Hacking of software Sample Clauses

Hacking of software. Only after written consent, The Customer is allowed to perform penetration testing, hacking attempt or reverse engineering on software or cloud services provided with The Products.
AutoNDA by SimpleDocs

Related to Hacking of software

  • IN WITNESS WHEREOF the parties hereto have executed this Agreement as of the day and year first above written.

  • Severability Any provision of this Agreement that is prohibited or unenforceable in any jurisdiction shall, as to such jurisdiction, be ineffective to the extent of such prohibition or unenforceability without invalidating the remaining provisions hereof, and any such prohibition or unenforceability in any jurisdiction shall not invalidate or render unenforceable such provision in any other jurisdiction.

  • Notices Any notice, request or other document required or permitted to be given or delivered to the Holder by the Company shall be delivered in accordance with the notice provisions of the Purchase Agreement.

  • Termination This Agreement may be terminated at any time prior to the Closing:

  • Definitions For purposes of this Agreement:

  • NOW, THEREFORE the parties hereto agree as follows:

  • WHEREAS the Company desires the Warrant Agent to act on behalf of the Company, and the Warrant Agent is willing to so act, in connection with the issuance, registration, transfer, exchange, redemption and exercise of the Warrants; and

  • General The Trustee shall keep proper books of record and account of all the transactions of each Trust under this Indenture at its corporate trust office, including a record of the name and address of, and the Units issued by each Trust and held by, every Unit holder, and such books and records of each Trust shall be open to inspection by any Unit holder of such Trust at all reasonable times during the usual business hours. The Trustee shall make such annual or other reports as may from time to time be required under any applicable state or federal statute or rule or regulations thereunder.

  • Deliverables Upon satisfactory completion of the work authorization, the Engineer shall submit the deliverables as specified in the executed work authorization to the State for review and acceptance.

  • Data Security The Provider agrees to utilize administrative, physical, and technical safeguards designed to protect Student Data from unauthorized access, disclosure, acquisition, destruction, use, or modification. The Provider shall adhere to any applicable law relating to data security. The provider shall implement an adequate Cybersecurity Framework based on one of the nationally recognized standards set forth set forth in Exhibit “F”. Exclusions, variations, or exemptions to the identified Cybersecurity Framework must be detailed in an attachment to Exhibit “H”. Additionally, Provider may choose to further detail its security programs and measures that augment or are in addition to the Cybersecurity Framework in Exhibit “F”. Provider shall provide, in the Standard Schedule to the DPA, contact information of an employee who XXX may contact if there are any data security concerns or questions.

Time is Money Join Law Insider Premium to draft better contracts faster.