We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Custom Code Sample Clauses

Custom Code. Data Virtuality is not required to adapt the Licensed Software to the specific individual needs or the IT environment of a Client, unless the parties have agreed otherwise; however, it can be agreed upon for a fee. Accordingly, for a fee, Data Virtuality agrees to provide supplementary maintenance under the Terms and Conditions for software that is customized by Data Virtuality specifically to meet a Client’s particular needs and not included in the standard version of the Licensed Software (“Custom Software”). Such Custom Software developed under an authorized Statement of Work will incorporate the terms and conditions of this Schedule by reference and include additional Custom Software maintenance fees. Data Virtuality will, at its sole cost and expense, test any such Custom Software for compatibility with Client’s systems.
AutoNDA by SimpleDocs
Custom Code. Includes custom Drupal modules (written by the client or other vendors) or any Drupal modules which aren’t full projects on Xxxxxx.xxx (ex. sandbox projects) and any custom patches made to Drupal core or contrib modules that cause its code not to match an official release on Xxxxxx.xxx.
Custom CodeDuring the Term, Client may make Modifications to ASP Hosted Applications that are specific to Client and not included in the base FIS Software. Such requests will be deemed additional Services under the Agreement under one or more Statements of Work under the Agreement and with reference to this Schedule.
Custom Code. Other than the Custom Work (as described in Section t(i) above), no custom code developed by or for any third party has been incorporated into the Software and the Vendor Group’s current development plans for the Software do not include the incorporation therein of any custom code developed by or for any third party.
Custom Code. The Contractor agrees to provide CSD with a documented copy of CSD current custom code from the Raintree Live/Production system environment, to be used by CSD solely for the purpose of checking and verifying the completeness of the CSD’s custom code in the Raintree Live/Production system environment compared to CSD’s custom code in the associated Test, Development, and Demo environments. Upon request as documented within a NetSuite case, the Contractor shall provide a copy of CSD’s current code.
Custom Code. Compliance does not have an obligation to provide maintenance for such Customer- specific code or the interaction of the Software with such Customer-specific code and disclaims all liability arising from such code.
Custom Code. 4.2.1 All fees included in this document are based on our standard product offering. Any custom code requested will be priced based on the current Vital Information System and Programming rates.
AutoNDA by SimpleDocs
Custom CodeNo custom code developed by or for any third party has been incorporated into the Software and the Corporation’s and its Subsidiaries’ current development plans for the Software do not include the incorporation therein of any custom code developed by or for any third party.

Related to Custom Code

  • Custom Branding for Directory Assistance is not available for certain classes of service, including but not limited to Hotel/Motel services, WATS service and certain PBX services.

  • PROTECTION OF YOUR CONTENT 5.1 In order to protect Your Content provided to Oracle as part of the provision of the Services, Oracle will comply with the applicable administrative, physical, technical and other safeguards, and other applicable aspects of system and content management, available at xxxx://xxx.xxxxxx.xxx/us/corporate/contracts/cloud-services/index.html. 5.2 To the extent Your Content includes Personal Data (as that term is defined in the applicable data privacy policies and the Data Processing Agreement (as that term is defined below)), Oracle will furthermore comply with the following: a. the relevant Oracle privacy policies applicable to the Services, available at xxxx://xxx.xxxxxx.xxx/us/legal/privacy/overview/index.html; and b. the applicable version of the Data Processing Agreement for Oracle Services (the “Data Processing Agreement”), unless stated otherwise in Your order. The version of the Data Processing Agreement applicable to Your order (a) is available at xxxxx://xxx.xxxxxx.xxx/corporate/contracts/cloud- services/contracts.html#data-processing and is incorporated herein by reference, and (b) will remain in force during the Services Period of Your order. In the event of any conflict between the terms of the Data Processing Agreement and the terms of the Service Specifications (including any applicable Oracle privacy policies), the terms of the Data Processing Agreement shall take precedence.

  • Cybersecurity; Data Protection The Company’s information technology assets and equipment, computers, systems, networks, hardware, software, websites, applications, and databases (collectively, “IT Systems”) are adequate for, and operate and perform in all material respects as required in connection with the operation of the business of the Company as currently conducted, free and clear of all material bugs, errors, defects, Trojan horses, time bombs, malware and other corruptants. The Company has implemented and maintained commercially reasonable controls, policies, procedures, and safeguards to maintain and protect its material confidential information and the integrity, continuous operation, redundancy and security of all IT Systems and data (including all personal, personally identifiable, sensitive, confidential or regulated data (“Personal Data”)) used in connection with its business, and there have been no breaches, violations, outages or unauthorized uses of or accesses to same, except for those that have been remedied without material cost or liability or the duty to notify any other person, nor any incidents under internal review or investigations relating to the same. The Company is presently in material compliance with all applicable laws or statutes and all judgments, orders, rules and regulations of any court or arbitrator or governmental or regulatory authority, internal policies and contractual obligations relating to the privacy and security of IT Systems and Personal Data and to the protection of such IT Systems and Personal Data from unauthorized use, access, misappropriation or modification, except where the failure to be in compliance would not, individually or in the aggregate, have a Material Adverse Effect.

  • Custom Products Effective upon creation of Custom Products, Contractor hereby conveys, assigns and transfers to Authorized User the sole and exclusive rights, title and interest in Custom Product(s), whether preliminary, final or otherwise, including all trademark and copyrights. Contractor hereby agrees to take all necessary and appropriate steps to ensure that the Custom Products are protected against unauthorized copying, reproduction and marketing by or through Contractor, its agents, employees, or Subcontractors. Nothing herein shall preclude the Contractor from otherwise using the related or underlying general knowledge, skills, ideas, concepts, techniques and experience developed under a Purchase Order, project definition or work order in the course of Contractor’s business. Authorized User may, by providing written notice thereof to the Contractor, elect in the alternative to take a non-exclusive perpetual license to Custom Products in lieu of Authorized User taking exclusive ownership and title to such Products. In such case, Licensee on behalf of all Authorized Users shall be granted a non-exclusive perpetual license to use, execute, reproduce, display, perform, adapt and distribute Custom Product as necessary to fully effect the general business purpose(s) as stated in paragraph (b)(i)(2), above.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Protection of Your Data We will maintain administrative, physical, and technical safeguards for protection of the security, confidentiality and integrity of Your Data, as described in the Documentation. Those safeguards will include, but will not be limited to, measures for preventing access, use, modification or disclosure of Your Data by Our personnel except (a) to provide the Purchased Services and prevent or address service or technical problems, (b) as compelled by law in accordance with Section 8.3 (Compelled Disclosure) below, or (c) as You expressly permit in writing.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Custom Modifications In the event the Fund desires custom modifications in connection with its use of the System, the Fund shall make a written request to State Street providing specifications for the desired modification. Any custom modifications may be undertaken by State Street in its sole discretion in accordance with the Fee Schedule.

  • Privacy and Data Protection 8.1 The Receiving Party undertakes to comply with South Africa’s general privacy protection in terms Section 14 of the Xxxx of Rights in connection with this Bid and shall procure that its personnel shall observe the provisions of such Act [as applicable] or any amendments and re-enactments thereof and any regulations made pursuant thereto. 8.2 The Receiving Party warrants that it and its Agents have the appropriate technical and organisational measures in place against unauthorised or unlawful processing of data relating to the Bid and against accidental loss or destruction of, or damage to such data held or processed by them.

  • PROTECTION OF WORK AND PROPERTY Contractor shall erect and properly maintain at all times, as required by conditions and progress of the Work, all necessary safeguards, signs, barriers, lights, and security persons for protection of workers and the public, and shall post danger signs warning against hazards created by the Work. In an emergency affecting life and safety of life or of Work or of adjoining property, Contractor, without special instruction or authorization from District, is permitted to act at his discretion to prevent such threatened loss or injury.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!