Anti-Piracy and License Compliance Sample Clauses

Anti-Piracy and License Compliance. Customer acknowledges that the Software may contain a security and reporting mechanism (“Security Mechanism”) intended to automatically collect and transmit to XXX.Xxxxxxxx Corporation and its affiliates (and their contractors, representatives, successors and assigns) data relating to the installation and usage of the Software, for purposes of verifying user compliance with the terms of the applicable license agreement, identifying unauthorized use and users, and otherwise protecting and enforcing intellectual property rights. Data collected and transmitted through the Security Mechanism may include, without limitation, user, device, and network identification information such as, but not limited to, email address, username, hostname, MAC address, IP address, Wifi SSID, geolocation and organization domain information, as well as information on Software usage, including product name, version, and time and number of uses. For further information on MSC Software’s use and processing of personal data transmitted and collected through the Security Mechanism, see MSC Software’s online privacy statement, as may be updated from time to time, available at xxx.xxxxxxxxxxx.xxx (or successor URL).
AutoNDA by SimpleDocs
Anti-Piracy and License Compliance. The Software may contain a security and reporting mechanism (“Security Mechanism”) intended to automatically collect and transmit to Licensor and/or its Affiliates (and their contractors, representatives, successors and assigns) data relating to the installation and usage of the Software, for purposes of verifying user compliance with the terms of the applicable license agreement, identifying unauthorized use and users, and otherwise protecting and enforcing intellectual property rights. Data collected and transmitted through the Security Mechanism may include, without limitation, user, device, and network identification information, location and organization domain information, as well as information on Software usage. For further information on processing of personal data transmitted and collected through the Security Mechanism, see Hexagon Manufacturing Intelligence online privacy statement, as may be updated from time to time, available at xxxxx://xxx.xxxxxxxxx.xxx/en-US/about- us/privacy-policy (or successor URL).

Related to Anti-Piracy and License Compliance

  • License Compliance HP may audit Customer compliance with the software license terms. Upon reasonable notice, HP may conduct an audit during normal business hours (with the auditor’s costs being at HP’s expense). If an audit reveals underpayments then Customer will pay to HP such underpayments. If underpayments discovered exceed five (5) percent of the contract price, Customer will reimburse HP for the auditor costs.

  • Statutory and Regulatory Compliance Contractor shall comply with all laws and regulations applicable to the Community Development Block Grant-Disaster Recovery funds appropriated by the Disaster Relief Appropriations Act, 2013 (Pub. L. 113-2), including but not limited to the applicable Office of Management and Budget Circulars, which may impact the administration of funds and/or set forth certain cost principles, including the allowability of certain expenses.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • License Key 2.5. The Application Software may include an embedded security system which if provided must be used together with a license key. The license key may limit the use of the Application Software to the applicable Use Level and prevent a single User from using more than one workstation at the same time and is valid for a certain period of time following which the license key must be renewed. Customer is solely responsible for any cost or loss arising out of Customer’s failure or delay to renew the license key.

  • ANTI-BRIBERY COMPLIANCE The Parties hereby acknowledge the importance of combating and preventing bribery and to that end both Parties agree to comply fully with all applicable laws, regulations and sanctions relating to anti-bribery and anti-corruption.

  • Academic Policies and Student Support Services X. Xxxx College courses offered as dual credit, regardless of where they are taught, follow the same syllabus, course outline, textbook, grading method, and other academic policies and procedures as the courses outlined in the Hill College policy manual, catalog, and student handbook. [TAC 19, Part 1, Chapter 4, Subchapter D, 4.85(g)(1)]

  • Anti-Corruption Compliance (a) For the past three (3) years, neither the Company nor any of its Subsidiaries, nor, to the knowledge of the Company, any director, officer, employee or agent acting on behalf of the Company or any of the Company’s Subsidiaries, has offered or given anything of value to: (i) any official or employee of a Governmental Authority, any political party or official thereof, or any candidate for political office or (ii) any other Person, in any such case while knowing that all or a portion of such money or thing of value will be offered, given or promised, directly or indirectly, to any official or employee of a Governmental Authority or candidate for political office, in each case in violation of the Anti-Bribery Laws.

  • Financial Viability and Regulatory Compliance 4.6.1 The Contractor warrants and represents that its corporate entity is in good standing with all applicable federal, state, and local licensing authorities and that it possesses all requisite licenses to perform the services required by this contract. The Contractor further warrants and represents that it owes no outstanding delinquent federal, state, or local taxes or business assessments.

  • Software compliance Unless explicitly agreed, software being used and developed to provide the service should: ● Be licensed under an open source and permissive license (like MIT, BSD, Apache 2.0,...). ● The license should provide unlimited access rights to the EGI community. ● Have source code publicly available via a public source code repository (if needed a mirror can be put in place under the EGI organisation in GitHub13.) All releases should be appropriately tagged. ● Adopt best practices: ○ Defining and enforcing code style guidelines. ○ Using Semantic Versioning. ○ Using a Configuration Management frameworks such as Ansible. ○ Taking security aspects into consideration through at every point in time. ○ Having automated testing in place. ○ Using code reviewing. 9 xxxxx://xxx.xxx.xx/about/policy/policies_procedures.html 10 xxxxx://xxxx.xxx.xx/wiki/OMB 11 xxxx://xxx.xxx.xx/ 12 xxxxx://xxx.xxx.xx/portal/index.php?Page_Type=NGI&id=4 13 xxxxx://xxxxxx.xxx/EGI-Foundation ○ Treating documentation as code. ○ Documentation should be available for Developers, administrators, and end users.

  • DBE/HUB Compliance The Engineer’s subcontracting program shall comply with the requirements of Attachment H of the contract (DBE/HUB Requirements).

Time is Money Join Law Insider Premium to draft better contracts faster.