Access Restrictions and Security Sample Clauses

Access Restrictions and Security. Without limiting any other provision in these Terms and Conditions, Licensor cannot be held liable for any loss, cost, claim, damages or other liability whatsoever that may arise from the unauthorized use of any Account Access Information or any User Access Information. If any of Licensee’s Account Access Information or any User Access Information is compromised, lost or stolen, it is Licensee’s responsibility to immediately notify Licensor thereof so that the Account can be deactivated and new Account Access Information can be provided by the Licensor. Although Licensor has taken measures to safeguard the security of information submitted in using the Service, Licensor cannot guarantee the security of information transmitted during use of the Service or stored by Licensor and, without limiting any other provision in these Terms and Conditions, cannot be held liable to Licensee or any other person or entity in any way for any compromise of the security of such information. The limitation on liability stated in this section shall not apply for any losses or liability arising on the part of the Licensor due to gross negligence, fraud and willful misconduct.
AutoNDA by SimpleDocs
Access Restrictions and Security. Without limiting any other provision, term or condition in these Terms and Conditions, Licensor cannot be held liable for any loss, cost, claim, damages or other liability whatsoever that may arise from the unauthorized use of any Account Access Information or any User Access Information. If any of Licensee’s Account Access Information or any User Access Information is compromised, lost or stolen, it is Licensee’s responsibility to immediately notify Licensor thereof in writing so that the Account can be deactivated, and new Account Access Information can be provided by the Licensor. Although Licensor has taken measures to safeguard the security of information submitted in using the Service, Licensor cannot guarantee the security of information transmitted during use of the Service or stored by Licensor and, without limiting any other provision in these Terms and Conditions, will not be held liable to Licensee or any other person or entity in any way for any compromise of the security of such information.

Related to Access Restrictions and Security

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!