Harmful Code definition

Harmful Code means any software intentionally designed to (i) disrupt, disable, harm, or impede operation, or (ii) impair operation based on the lapse of time, including but not limited to viruses, worms, time bombs, time locks, drop-dead devices, access codes, security keys, back doors, or trap door devices.
Harmful Code means any software, hardware or other technologies, devices or means, the purpose or effect of which is to: (a) permit unauthorized access to, or to destroy, disrupt, disable, encrypt, modify, copy, or otherwise harm or impede in any manner, any (i) computer, software, firmware, data, hardware, system or network, or (ii) any application or function of any of the foregoing or the integrity, use or operation of any data Processed thereby; or (b) prevent the State or any Authorized User from accessing or using the Services as intended by this Contract, and includes any virus, bug, trojan horse, worm, backdoor or other malicious computer code and any time bomb or drop dead device.
Harmful Code means any computer code or programming instructions that are intentionally constructed with the ability to damage or otherwise adversely affect computer programs, data files or hardware or gather information without the agreement or consent of the user.

Examples of Harmful Code in a sentence

  • The Acquired Companies have implemented commercially reasonable security, business continuity, and disaster recovery plans and arrangements that are tested on a periodic basis, including taking and storing back-up copies (both on- and off-site) of the IT Systems and follow appropriate procedures designed to prevent the introduction of Harmful Code and unauthorized access.


More Definitions of Harmful Code

Harmful Code means any: (a) virus, trojan horse, worm, backdoor or other software or hardware devices the effect of which is to permit unauthorized access to, or to disable, erase, or otherwise harm, any computer, systems or software; or (b) time bomb, drop dead device, or other software or hardware device designed to disable a computer program automatically with the passage of time or under the positive control of any Person, or otherwise prevent, restrict or impede the State's or any Authorized User's use of such software.
Harmful Code means any computer code, software routine, or programming device designed to (a) disable, disrupt, impair, delete, damage, corrupt, reprogram, recode or modify in any way a computer processing system, computer network, computer service, a deliverable for any of the foregoing, interface, data, files, software, storage media, or computer or electronic hardware or equipment (sometimes referred to as a “Trojan horse,” “worm,” “virus”, “preventative routine,” “disabling code,” or “cookie” devices); (b) impair in any way the operation of any of the foregoing based on the elapsing of a period of time, advancement of a particular date or other numeral (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices); or
Harmful Code means a virus, worm, “Trojan Horse”, or other code or routine that manifests contaminating or destructive properties that might damage, harm, detrimentally interfere with, or otherwise adversely affect a Deliverable, any Intellectual Property or the Infrastructure or any computer system, hardware, software, equipment, or services in connection with which the Deliverable or Intellectual Property is Used or any related data.
Harmful Code means any computer code, software routine, or programming device designed to (a) disable, disrupt, impair, delete, damage, corrupt, reprogram, recode or modify in any way a computer processing system, computer network, computer service, a deliverable for any of the foregoing, interface, data, files, software, storage media, or computer or electronic hardware or equipment (sometimes referred to as a "Trojan horse," "worm," "virus", "preventative routine," "disabling code," or "cookie" devices); (b) impair in any way the operation of any of the foregoing based on the elapsing of a period of time, advancement of a particular date or other numeral (sometimes referred to as "time bombs," "time locks," or "drop dead" devices); or (c) permit a non-authorized party to access, transmit or utilize, as appropriate, any computer processing system, computer network, computer service, deliverable for any of the foregoing, interface, data, files, software, storage media, or computer or electronic hardware or equipment without proper consent (sometimes referred to as "lockups," "traps," "access codes," or "trap door" devices); or (d) any other similar harmful or hidden procedures, routines or mechanisms.
Harmful Code means any software, hardware, or other technology, device, or means, including any virus, worm, malware, or other malicious computer code, the purpose or effect of which is to (a) permit unauthorized access to, or to destroy, disrupt, disable, distort, or otherwise harm or impede in any manner any (i) computer, software, firmware, hardware, system, or network; or (ii) any application or function of any of the foregoing or the security, integrity, confidentiality, or use of any data Processed thereby; or (b) prevent Customer or any Authorized User from accessing or using the Services or Provider Systems as intended by this Agreement. Harmful Code does not include any Provider Disabling Device.
Harmful Code means any program routine, device or other feature, that is not documented in the Company Productstechnical documentation, that is designed to delete, disable, interfere with, perform unauthorized modifications to, or provide unauthorized access to any Software or Company Product.
Harmful Code means any software, hardware or other technology, device or means, including any virus, worm, malware or other malicious computer code, the purpose or effect of which is to: (a) permit unauthorized access to, or to destroy, disrupt, disable, distort or otherwise harm or impede in any manner any (i) computer, software, firmware, hardware, system or network or (ii) any application or function of any of the foregoing or the security, integrity, confidentiality or use of any data Processed thereby; or (b) prevent Licensee or any Authorized User from accessing or using the Services or NCIT Systems as intended by this Agreement. “Harmful Code” does not include any NCIT Disabling Device.