Autres interdictions Sample Clauses

Autres interdictions. Vous n’utiliserez pas le Kit de développement logiciel (SDK) pour créer, développer ou utiliser un programme, logiciel ou service qui (a) contient des virus, chevaux de Troie, vers, bombes à retardement, robots d’annulation ou autres routines de programmation informatique qui aient pour but d’endommager, d’interférer de façon dommageable, d’intercepter subrepticement ou d’exproprier tout(e) système, donnée ou information personnelle ; (b) lorsqu’il est utilisé conformément à sa destination ou commercialisation, viole un(e) loi, statut, ordonnance, règlement ou droit important(e) (y compris les xxxx, règlements ou droits régissant la propriété intellectuelle, les logiciels espions, la confidentialité, le contrôle des exportations, la concurrence déloyale, la lutte contre la discrimination ou la publicité mensongère) ; ou (c) interfère avec l’opérabilité des autres programmes ou logiciels Adobe ou tiers.
AutoNDA by SimpleDocs

Related to Autres interdictions

  • COUNTERFEIT GOODS a. Seller shall not furnish Counterfeit Goods to Buyer, defined as Goods or separately-identifiable items or components of Goods that: (i) are an unauthorized copy or substitute of an Original Equipment Manufacturer or Original Component Manufacturer (collectively, “OEM”) item; (ii) are not traceable to an OEM sufficient to ensure authenticity in OEM design and manufacture; (iii) do not contain proper external or internal materials or components required by the OEM or are not constructed in accordance with OEM design; (iv) have been re- worked, re-marked, re-labeled, repaired, refurbished, or otherwise modified from OEM design but not disclosed as such or are represented as OEM authentic or new; or (v) have not passed successfully all OEM required testing, verification, screening, and quality control processes. Notwithstanding the foregoing, Goods or items that contain modifications, repairs, re-work, or re-marking as a result of Seller’s or its subcontractor’s design authority, material review procedures, quality control processes or parts management plans, and that have not been misrepresented or mismarked without legal right to do so, shall not be deemed Counterfeit Goods. Counterfeit Goods shall be deemed nonconforming to this Contract.

  • Transit Traffic The following rates will apply:

  • Procurement of Goods Part A: General Goods shall be procured in accordance with the provisions of Section I of the “Guidelines for Procurement under IBRD Loans and XXX Credits” published by the Bank in January 1995 and revised in January and August 1996, September 1997 and January 1999 (the Guidelines) and the following provisions of Section I of this Schedule. Part B: International Competitive Bidding

  • Security Protocols Both parties agree to maintain security protocols that meet industry standards in the transfer or transmission of any data, including ensuring that data may only be viewed or accessed by parties legally allowed to do so. Provider shall maintain all data obtained or generated pursuant to the Service Agreement in a secure digital environment and not copy, reproduce, or transmit data obtained pursuant to the Service Agreement, except as necessary to fulfill the purpose of data requests by LEA.

  • SECURITY PROCESSES If requested by an Authorized User as part the Request for Quote process, Contractor shall complete a Consensus Assessment Initiative Questionnaire (CAIQ) including on an annual basis thereafter, if requested by the Authorized User. The CAIQ is available at Cloud Security Alliance (xxxxx://xxxxxxxxxxxxxxxxxxxxx.xxx/). The CAIQ may be used to assist the Authorized User in building the necessary assessment processes when engaging with Contractors. In addition to a request for a CAIQ, Contractor shall cooperate with all reasonable Authorized User requests for a Written description of Contractor’s physical/virtual security and/or internal control processes. The Authorized User shall have the right to reject any Contractor’s RFQ response or terminate an Authorized User Agreement when such a request has been denied. For example, Federal, State and local regulations and/or laws may require that Contractors operate within the Authorized User’s regulatory environment. In order to ensure that security is adequate and free of gaps in control coverage, the Authorized User may require information from the Contractor’s Service Organization Controls (SOC) audit report.

  • Malware Seller shall (consistent with the following sentence) ensure that no malware or similar items are coded or introduced into any aspect of the Facility, Interconnection Facilities, the Company Systems interfacing with the Facility and Interconnection Facilities, and any of Seller's critical control systems or processes used by Seller to provide energy, including the information, data and other materials delivered by or on behalf of Seller to Company, (collectively, the "Environment"). Seller will continue to review, analyze and implement improvements to and upgrades of its Malware prevention and correction programs and processes that are commercially reasonable and consistent with the then current technology industry's standards and, in any case, not less robust than the programs and processes implemented by Seller with respect to its own information systems. If Malware is found to have been introduced into the Environment, Seller will promptly notify Company and Seller shall take immediate action to eliminate and remediate the effects of the Malware, at Seller's expense. Seller shall not modify or otherwise take corrective action with respect to the Company Systems except at Company's request. Seller will promptly report to Company the nature and status of all Malware elimination and remediation efforts.

  • COUNTERFEIT WORK (a) The following definitions apply to this clause:

  • Inspection of Goods 8.1 The Buyer shall inspect the goods upon delivery.

  • Anti-Boycott Verification To the extent this Agreement constitutes a contract for goods or services within the meaning of Section 2270.002 of the Texas Government Code, as amended, solely for purposes of compliance with Chapter 2270 of the Texas Government Code, and subject to applicable Federal law, the Developer represents that neither the Developer nor any wholly owned subsidiary, majority-owned subsidiary, parent company or affiliate of Developer (i) boycotts Israel or (ii) will boycott Israel through the term of this Agreement. The terms “boycotts Israel” and “boycott Israel” as used in this paragraph have the meanings assigned to the term “boycott Israel” in Section 808.001 of the Texas Government Code, as amended.

  • Safety and Security Procedures Contractor shall maintain and enforce, at the Contractor Work Locations, industry-standard safety and physical security policies and procedures. While at each Court Work Location, Contractor shall comply with the safety and security policies and procedures in effect at such Court Work Location.

Time is Money Join Law Insider Premium to draft better contracts faster.