Common use of Compliance Measures Clause in Contracts

Compliance Measures. The Software contains technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network. Licensee shall not, and shall not attempt to, remove, disable, circumvent, or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 2 contracts

Sources: End User License Agreement, End User License Agreement

Compliance Measures. The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network. Licensee shall not, and shall not attempt to, remove, disable, circumvent, or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 2 contracts

Sources: Software End User License Agreement, End User License Agreement (Eula)

Compliance Measures. (a) The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is Software: (a) beyond the scope of the license granted to pursuant to Section 1; or (b) prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network2. Licensee You shall not, and shall not attempt to, remove, disable, circumvent, or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 1 contract

Sources: End User License Agreement

Compliance Measures. The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is Software: beyond the scope of the license granted to under Section 1, prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network2. Licensee You shall not, and shall not attempt to, remove, disable, circumvent, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 1 contract

Sources: End User License Agreement

Compliance Measures. The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network4 (above). Licensee End User shall not, and shall not attempt to, remove, disable, circumvent, or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 1 contract

Sources: Software End User License Agreement

Compliance Measures. Section 5.01 The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network3.01. Licensee shall not, and shall not attempt to, remove, disable, circumvent, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 1 contract

Sources: End User License Agreement

Compliance Measures. The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is Software: (i) beyond the scope of the license granted to pursuant to Section 1; or (ii) prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network2. Licensee You shall not, and shall not attempt to, remove, disable, circumvent, or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 1 contract

Sources: End User License Agreement

Compliance Measures. (a) The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network. Licensee shall not, and shall not attempt to, remove, disable, circumvent, or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 1 contract

Sources: End User License Agreement

Compliance Measures. ‌ A. The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is Software: B. beyond the scope of the license granted to pursuant to Section 1; or C. prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network2. Licensee You shall not, and shall not attempt to, remove, disable, circumvent, or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 1 contract

Sources: License Agreement

Compliance Measures. ‌ (a) The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network. Licensee shall not, and shall not attempt to, remove, disable, circumvent, or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 1 contract

Sources: End User License Agreement

Compliance Measures. 6.1 The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a network. Licensee shall not, and shall not attempt to, remove, disable, circumvent, circumvent or otherwise create or implement any workaround to, any such copy protection or security features.

Appears in 1 contract

Sources: Software End User License Agreement

Compliance Measures. The Software contains may contain technological copy protection or other security features designed to prevent unauthorized use of the Software, including features to protect against any use of the Software that is beyond the scope of the License granted or as prohibited under Section 4, such as electronic tracking of a specific number of unique license keys, authorization codes, or similar mechanisms, and which may be performed over a networkby this AUP. Licensee Customer shall not, and shall not attempt to, remove, disable, circumvent, or otherwise create or implement any workaround to, any such copy protection or security features. This Backup Services Agreement (“BSA”) applies to the provision of all Backup Services provided by ▇▇▇▇ ▇▇▇▇▇▇ Software Inc. (“ABELDent”) to a customer (“Customer”) and forms part of the Customer Terms.

Appears in 1 contract

Sources: Terms of Use