive codes or commands designed to cause such software to be erased, made inoperable, or otherwise rendered incapable of performing in accordance with its performance specifications and descriptions or otherwise limit or restrict the Company’s, any Company Subsidiary’s or any Person’s ability to use such software, the Company Product or the Company Intellectual Property, including after a specific or random number of years or copies, or (ii) any back doors or other undocumented access mechanism allowing unauthorized access to, and viewing, manipulation, modification, or other changes to, such software.

Appears in 1 contract

Sources: Agreement and Plan of Merger (Soundhound Ai, Inc.)

No Defects. The Company Products, Company Data, Products and the Company Intellectual Property Acquired Companies’ Proprietary Information and Technology are free from material defects, inaccuracies, data integrity defects and bugs, and substantially conforms to the applicable specifications, documentation, and samples therefor. The software included in the Company Products or and the Company Intellectual Property does Acquired Companies’ Proprietary Information and Technology do not and will not contain (ia) any clock, timer, counter, or other limiting or disabling code, design, routine, or any viruses, Trojan horses, or other disabling or disruptive codes or commands designed to that would cause such software to be erased, made inoperable, or otherwise rendered incapable of performing in accordance with its performance specifications and descriptions or otherwise limit or restrict the any Acquired Company’s, any Company Subsidiary’s or any Person’s ability to use such software, software or the Company Product or the Company Intellectual Property, including after a specific or random number of years or copies, or (iib) any back doors or other undocumented access mechanism allowing unauthorized access to, and viewing, manipulation, modification, or other changes to, such softwaresoftware or Company Product.

Appears in 1 contract

Sources: Merger Agreement (Bill.com Holdings, Inc.)

No Defects. The Company Products, Company Data, and the Company Intellectual Property Company’s Proprietary Information and Technology are free from material defects, inaccuracies, data integrity defects and bugs, and substantially conforms conform to the applicable specifications, documentation, and samples therefor. The software included in the Company Products or the Company Intellectual Property Company’s Proprietary Information and Technology does not contain (ia) any clock, timer, counter, or other limiting or disabling code, design, routine, or any viruses, Trojan horses, or other disabling or disruptive codes or commands designed to that would cause such software to be erased, made inoperable, or otherwise rendered incapable of performing in accordance with its performance specifications and descriptions or otherwise limit or restrict the Company’s, any Company Subsidiary’s or any Person’s ability to use such software, the Company Product or the Company Intellectual PropertyProprietary Information and Technology, including after a specific or random number of years or copies, or (iib) any back doors or other undocumented access mechanism allowing unauthorized access to, and viewing, manipulation, modification, or other changes to, such software.

Appears in 1 contract

Sources: Merger Agreement (Sentinel Labs, Inc.)

No Defects. The Company Products, Company Data, Products and the Company Intellectual Property are Acquired Companies’ Proprietary Information and Technology is free from material defects, inaccuracies, data integrity defects and bugs, and substantially conforms to the applicable specifications, documentation, and samples therefor. The software included in the Company Products or the Company Intellectual Property Companies’ Proprietary Information and Technology does not contain (ia) any clock, timer, counter, or other limiting or disabling code, design, routine, or any viruses, Trojan horses, or other disabling or disruptive codes or commands designed to that would cause such software to be erased, made inoperable, or otherwise rendered incapable of performing in accordance with its performance specifications and descriptions or otherwise limit or restrict the any Acquired Company’s, any Company Subsidiary’s or any Person’s ability to use such software, the Company Product or the Company Intellectual PropertyProprietary Information and Technology, including after a specific or random number of years or copies, copies or (iib) any back doors or other undocumented access mechanism allowing unauthorized access to, and viewing, manipulation, modification, or other changes to, such software.

Appears in 1 contract

Sources: Merger Agreement (Bill.com Holdings, Inc.)

No Defects. The Company Products, Company Data, and the Company Intellectual Property Company’s Proprietary Information and Technology are free from material defects, inaccuracies, data integrity defects and bugs, and substantially conforms conform to the applicable specifications, documentation, and samples therefor. The software included in the Company Products or the Company Intellectual Property Company’s Proprietary Information and Technology does not and shall not contain (ia) any clock, timer, counter, or other limiting or disabling code, design, routine, or any viruses, Trojan horses, or other disabling or disruptive codes or commands designed to that would cause such software to be erased, made inoperable, or otherwise rendered incapable of performing in accordance with its performance specifications and descriptions or otherwise limit or restrict the Company’s, any Company Subsidiary’s or any Person’s ability to use such software, the Company Product or the Company Intellectual PropertyProprietary Information and Technology, including after a specific or random number of years or copies, or (iib) any back doors or other undocumented access mechanism allowing unauthorized access to, and viewing, manipulation, modification, or other changes to, such software.

Appears in 1 contract

Sources: Merger Agreement (Soundhound Ai, Inc.)