Cisco Technology Generally. Unless expressly agreed by Cisco, You may not (a) transfer, sell, sublicense, monetize or make the functionality of any Cisco Technology available to any third party; (b) use the Software on second hand or refurbished Cisco equipment not authorized by Cisco, or use Software that is licensed for a specific device on a different device (except as permitted under Cisco’s Software License Portability Policy); (c) remove, modify, or conceal any product identification, copyright, proprietary, intellectual property notices or other marks; (d) reverse engineer, decompile, decrypt, disassemble, modify, or make derivative works of the Cisco Technology; or (e) use Cisco Content other than as part of Your permitted use of the Cisco Technology.
Cisco Technology Generally. Unless expressly agreed by Xxxxx, You may not:
Cisco Technology Generally. Except as permitted herein and in Your Approved Source’s Enterprise Agreement Program Terms with Cisco, and except as otherwise expressly agreed in writing by Cisco, You may not:
Cisco Technology Generally. Unless expressly agreed by Cisco, You may not: (a) transfer, sell, sublicense, monetize or make the functionality of any Cisco Technology available to any third party; (b) use the Software on second hand or refurbished Cisco equipment not authorized by Cisco, or use Software licensed for a specific device on a different device (except as permitted under Cisco’s Software License Portability Policy); (c) remove, modify, or conceal any product identification, copyright, proprietary, intellectual property notices or other marks; (d) reverse engineer, decompile, decrypt, disassemble, modify, or make derivative works of the Cisco Technology; or 3.2 (e) use Cisco Content other than as part of Your permitted use of the Cisco Technology. Cloud Services. You will not intentionally: (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial-of-service attack, unauthorized access, penetration testing, crawling or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively affects operation of the Cloud Service; or (d) submit any information that is not contemplated in the applicable Documentation.