In relation to the Software. (a) the Supplier hereby grants to the Customer, on and subject to the terms and conditions of this agreement, a non-exclusive, non-transferable licence to:
(i) install the Software on Clients at the Sites; and
(ii) allow Authorised Users to access and use the Software solely for the Customer's internal business purposes;
(b) the Customer shall (i) configure, connect and design its network and IT infrastructure (including the security and integrity thereof) in accordance with recognised best practice to mitigate the risk of it being a target or a source of disruptions or network defects or attacks, including having in place at all times industry standard encryption software and adequate and appropriate protections against any Virus; and
In relation to the Software. (a) the Supplier hereby grants to the Customer on and subject to the terms and conditions of this agreement a non-exclusive, non-transferable licence to allow Authorised Users to access the Software through the Hosting Services and to use the Software solely for the Customer's business purposes;
(b) the Customer shall not store, distribute or transmit any Viruses, or any material through the Hosting Services that is unlawful, harmful, threatening, defamatory, obscene, infringing, harassing or racially or ethnically offensive; facilitates illegal activity; depicts sexually explicit images; or promotes unlawful violence, discrimination based on race, gender, colour, religious belief, sexual orientation, disability, or any other illegal activities;
(c) the rights provided under this clause 3.3 are granted to the Customer only, and shall not be considered granted to any subsidiary or holding company of the Customer;
(d) the Customer shall not:
(i) attempt to copy, duplicate, modify, create derivative works from or distribute all or any portion of the Software except to the extent expressly set out in this agreement or as may be allowed by any applicable law which is incapable of exclusion by agreement between the parties; or
(ii) attempt to reverse compile, disassemble, reverse engineer or otherwise reduce to human-perceivable form all or any part of the Software, except as may be allowed by any applicable law which is incapable of exclusion by agreement between the parties; or
(iii) access all or any part of the Software or Hosting Services to build a product or service which competes with the Software and/or the Services (iv) use the Software or Hosting Services to provide services to third parties; or
In relation to the Software. Supplier and Cornerstone and its Affiliates will and do retain all proprietary and intellectual property rights, title and interest in and to the Software and Services. Customer retains all proprietary and intellectual property rights, title and interest in and to Customer Data and Customer Content.