Illicit Code definition

Illicit Code means: (1) Any code UC would not reasonably expect to be present or operating; (2) Hidden software or functionality with adverse or undesired actions or consequences; (3) Code that replicates or transmits Institutional Information or activates operating systems or other similar services without the express knowledge and approval of UC; (4) Code that alters, damages, or erases any Institutional Information or software without the express knowledge and approval of UC; or (5) Code or apparatus that functions in any way as a: key lock, node lock, time-out, “back door,” “trap door,” “booby trap,” “dead drop device,” “data scrambling device,” or other function, regardless of how it is implemented, which is intended to alter or restrict the use of or access to any Institutional Information and/or IT Resources.
Illicit Code means any hidden files, any automatically replicating, transmitting or activating computer program, any virus (or other malicious computer program), or any hardware-limiting or software-limiting function (including, but not limited to, any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.
Illicit Code means any computer instructions commonly known as computer viruses, anomalies or any other computer instructions which interfere with or prevent Quest Diagnostics from using the Software as contemplated by this Agreement, but does not include errors or bugs in the Software.

Examples of Illicit Code in a sentence

Should Supplier learn of the presence of Illicit Code, Supplier will promptly provide UC with written notice explaining the scope and associated risk.


More Definitions of Illicit Code

Illicit Code means any computer instructions in the Software that are not intended to provide the functionality described in the Software’s Documentation and that interfere with Motorola’s use or right to quiet enjoyment of its license to the Software or that interfere with or prevent Motorola’s use of the Software as provided in this Agreement. Illicit Code includes what is commonly known as computer viruses, Trojan Horses, self-destruction mechanisms, copy protection schemes, and such other computer instructions that can disable, destroy, or otherwise alter the software or hardware on which the Software executes; or reveal any data or other information accessed through or processed by the Software. Illicit Code shall also include any vulnerabilities that allow unauthorized destruction of, access to or control of i) the Products, ii) other elements of a system that include the Products or iii) any information residing on the Products or other elements of a system that include the Products.
Illicit Code is defined as any harmful or hidden programs or data incorporated therein that destroys or impairs the delivered code, thereby inhibiting or preventing UAB from using the code as warranted. Provider uses commercially available software to detect existence of illicit code prior to distributing such code; however, Provider cannot guarantee that any code is free of illicit codes and other defects. During the term of a warranty period (if any), if it is determined that Illicit Code is present, then Provider will use commercially reasonable efforts to correct the affected code and if it cannot do so in a reasonable period of time, replace the affected code. Provider represents and warrants that there are no methods for gaining access to the code or other computer resources or data of UAB (such as a master access key, ID password, back door or trap door) other than as otherwise set forth, and Provider will not embed any device in the code or take any action to disrupt or terminate UAB’s operation of the code.
Illicit Code means any key, node, lock, time-out, “back door,” trapdoor,” “booby trap,” “drop dead device,” “data scrambling device,” or “Trojan Horse,” for enabling self-help, restraint, disabling program codes or other functions, whether implemented by electronic, mechanical or other means, which are intended to restrict use or access to any portion of any Software Product, data or information created by or accessed using the Software Product.
Illicit Code means any (i) illicit code, (ii) hidden files, (iii) automatically replicating, transmitting or activating code, (iv) virus about which Supplier knows or should have known, or (v) key, node lock, time-out or other Product-limiting or Service-limiting function, whether implemented by electronic or other means. INSTALLATION DATE shall mean the date, as specified in a Category Agreement or Transaction Agreement, by which all Components of the applicable Product shall be installed at the applicable designated Site.
Illicit Code means any program, routine, device or other undisclosed feature or hidden file, not referenced in the Documentation, including without limitation, a time bomb, virus, software lock, trojan horse, drop-dead device, worm, malicious logic or trap door, that is designed to delete, disable, deactivate, interfere with or otherwise harm the Software or Customer's other software, hardware, data, any transmitting or activating computer program, or any hardware-limiting, software-limiting or services-limiting function (including, but not limited to, any key, node lock, time-out or other similar functions), whether implemented by electronic or other means.
Illicit Code means any computer instructions in the Software that can disable, destroy, or otherwise alter the software or hardware [***]
Illicit Code means any computer viruses, spyware, rootkits, ransomware, Trojan horses, worms, software bombs or similar malicious scripts or code; but excluding code designed to enable Filmbankmedia to verify compliance with or enforce the Service restrictions in these Terms and Conditions and the subscription restrictions in the Booking Confirmation;