License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.
Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.
Unbundled Loop Modifications (Line Conditioning 2.5.1 Line Conditioning is defined as routine network modification that BellSouth regularly undertakes to provide xDSL services to its own customers. This may include the removal of any device, from a copper Loop or copper Subloop that may diminish the capability of the Loop or Subloop to deliver high-speed switched wireline telecommunications capability, including xDSL service. Such devices include, load coils, excessive bridged taps, low pass filters, and range extenders. Excessive bridged taps are bridged taps that serves no network design purpose and that are beyond the limits set according to industry standards and/or the BellSouth’s TR 73600 Unbundled Local Loop Technical Specification. 2.5.2 BellSouth will remove load coils only on copper Loops and Subloops that are less than eighteen thousand (18,000) feet in length. 2.5.3 For any copper loop being ordered by NewPhone which has over six thousand (6,000) feet of combined bridged tap will be modified, upon request from NewPhone, so that the loop will have a maximum of six thousand (6,000) feet of bridged tap. This modification will be performed at no additional charge to NewPhone. Loop conditioning orders that require the removal of bridged tap that serves no network design purpose on a copper Loop that will result in a combined total of bridged tap between two thousand five hundred (2,500) and six thousand (6,000) feet will be performed at the rates set forth in Exhibit A. 2.5.4 NewPhone may request removal of any unnecessary and non-excessive bridged tap (bridged tap between zero (0) and two thousand five hundred (2,500) feet which serves no network design purpose), at rates pursuant to BellSouth’s SC Process as mutually agreed to by the Parties. 2.5.5 Rates for ULM are as set forth in Exhibit A. 2.5.6 BellSouth will not modify a Loop in such a way that it no longer meets the technical parameters of the original Loop type (e.g., voice grade, ADSL, etc.) being ordered. 2.5.7 If NewPhone requests ULM on a reserved facility for a new Loop order, BellSouth may perform a pair change and provision a different Loop facility in lieu of the reserved facility with ULM if feasible. The Loop provisioned will meet or exceed specifications of the requested Loop facility as modified. NewPhone will not be charged for ULM if a different Loop is provisioned. For Loops that require a DLR or its equivalent, BellSouth will provide LMU detail of the Loop provisioned. 2.5.8 NewPhone shall request Loop make up information pursuant to this Attachment prior to submitting a service inquiry and/or a LSR for the Loop type that NewPhone desires BellSouth to condition. 2.5.9 When requesting ULM for a Loop that BellSouth has previously provisioned for NewPhone, NewPhone will submit a SI to BellSouth. If a spare Loop facility that meets the Loop modification specifications requested by NewPhone is available at the location for which the ULM was requested, NewPhone will have the option to change the Loop facility to the qualifying spare facility rather than to provide ULM. In the event that BellSouth changes the Loop facility in lieu of providing ULM, NewPhone will not be charged for ULM but will only be charged the service order charges for submitting an order.
Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.
Scope of Use The Fund will use the System and the Data Access Services only for the processing of securities transactions, the keeping of books of account for the Fund and accessing data for purposes of reporting and analysis. The Fund shall not, and shall cause its employees and agents not to (i) permit any unauthorized third party to use the System or the Data Access Services, (ii) sell, rent, license or otherwise use the System or the Data Access Services in the operation of a service bureau or for any purpose other than as expressly authorized under this Addendum, (iii) use the System or the Data Access Services for any fund, trust or other investment vehicle), other than as set forth herein, without the prior written consent of State Street, (iv) allow access to the System or the Data Access Services through terminals or any other computer or telecommunications facilities located outside the Designated Locations, (v) allow or cause any information (other than portfolio holdings, valuations of portfolio holdings, and other information reasonably necessary for the management or distribution of the assets of the Fund) transmitted from State Street’s databases, including data from third party sources, available through use of the System or the Data Access Services to be redistributed or retransmitted to another computer, terminal or other device for other than use for or on behalf of the Fund or (vi) modify the System in any way, including without limitation developing any software for or attaching any devices or computer programs to any equipment, system, software or database which forms a part of or is resident on the Designated Configuration.
SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.
SINGLE-USE PRODUCTS The Board of County Commissioners has established a single-use products and plastic bags policy intended to reduce the use of products which have become globally recognized as having lasting negative impacts on the environment. Neither single-use products nor plastic bags may be sold or disbursed on County property by staff or contracted vendors, except as set forth in Orange County Administrative Regulation 9.01.03. Failure to comply with the Regulation may result in termination of the contract or other contractual remedies, and may affect future contracting with the County. The use of reusable, recyclable, biodegradable, or compostable materials is encouraged.
Third Party Use You may allow your agents, contractors and outsourcing service providers (each a “Permitted Third Party”) to use the Product(s) licensed to you hereunder solely for your benefit in accordance with the terms of this XXXX and you are responsible for any such Permitted Third Party’s compliance with this XXXX in such use. Any breach by any Permitted Third Party of the terms of this XXXX will be considered your breach.
Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-‐to-‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.
Grant of License to Use Intellectual Property Without limiting the provisions of Section 3.01 hereof or any other rights of the Collateral Agent as the holder of a Security Interest in any IP Collateral, for the purpose of enabling the Collateral Agent to exercise rights and remedies under this Agreement at such time as the Collateral Agent shall be lawfully entitled to exercise such rights and remedies, each Grantor hereby grants to the Collateral Agent, for the benefit of the Secured Parties, an irrevocable, nonexclusive license (exercisable without payment of royalty or other compensation to the Grantors) to use, license or sublicense any of the IP Collateral now owned or hereafter acquired by such Grantor, and wherever the same may be located (whether or not any license agreement by and between any Grantor and any other Person relating to the use of such IP Collateral may be terminated hereafter), and including in such license reasonable access to all media in which any of the licensed items may be recorded or stored and to all computer software and programs used for the compilation or printout thereof, provided, however, that any such license granted by the Collateral Agent to a third party shall include reasonable and customary terms necessary to preserve the existence, validity and value of the affected IP Collateral, including without limitation, provisions requiring the continuing confidential handling of trade secrets, requiring the use of appropriate notices and prohibiting the use of false notices, protecting and maintaining the quality standards of the Trademarks in the manner set forth below (it being understood and agreed that, without limiting any other rights and remedies of the Collateral Agent under this Agreement, any other Loan Document or applicable Law, nothing in the foregoing license grant shall be construed as granting the Collateral Agent rights in and to such IP Collateral above and beyond (x) the rights to such IP Collateral that each Grantor has reserved for itself and (y) in the case of IP Collateral that is licensed to any such Grantor by a third party, the extent to which such Grantor has the right to grant a sublicense to such IP Collateral hereunder). The use of such license by the Collateral Agent may only be exercised, at the option of the Collateral Agent, during the continuation of an Event of Default; provided that any license, sublicense or other transaction entered into by the Collateral Agent in accordance herewith shall immediately terminate at such time as the Collateral Agent is no longer lawfully entitled to exercise its rights and remedies under this Agreement. Nothing in this Section 4.01 shall require a Grantor to grant any license that is prohibited by any rule of law, statute or regulation, or is prohibited by, or constitutes a breach or default under or results in the termination of any contract, license, agreement, instrument or other document evidencing, giving rise to or theretofore granted, with respect to such property or otherwise unreasonably prejudices the value thereof to the relevant Grantor. In the event the license set forth in this Section 4.01 is exercised with regard to any Trademarks, then the following shall apply: (i) all goodwill arising from any licensed or sublicensed use of any Trademark shall inure to the benefit of the Grantor; (ii) the licensed or sublicensed Trademarks shall only be used in association with goods or services of a quality and nature consistent with the quality and reputation with which such Trademarks were associated when used by Grantor prior to the exercise of the license rights set forth herein; and (iii) at the Grantor’s request and expense, licensees and sublicensees shall provide reasonable cooperation in any effort by the Grantor to maintain the registration or otherwise secure the ongoing validity and effectiveness of such licensed Trademarks, including, without limitation the actions and conduct described in Section 4.02 below.