6STU ecure Browsing Software Sample Clauses

6STU ecure Browsing Software. U6T The security procedures for the OTM service include the requirement that each of your users logs on to the OTM service from a computer (or other supported device) on which you have installed and have running Rapport, the secure browsing software provided by Trusteer Inc. (or one of its affiliates), or other secure browsing software which we may have approved for use with the OTM service. Trusteer Rapport or such other approved secure browsing software is referred to herein as the “secure browsing software.” We use various means to detect if secure browsing software is installed and running on a computer or supported device. If by using the methods we employ at the relevant time, we are not able to detect that secure browsing software is installed and running on the computer or supported device from which one of your users is attempting to access the OTM service, your user will not be permitted to log on to the OTM service from that computer or device. If, however, by using those methods we employ at the relevant time, we determine that secure browsing software is installed and running on a computer or supported device, your user will be able log on to the OTM service from that computer or device (so long as that user also complies with the other security procedures applicable to that user accessing the OTM service). Your use of the secure browsing software will be licensed to you by the vendor of the secure browsing software you are using under a separate license agreement, the “software license agreement.” You agree that your use of the secure browsing software is subject to, and that you are bound by and will comply with, the terms of that software license agreement. WE DISCLAIM ALL REPRESENTATIONS AND WARRANTIES OF ANY KIND RELATING TO THE SECURE BROWSING SOFTWARE, INCLUDING ANY REPRESENTATIONS AND WARRANTIES OF PERFORMANCE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON- INFRINGEMENT. WE HAVE NO RESPONSIBILITY FOR (i) THE PERFORMANCE OF THE SECURE BROWSING SOFTWARE OR THE VENDOR OF THE SECURE BROWSING SOFTWARE, (ii) COMPATIBILITY OR AVAILABILITY OF THE SECURE BROWSING SOFTWARE, OR (iii) DAMAGES OF ANY KIND CLAIMED UNDER ANY CAUSE OF ACTION ALLEGED TO INVOLVE OR RELATE TO THE SECURE BROWSING SOFTWARE OR THE VENDOR OF THE SECURE BROWSING SOFTWARE. You are solely responsible for determining if the secure browsing software will work with your equipment, communications capabilities, and other software and for ensuring that any installa...
AutoNDA by SimpleDocs

Related to 6STU ecure Browsing Software

  • Client Software You may only use the client software with the ERP solution. You may install an unlimited number of copies of the client software to access your ERP solution.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

  • Software Updates XXXXX agrees to keep current with software licensed from Skyward and will install new versions on a timeline approved by XXXXX governance. This timeline will be communicated by NWRDC to the Districts. School District Workstations Configuration requirements for devices and their software that school district personnel use to access WSIPC’s software modules can be found on our website: xxxxx://xxx.xxxxx.xxx/technology‐team/. State Reports XXXXX will provide, at no additional fee, all data reports required by the state that impact 50% or more of the school districts in the state. WSIPC and NWRDC will work with state agencies to gather requirements on the required data. WSIPC will inform NWRDC staff of any mandated changes to state reports and NWRDC will communicate the information to the District. Appendix B NWRDC FTE Fees Fiscal Only NWRDC Software Support Services XXXXX Software Licensing Total FTE Fee $13.63 $20.34 $33.97 $15.56 $13.08 $28.64 $24.52 $20.34 $44.86 Student Only Full Service

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Hardware and Software In order to use the Services, you must obtain and maintain, at your expense, compatible mobile hardware and software as specified by Credit Union from time to time. Credit Union is not responsible for any third party software you may need to use the Services. Any such software is accepted by you as is and is subject to the terms and conditions of the software agreement you enter into directly with the third party software provider at time of download and installation.

Time is Money Join Law Insider Premium to draft better contracts faster.