By Symantec Sample Clauses

By Symantec. Symantec shall, at its expense and Quarterdeck's request, defend any claim brought against Quarterdeck and Quarterdeck's affiliates, directors, officers, employees, agents and independent contractors, based on any allegation that Symantec's business practices with respect to the Software are unlawful or unethical, on allegations of Symantec's negligence, recklessness, willful misconduct, on allegations by Marubeni Corporation that Symantec's distribution of Japanese language versions of the Quarterdeck Products violated Marubeni Corporation's rights under the agreement between Quarterdeck and Marubeni dated September 29, 1997, or on allegations that, if true, would constitute a breach of this Agreement, and Symantec will pay any damages awarded by a court of competent jurisdiction in a final, unappealable judgment for such claim or any amount owing in settlement of such claim, provided that Symantec tenders sole control of the defense and settlement of such claim to Quarterdeck and reasonably cooperates in the defense thereof.
AutoNDA by SimpleDocs
By Symantec. Symantec will defend You against any claims asserting that the Online Services infringe any intellectual property right of a third party, and will pay any and all damages finally awarded by a court and actually paid by You, or agreed to in a final settlement by Symantec and attributable to such claim. Symantec’s obligations under this provision are subject to Your doing the following: notifying Symantec of the claim in writing, as soon as You learn of it; providing Symantec with all reasonable assistance and information to enable Symantec to perform Symantec’s duties under this Section; allowing Symantec sole control of the defense and all related settlement negotiations; and not having compromised or settled such claim. Notwithstanding the foregoing, You may participate at Your expense in the defense of any such claim with Your own counsel, provided that Symantec retains sole control of the claim. You have the right to approve any settlement that affirmatively places on You an obligation that has a material adverse effect on You other than the obligations to cease using the affected Online Service or to pay sums indemnified under this Section. Such approval will not be unreasonably withheld. If the Online Services are found to infringe, or if Symantec determines in Symantec’s sole opinion that the Online Services are likely to be found to infringe, then Symantec will either (i) obtain for You the right to continue to use the Online Services; or (ii) modify the Online Service (including, if applicable, any Service Component(s)) so as to make it non-infringing, or replace it with a non-infringing equivalent substantially comparable in functionality, (and in the case of infringing Service Components, You will stop using any infringing version of such Service Components); or, if Symantec determines in its sole opinion that “(i)” and/or “(ii)” are not reasonable, Symantec may (iii) terminate Your rights and Symantec’s obligations under this Agreement with respect to such Online Services, and in such case shall refund to You the pre-paid fees for the relevant Online Services. Notwithstanding the above, Symantec will not be liable for any infringement claim to the extent that it is based upon: (1) modification of the Online Services other than by Symantec; (2) combination, use, or operation of the Online Services with products not specifically authorized by Symantec to be combined with the Online Services; (3) use of the Online Services other than in accordance ...
By Symantec. Symantec will defend and indemnify DR, for any third party claims for damages, which arise out of, through no fault of DR: (a) a oneNetwork Affiliate’s use of content provided by Symantec for use in the Symantec oneNetwork Affiliate Program; (b) the infringement of the Symantec Storefront or Symantec Product of any applicable intellectual property right; (c) any misrepresentation by Symantec in the performance of its obligations to DR regarding the DR oneNetwork Services; or (d) any third party claims arising out of the Symantec Program Terms or the Symantec Info-Pack.

Related to By Symantec

  • By Microsoft Microsoft will defend Customer against any third-party claim to the extent it alleges that a Product or Fix made available by Microsoft for a fee and used within the scope of the license granted under this agreement (unmodified from the form provided by Microsoft and not combined with anything else), misappropriates a trade secret or directly infringes a patent, copyright, trademark or other proprietary right of a third party. If Microsoft is unable to resolve a claim of infringement under commercially reasonable terms, it may, as its option, either: (1) modify or replace the Product or fix with a functional equivalent; or (2) terminate Customer’s license and refund any prepaid license fees (less depreciation on a five-year, straight-line basis) for perpetual licenses and any amount paid for Online Services for any usage period after the termination date. Microsoft will not be liable for any claims or damages due to Customer’s continued use of a Product or Fix after being notified to stop due to a third- party claim.

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Linking to the Website and Social Media Features You may link to our homepage, provided you do so in a way that is fair and legal and does not damage our reputation or take advantage of it, but you must not establish a link in such a way as to suggest any form of association, approval, or endorsement on our part. This Website may provide certain social media features that enable you to: • Link from your own or certain third-party websites to certain content on this Website. • Send emails or other communications with certain content, or links to certain content, on this Website. • Cause limited portions of content on this Website to be displayed or appear to be displayed on your own or certain third-party websites. You may use these features solely as they are provided by us, and solely with respect to the content they are displayed with, and otherwise in accordance with any additional terms and conditions we provide with respect to such features. Subject to the foregoing, you must not: • Establish a link from any website that is not owned by you. • Cause the Website or portions of it to be displayed on, or appear to be displayed by, any other site, for example, framing, deep linking, or in-line linking. • Link to any part of the Website other than the homepage. • Otherwise take any action with respect to the materials on this Website that is inconsistent with any other provision of these Terms of Use. The website from which you are linking, or on which you make certain content available, must comply in all respects with the Content Standards set out in these Terms of Use. You agree to cooperate with us in causing any unauthorized framing or linking immediately to stop. We reserve the right to withdraw linking permission without notice. We may disable all or any social media features and any links at any time without notice in our discretion.

  • By Contractor Should the Contractor be liable for any payments to the State hereunder, interest, late payment charges and collection fee charges will be determined and assessed pursuant to Section 18 of the State Finance Law.

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!