Access and Use of the Software Sample Clauses

Access and Use of the Software. The Customer must keep confidential any access codes or any other identifier used to access and/or download the Software. Customer shall be responsible and liable for the acts and omissions of all users arising from the access to the Software provided by the Customer. The Software may contain license protection keys or other technologies intended to limit access to the Software to that Use permitted within the Agreement. The Customer shall not, directly or indirectly, circumvent or render inoperative any such protection or attempt to do so.
AutoNDA by SimpleDocs
Access and Use of the Software. Only the Organization and those employees, or other persons who are authorized by the Organization to use the Software, and who have been given login credentials under a valid Software license may access and use the Software.
Access and Use of the Software. (a) By using the Software, you represent and warrant that: i. You have the legal authority as per applicable law to enter into this Agreement and that your use of the Software shall not violate any applicable law or regulation; and ii. You have fully read and understood the Terms of Use and Privacy Policy of the Software and consent to them. (b) You will ensure that your use of the Software and/or Services will not violate any applicable law or regulation. Further, you shall ensure that the requisite information provided by you to us for the Software and/or Services is absolutely true, not in violation of any third-party’s intellectual property rights or applicable data protection/privacy laws, up-to-date and correct and nothing material has been concealed, and that you agree to maintain the accuracy of such information. The Company will not be liable for any incident occurring due to incorrect or insufficient information provided by you, whatsoever. (c) You acknowledge that you have no rights in, or to, the Software and/or the Services or the technology used or supported by the Software or any of the Services, other than the right to use each of them in accordance with these Terms, if applicable. (d) You expressly understand and agree that: i. The information and materials on the Software and/or Services is provided on an “as is” and “as available” basis. The Company and its subsidiaries, affiliates, directors, officers, shareholders, employees, agents, partners and licensors disclaim all warranties of any kind, either express or implied, including but not limited to, implied warranties of merchantability, uninterrupted use, fitness for a particular purpose and non-infringement; ii. The Company does not warrant that the functions contained in the information and materials on the Software and/or Services, including, without limitation any third- party sites or services linked to the Software and/or Service will be fit for a particular purpose, merchantable, uninterrupted, timely or error-free, that the defects will be rectified, or that the Software or the servers that make such content, information and materials available are free of viruses or other harmful components; iii. Any materials downloaded or otherwise obtained through the Software are accessed at your own risk, and you will be solely responsible for any damage or loss of data that results from such download to your computer system; and iv. If any open-source software is included in the Software...
Access and Use of the Software. (a) If you purchase a full subscription, transaction based or child, single sign on maintenance model to the Software, HRMS grants you a non-exclusive, non-transferable right to access and use the Software and Documentation for your own internal business purposes during the Term in accordance with this clause 2.2. (b) You may make a reasonable number of copies of the Documentation for your internal training purposes. (c) You may use the Software only for its intended purposes in accordance with the Documentation and any laws which apply to you. (d) Except as otherwise permitted by this Agreement and by law, you must not copy, modify, merge, combine with any other products, reverse engineer or decompile the whole or any part of the Software, without HRMS’s prior written consent.
Access and Use of the Software 

Related to Access and Use of the Software

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Use of the Site You understand that, except for information, products or services clearly identified as being supplied by Penderbrook Golf Club, Penderbrook Golf Club does not operate, control or endorse any information, products or services on the Internet in any way. Except for Penderbrook Golf Club- identified information, products or services, all information, products and services offered through the Site or on the Internet generally are offered by third parties, that are not affiliated with Penderbrook Golf Club a. You also understand that Penderbrook Golf Club cannot and does not guarantee or warrant that files available for downloading through the Site will be free of infection or viruses, worms, Trojan horses or other code that manifest contaminating or destructive properties. You are responsible for implementing sufficient procedures and checkpoints to satisfy your particular requirements for accuracy of data input and output, and for maintaining a means external to the Site for the reconstruction of any lost data. YOU ASSUME TOTAL RESPONSIBILITY AND RISK FOR YOUR USE OF THE SITE AND THE INTERNET. Penderbrook Golf Club PROVIDES THE SITE AND RELATED INFORMATION “AS IS” AND DOES NOT MAKE ANY EXPRESS OR IMPLIED WARRANTIES, REPRESENTATIONS OR ENDORSEMENTS WHATSOEVER (INCLUDING WITHOUT LIMITATION WARRANTIES OF TITLE OR NONINFRINGEMENT, OR THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE) WITH REGARD TO THE SERVICE, ANY MERCHANDISE INFORMATION OR SERVICE PROVIDED THROUGH THE SERVICE OR ON THE INTERNET GENERALLY, AND Penderbrook Golf Club SHALL NOT BE LIABLE FOR ANY COST OR DAMAGE ARISING EITHER DIRECTLY OR INDIRECTLY FROM ANY SUCH TRANSACTION. IT IS SOLELY YOUR RESPONSIBILITY TO EVALUATE THE ACCURACY, COMPLETENESS AND USEFULNESS OF ALL OPINIONS, ADVICE, SERVICES, MERCHANDISE AND OTHER INFORMATION PROVIDED THROUGH THE SERVICE OR ON THE INTERNET GENERALLY. Penderbrook Golf Club DOES NOT WARRANT THAT THE SERVICE WILL BE UNINTERRUPTED OR ERROR-FREE OR THAT DEFECTS IN THE SERVICE WILL BE CORRECTED. YOU UNDERSTAND FURTHER THAT THE PURE NATURE OF THE INTERNET CONTAINS UNEDITED MATERIALS SOME OF WHICH ARE SEXUALLY EXPLICIT OR MAY BE OFFENSIVE TO YOU. YOUR ACCESS TO SUCH MATERIALS IS AT YOUR RISK. Penderbrook Golf Club HAS NO CONTROL OVER AND ACCEPTS NO RESPONSIBILITY WHATSOEVER FOR SUCH MATERIALS. LIMITATION OF LIABILITY IN NO EVENT WILL Penderbrook Golf Club BE LIABLE FOR (I) ANY INCIDENTAL, CONSEQUENTIAL, OR INDIRECT DAMAGES (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION, LOSS OF PROGRAMS OR INFORMATION, AND THE LIKE) ARISING OUT OF THE USE OF OR INABILITY TO USE THE SERVICE, OR ANY INFORMATION, OR TRANSACTIONS PROVIDED ON THE SERVICE, OR DOWNLOADED FROM THE SERVICE, OR ANY DELAY OF SUCH INFORMATION OR SERVICE. EVEN IF Penderbrook Golf Club OR ITS AUTHORIZED REPRESENTATIVES HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR (II) ANY CLAIM ATTRIBUTABLE TO ERRORS, OMISSIONS, OR OTHER INACCURACIES IN THE SERVICE AND/OR MATERIALS OR INFORMATION DOWNLOADED THROUGH THE SERVICE. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. IN SUCH STATES, Penderbrook Golf Club LIABILITY IS LIMITED TO THE GREATEST EXTENT PERMITTED BY LAW. Penderbrook Golf Club makes no representations whatsoever about any other web site which you may access through this one or which may link to this Site. When you access a non-Penderbrook Golf Club web site, please understand that it is independent from Penderbrook Golf Club, and that Penderbrook Golf Club has no control over the content on that web site. In addition, a link to a Penderbrook Golf Club web site does not mean that Penderbrook Golf Club endorses or accepts any responsibility for the content, or the use, of such web site.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Intellectual Property; Software Other than as set forth on Schedule 5.12: (a) There are no Copyrights, Patent Rights and Trademarks (including any assumed or fictitious names used by the Company within the previous two (2) years) owned by or licensed to the Company. (b) There is no Software owned by or licensed to the Company except for mass market Software licensed to the Company that is commercially available and subject to “shrink-wrap” or “click-through” license agreements. (c) The Company is not a party to Contracts which relate to: (i) any Copyrights, Patent Rights or Trademarks; (ii) any Trade Secrets owned by or licensed to the Company; and (iii) any Software, other than market Software licensed to the Company that is commercially available and subject to “shrink-wrap” or “click-through” license agreements. (d) The Company owns the entire right, title and interest in and to, or has the valid and enforceable right to use, the Intellectual Property and Software used in the Business as currently conducted, and to the Knowledge of Seller there is no other Intellectual Property necessary for the Company to conduct the Business as currently conducted. (i) No infringement, misappropriation or violation of any Intellectual Property, or any rights of publicity or privacy relating to the use of names, likenesses, voices, signatures or biographical information, of any other Person has occurred or results in any way from the operation of the Business or the use, sale or distribution of any Intellectual Property owned by or licensed exclusively to the Company; (ii) no claim of any infringement, misappropriation, violation or dilution of any Intellectual Property or any such rights of any other Person has been made or asserted in respect of the operation of the Business; (iii) no claim of invalidity of any Intellectual Property owned by the Company has been made by any other Person; (iv) no Proceedings are pending or, to the Knowledge of Seller, threatened that challenge the validity, ownership or use of any Intellectual Property owned by the Company; (v) the Company has not had notice of, and, to the Knowledge of Seller, there is no basis for, a claim against the Company that the operations, activities, products, Software, equipment or processes of the Business infringe, misappropriate, violate or dilute any Intellectual Property or any such rights of any other Person; and (vi) to the Knowledge of Seller, no Person infringes, misappropriates or violates any Intellectual Property owned or exclusively licensed by or to Seller, in each case except as could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Use of the Service 12.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 12; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 12.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 12.3 You must ensure that any software you use in relation to the Service is properly licensed. 12.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 12.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 12.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 12.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 12.8 You may request additional users on the Service in accordance with the Pricing Schedule. 12.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 12.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Fair Use Policy or upon the request of an authorised authority. 12.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!