Additional Terms for Microsoft Software Sample Clauses

Additional Terms for Microsoft Software. You acknowledge that the Service enables you to use certain software and documentation supplied by AAPT and owned by Microsoft Corporation or its licensors (collectively, the “Microsoft Software”). The Service does not support customer supplied Microsoft Software and you must select one of our pre-packaged Microsoft Software operating systems for use in connection with the Service. If you choose to use Windows Software operating systems for use in connection with the Service, Microsoft and its licensors require that you agree to the following terms: (a) You must not remove, modify or obscure any copyright, trademark or other proprietary rights notices that are contained in or on the Microsoft Software; (b) You must not reverse engineer, decompile or disassemble the Microsoft Software, except to the extent expressly permitted by applicable law; (c) Microsoft disclaims, to the extent permitted by applicable law, all warranties by Microsoft and any liability by Microsoft or its suppliers for any damages, whether direct, indirect, or consequential, arising from the Trial Services; (d) We are responsible for providing You with technical support in connection with the Trial Service. Microsoft (and its suppliers) will not provide any support for the Trial Service; (e) Microsoft does not transfer any ownership rights in the Microsoft Software; (f) You acknowledge that You may use the Microsoft Software solely in conjunction with the Trial Service; (g) You acknowledge that the Microsoft Software is not fault tolerant and is not guaranteed to be error free or to operate uninterrupted. You must not use the Microsoft Software in any application or situation where the failure of the Microsoft Software could lead to death or serious bodily injury of any person, or to severe physical or environmental damage (“High Risk Use”). Examples of High Risk Use include, but are not limited to: aircraft or other modes of mass human transport, nuclear or chemical facilities, life support systems, implantable medical equipment, motor vehicles or weaponry systems. High Risk Use does not include use of the Microsoft Software for administrative purposes, to store configuration data, engineering and/or configuration tools, or other non-control applications, the failure of which would not result in death, personal injury, or severe physical or environmental damage. These non-controlling applications may communicate with the applications that perform the control, but must not be directly o...
AutoNDA by SimpleDocs
Additional Terms for Microsoft Software. Microsoft Software is third party software. The Third Party Agreement/ additional license terms that apply to Microsoft Software Products (“Products”) are: a) The Customer shall not remove, modify, or obscure any copyright, trademark or other proprietary rights notices that are contained in or on the Products; b) The Customer shall not reverse engineer, decompile or disassemble the Products, except to the extent that such activity is expressly permitted by applicable law; c) Microsoft disclaims, to the extent permitted by applicable law, all warranties by Microsoft and any liability by Microsoft or its suppliers for any damages or remedies, whether direct, indirect, or consequential, arising from the Software Services. For the purposes of this clause Software Services means the services Umbrellar provides to Client that make available, display, run, access or otherwise interact, directly or indirectly, with the Products; d) Umbrellar may disclose Customer information such as the total number of licenses and country of usage, Customer name and address; e) Microsoft SC Application Software product acquisition or download, the installation of the Microsoft SC Application Software, and its ongoing support and lifecycle management remain the sole responsibility of the Customer; and f) There is a "No High Risk Use" requirement that the User may not use the Microsoft software ("Product") in any application or situation where the Product(s) failure could lead to death or serious bodily injury of any person, or to severe physical or environmental damage ("High Risk Use"). Examples of High Risk Use include, but are not limited to: aircraft or other modes of human mass transportation, nuclear or chemical facilities, life support systems, implantable medical equipment, motor vehicles, or weaponry systems. High Risk Use does not include utilisation of Products for administrative purposes, to store configuration data, engineering and/or configuration tools, or other non-control applications, the failure of which would not result in death, personal injury, or severe physical or environmental damage. These non-controlling applications may communicate with the applications that perform the control, but must not be directly or indirectly responsible for the control function.

Related to Additional Terms for Microsoft Software

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

  • Statement of Work The Statement of Work to which Grantee is bound is incorporated into and made a part of this Grant Agreement for all purposes and included as Attachment A.

  • Software Updates XXXXX agrees to keep current with software licensed from Skyward and will install new versions on a timeline approved by XXXXX governance. This timeline will be communicated by NWRDC to the Districts.

  • License Terms This license is for one full Semester. It cannot be cancelled or terminated except under the conditions cited in this license.

  • Detailed Description of Services / Statement of Work Describe fully the services that Contractor will provide, or add and attach Exhibit B to this Agreement.

  • Posting of Work Schedules Work schedules shall be written in ink and posted and maintained in such a way as to provide every employee an opportunity to know her shift schedule for an advanced period of six (6) weeks.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Alternative Work Schedules Employees may request alternative work schedules such as a nine (9) day - 80 hour two week schedule or a four (4) day - 40 hour week schedule. Management will respond to an employee's request within 15 calendar days. Any changes from existing work schedules will be based on the needs of the service as determined by Management. Employees covered by the Fair Labor Standards Act will not be placed on alternate work schedules that mandate the payment of overtime under the Act.

  • Alternative Work Schedule An alternate forty (40) hour work schedule (other than five (5) uniform and consecutive eight (8) hour days in a seven (7) day period), or for hospital personnel an eighty (80) hour workweek in a fourteen (14) day period and other mutually agreed upon schedules that comply with applicable federal and state law. Employee work schedules normally include two (2) consecutive days off.

  • Additional Software Should any additional Software licenses be purchased during the Term: (a) In the case of Permanent Licenses, the maintenance Fees will be pro-rated till the Expiry Date and these licenses will be added to the Supported Software. (b) In the case of Subscription Licenses, the license Fees will be pro-rated till the Expiry Date and these licenses will be added to the Supported Software. (c) In the case of Monthly Licenses, the licenses will be subject to their own support and maintenance agreement. (d) The Customer may request that support of certain bundles of licenses be subject to their separate support and maintenance agreements, in which case the expiry dates of these agreements may not coincide.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!