Source Code Escrow On the date hereof, Company shall deliver to an independent third party escrow agent, selected and designated by AMEX and approved by Company (such approval not to be unreasonably withheld) ("Escrow Agent"), for deposit in accordance with an escrow agreement among the Escrow Agent and the parties hereto and substantially in the form attached as Exhibit E ("Escrow Agreement"), a current and complete copy of the source code (the "Source Code") for the Domain Name and any other materials required to operate the Source Code (the "Escrow Materials"). Within [ ** ] of the installation of any new update to the Service (or any other substantial modification to the Source Code, the Domain Name or the Service) or within [ ** ] of the last deposit hereunder, whichever is sooner, Company shall deliver to the Escrow Agent, for deposit in accordance with such Escrow Agreement, any and all changes to the Escrow Materials which correspond to changes, if any, made to the corresponding Escrow Material or shall notify Escrow Agent that no changes were made during the preceding period. All materials deposited hereunder shall be considered "Escrow Materials" as the term is used herein. In the event of (i) the Company's insolvency (as defined in Section 16(e)) or (ii) the Company's material breach of the terms of this Agreement specifically because of its gross negligence or willful misconduct and such breach is not fully remedied within thirty (30) days of AMEX's notice to Company, then notwithstanding any other rights and remedies to which AMEX may be entitled, AMEX shall immediately have the right to obtain a copy of the Escrow Materials from the Escrow Agent upon written notice as provided in the Escrow Agreement for use in continued provision of the Service. AMEX shall have the right, at any time upon at least ten (10) days' written notice to Company and Escrow Agent, to select and designate a new escrow agent to replace the Escrow Agent hereunder. Upon such notice, Escrow Agent shall completely, safely and securely transfer the Escrow Materials to the new escrow agent (which will then become the "Escrow Agent" hereunder) and confirm such transfer in writing to AMEX and Company. ** INDICATES CONFIDENTIAL TREATMENT REQUESTED.
Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Software Warranty We warrant that the Tyler Software will perform without Defects during the term of this Agreement. If the Tyler Software does not perform as warranted, we will use all reasonable efforts, consistent with industry standards, to cure the Defect in accordance with the maintenance and support process set forth in Section C(9), below, the SLA and our then current Support Call Process.
Software Upgrades All Software Releases (including all Error corrections made available pursuant to this Agreement) that RSA in its sole discretion: (a) deems to be logical improvements to the Software; (b) make generally available to all licensees of the Software; and (c) does not separately price or market.
SOURCE CODE ESCROW FOR LICENSED PRODUCT If Source Code or Source Code escrow is offered by either Contractor or Product manufacturer or developer to any other commercial customers, Contractor shall either: (i) provide Licensee with the Source Code for the Product; or (ii) place the Source Code in a third party escrow arrangement with a designated escrow agent who shall be named and identified to the State, and who shall be directed to release the deposited Source Code in accordance with a standard escrow agreement acceptable to the State; or (iii) will certify to the State that the Product manufacturer/developer has named the State, acting by and through the Authorized User, and the Licensee, as a named beneficiary of an established escrow arrangement with its designated escrow agent who shall be named and identified to the State and Licensee, and who shall be directed to release the deposited Source Code in accordance with the terms of escrow. Source Code, as well as any corrections or enhancements to such source code, shall be updated for each new release of the Product in the same manner as provided above and such updating of escrow shall be certified to the State in writing. Contractor shall identify the escrow agent upon commencement of the Contract term and shall certify annually that the escrow remains in effect in compliance with the terms of this clause. The State may release the Source Code to Licensees under this Contract who have licensed Product or obtained services, who may use such copy of the Source Code to maintain the Product.
Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.
Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.
Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.
Limited Software Warranty MyECheck represents, warrants, and covenants that: MyECheck warrants to the original end user (“Customer”), and not to subsequent end users, of the Extreme Networks software product (“Software”) that for ninety (90) days from the date of installation of the Software from MyECheck, the Software shall substantially conform with the specification for the Software at the (“Documentation”). MyECheck does not warrant (i) that the Software is error free, (ii) that Customer will be able to operate the Software without problems or interruptions or (iii) that the Software will be free of vulnerability to intrusion or attack. Except for the limited warranty set forth in this section, the Software is provided “AS IS.”