License Grant and Install Limits Sample Clauses

License Grant and Install Limits. Subject to the terms and conditions of this Agreement, Insecure grants Licensee the right to install and use Npcap Technology on the number of computing instances specified by Licensed Installs. This Agreement does not permit the installation or use of more copies of the Software than the number specified by Licensed Installs, nor the installation of the Software on more than the number of computers specified by Licensed Installs at any given time, on a system that allows shared use of applications by more users than the number of copies specified by License Installs, or on any configuration or system of computers that allows more than that many users. The terms "computer" and "machine" in this license include any computing device, including software computing instances such as virtual machines, Docker containers, and cloud instances.
AutoNDA by SimpleDocs

Related to License Grant and Install Limits

  • License Grant If Products include software, firmware or documentation, Supplier grants to DXC a non-exclusive, perpetual, royalty free, worldwide license to use, reproduce, display, prepare derivative works of the documentation and distribute such works, software, firmware or documentation directly or as integrated into DXC products, and to sublicense such rights to third parties. Supplier shall identify all licenses and deliver to DXC all materials required to meet the requirements of any licenses for third party software that is included in the Products. Supplier shall deliver to DXC the source code for any software licensed under a license that has a source availability requirement (such as the GNU General Public License). If the source code is not included with the material that Supplier has previously delivered, Supplier shall deliver within seven (7) days after DXC’s request the source code for any software licensed under an open source license that has a source availability requirement. Supplier grants DXC the right to duplicate and distribute the materials as necessary.

  • License Grants The licenses granted in this Section 2 are subject to the terms and conditions set forth in this XXXX:

  • License Granted Subject to the terms and conditions of this Agreement and in consideration of Licensee’s obligation to pay monetary fees as outlined in Schedule A, such fees which may be adjusted from time to time by mutual written consent of the parties, Licensor hereby grants, and Licensee hereby accepts, a worldwide, non-exclusive, non-transferable, irrevocable, perpetual right and licence, to use the Software and all related documentation for use in sports related mobile apps. Licensor also grants permission to Licensee to make and create customizations, updates or corrections to the Software. The parties agree that Licensor shall continue to own all right, title and interest in and to the Software and all intellectual property rights embodied therein or related thereto including, but not limited to, the source and object codes and any customizations, updates and corrections to the Software. Except as expressly provided herein, no intellectual property rights are granted to Licensee by implication, estoppel, or otherwise. Licensee will safeguard the Software and its related materials with that degree of normal due care commensurate with reasonable standards of industrial security for the protection of trade secrets and proprietary information so that no unauthorized use is made of them and no disclosure of any part of their contents is made to anyone other than Licensee’s employees, agents or consultants whose duties reasonably require such disclosure, or as necessary in the ordinary course of business. Licensee shall make all such persons fully aware of their responsibility to fulfill the obligations of Licensee under this Agreement.

  • Duration of Agreement and Protected Data Upon Termination or Expiration The Master Agreement commences on the date of signature. • Upon expiration of the Master Agreement without renewal, or upon termination of the Master Agreement prior to its expiration, Vendor will securely delete or otherwise destroy any and all Protected Data remaining in the possession of Vendor or any of its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data. If requested by the District, Vendor will assist the District in exporting all Protected Data previously received back to the District for its own use, prior to deletion, in such formats as may be requested by the District. • In the event the Master Agreement is assigned to a successor Vendor (to the extent authorized by the Master Agreement), the Vendor will cooperate with the District as necessary to transition Protected Data to the successor Vendor prior to deletion. • Neither Vendor nor any of its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data will retain any Protected Data, copies, summaries or extracts of the Protected Data, or any de-identified Protected Data, on any storage medium whatsoever. Upon request, Vendor and/or its subcontractors or other authorized persons or entities to whom it has disclosed Protected Data, as applicable, will provide the District with a certification from an appropriate officer that these requirements have been satisfied in full. Challenging Accuracy of Protected Data: Parents or eligible students can challenge the accuracy of any Protected Data provided by the District to Vendor, by contacting the District regarding procedures for requesting amendment of education records under the Family Educational Rights and Privacy Act (FERPA). Teachers or principals may request to challenge the accuracy of APPR data provided to Vendor by following the appeal process in the District’s applicable APPR Plan. Data Storage and Security Protections: Any Protected Data that Vendor receives will be stored on systems maintained by Vendor, or by a subcontractor under the direct control of Vendor, in a secure data center facility located within the United States. The measures that Vendor (and, if applicable, its subcontractors) will take to protect Protected Data include adoption of technologies, safeguards and practices that align with the NIST Cybersecurity Framework, and safeguards associated with industry standards and best practices including, but not limited to, disk encryption, file encryption, firewalls, and password protection.

Time is Money Join Law Insider Premium to draft better contracts faster.