Common use of Additional Restrictions Clause in Contracts

Additional Restrictions. In no event will Customer disassemble, decompile, or reverse engineer the Application or Confidential Information (as defined herein) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application from a machine- readable form into a human-readable form; (ii) disassembling or decompiling the Application by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the Application’s operation and creating the original source code or any approximation thereof by, for example, studying the Application’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will be deemed Confidential Information subject to the requirements of these SaaS Terms. Customer may use Service Provider’s Confidential Information solely in connection with the Application and pursuant to the terms of these SaaS Terms.

Appears in 3 contracts

Samples: Dac6pro Service Agreement, Dac6pro Service Agreement, Dac6pro Service Agreement

AutoNDA by SimpleDocs

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined hereinin Section 6) or permit others to do so. Disassembling, decompiling, decompiling and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis License Agreement. Customer may use Service Provider’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis License Agreement.

Appears in 2 contracts

Samples: Software License Terms and Conditions, Software License Terms and Conditions

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined hereinin Section 6) or permit others to do so. Disassembling, decompiling, decompiling and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-human- readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-machine- dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-machine- readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will be deemed Confidential Information subject to the requirements of these SaaS Termsthis License Agreement. Customer may use Service Provider’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis License Agreement.

Appears in 2 contracts

Samples: Software License Terms and Conditions, License Agreement

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined hereinin Section 5) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Subscription Agreement. Customer may use Service ProviderLicensor’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis Subscription Agreement.

Appears in 2 contracts

Samples: Reseller Agreement (Callidus Software Inc), Reseller Agreement (Callidus Software Inc)

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined herein) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Agreement. Customer may use Service ProviderLeanDNA’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis Agreement.

Appears in 1 contract

Samples: Master Subscription Agreement

Additional Restrictions. In no event will Customer disassemble, decompile, or reverse engineer the Proofkit Web Service, Application or Confidential Information (as defined herein) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the Application’s operation and creating the original source code or any approximation thereof by, for example, studying the Application’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will be deemed Confidential Information subject to the requirements of these SaaS Terms. Customer may use Service Provider’s Confidential Information solely in connection with the Application and pursuant to the terms of these SaaS Terms.

Appears in 1 contract

Samples: proofkit.co.uk

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined hereinin Section 6) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Agreement. Customer may use Service ProviderRadiant’s Confidential Information solely in connection with the Application Software and Products and pursuant to the terms of these SaaS Termsthis Agreement.

Appears in 1 contract

Samples: Software and Services Agreement

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined herein) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-machine- independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Agreement. Customer may use Service ProviderBP3 Global’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis Agreement.

Appears in 1 contract

Samples: Software Terms and Conditions

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Products or Confidential Information (as defined herein) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Products from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Products by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationProduct’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationProduct’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Products that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Agreement. Customer may use Service ProviderCDOL’s Confidential Information solely in connection with the Application Products and pursuant to the terms of these SaaS Termsthis Agreement.

Appears in 1 contract

Samples: Terms and Conditions

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined hereinin Section 6) or permit others to do so. Disassembling, decompiling, decompiling and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-human- readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-machine- dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will be deemed Confidential Information subject to the requirements of these SaaS Termsthis License Agreement. Customer may use Service Provider’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis License Agreement.

Appears in 1 contract

Samples: Software License Terms and Conditions

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined herein) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-machine- dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Agreement. Customer may use Service ProviderTrinity Guard’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis Agreement.

Appears in 1 contract

Samples: Software Terms and Conditions

AutoNDA by SimpleDocs

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined hereinin Section 6) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Agreement. Customer may use Service ProviderRadiant’s Confidential Information solely in connection with the Application Software and Products and pursuant to the terms of these SaaS TermsDIR Contract No. DIR-TSO- 4377 and this Agreement.

Appears in 1 contract

Samples: Product, Software and Services Agreement

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined hereinin Section 6) or permit others to do so. Disassembling, decompiling, decompiling and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis License Agreement. Customer may use Service ProviderLicensor’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis License Agreement.

Appears in 1 contract

Samples: Software License Terms and Conditions

Additional Restrictions. In no event will Customer disassemble, decompile, or reverse engineer the Application or Confidential Information (as defined herein) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application from a machine- readable form into a human-human- readable form; (ii) disassembling or decompiling the Application by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the Application’s operation and creating the original source code or any approximation thereof by, for example, studying the Application’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will be deemed Confidential Information subject to the requirements of these SaaS Terms. Customer may use Service Provider’s Confidential Information solely in connection with the Application and pursuant to the terms of these SaaS Terms.

Appears in 1 contract

Samples: 19en282jw7pc3zpwj22pg8v0-wpengine.netdna-ssl.com

Additional Restrictions. In no event will Customer shall Licensee disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined herein) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Software from a machine- readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Agreement. Customer Licensee may use Service ProviderFitRankings’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis Agreement.

Appears in 1 contract

Samples: Software & Services Terms and Conditions

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined hereinin Section 6) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Agreement. Customer may use Service ProviderRadiant’s Confidential Information solely in connection with the Application Software and Products and pursuant to the terms of these SaaS TermsDIR Contract No. DIR- TSO-3787 and this Agreement.

Appears in 1 contract

Samples: Software and Services Agreement

Additional Restrictions. In no event will shall Customer disassemble, decompile, or reverse engineer the Application Software or Confidential Information (as defined herein) or permit others to do so. Disassembling, decompiling, and reverse engineering include, without limitation: (i) converting the Application Software from a machine- machine-readable form into a human-human- readable form; (ii) disassembling or decompiling the Application Software by using any means or methods to translate machine-dependent or machine-machine- independent object code into the original human-readable source code or any approximation thereof; (iii) examining the machine-readable object code that controls the ApplicationSoftware’s operation and creating the original source code or any approximation thereof by, for example, studying the ApplicationSoftware’s behavior in response to a variety of inputs; or (iv) performing any other activity related to the Application Software that could be construed to be reverse engineering, disassembling, or decompiling. To the extent any such activity may be permitted pursuant to written agreement, the results thereof will shall be deemed Confidential Information subject to the requirements of these SaaS Termsthis Agreement. Customer may use Service ProviderLiving Security’s Confidential Information solely in connection with the Application Software and pursuant to the terms of these SaaS Termsthis Agreement.

Appears in 1 contract

Samples: nercomp.org

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!