License of Non-EmTech Source Code Sample Clauses

License of Non-EmTech Source Code. EmTech shall have the right, and to the maximum extent required is hereby granted a perpetual, exclusive, royalty-free, fully paid-up, transferable, unlimited, irrevocable and worldwide license, to disclose and display to authorized programmers, all such portions of the Non- EmTech Source Code, upon its release from escrow, that an authorized programmer would reasonably need to complete both an estimate for and the performance of services to maintain and use and otherwise employ the Non-EmTech Source Code, subject only to Article 5. If EmTech selects such authorized programmers to perform the services to maintain, use or otherwise Employ the Non-EmTech Source Code following its release from escrow, EmTech shall have the further right to deliver and disclose the Non-EmTech Source Code to the selected authorized programmers for the purpose of allowing the authorized programmers to make modifications and enhancements to, and create derivative works and improvements of, the Pre-existing Material and the Deliverables (including adding to the Deliverables modules or features of the Software not previously included in the Deliverables), the right, title and interest in and to all of which shall vest in EmTech, subject only to Article 5.
AutoNDA by SimpleDocs

Related to License of Non-EmTech Source Code

  • SOFTWARE LICENSE GRANT Where Product is acquired on a licensed basis the following shall constitute the license grant:

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

  • Software License Agreement 1) Customers acquiring software licenses under the Contract shall hold, use and operate such software subject to compliance with the Software License Agreement set forth in Appendix D of this Contract. No changes to the Software License Agreement terms and conditions may be made unless previously agreed to between Vendor and DIR. Customers may not add, delete or alter any of the language in Appendix D; provided however, that a Customer and Vendor may agree to additional terms and conditions that do not diminish a term or condition in the Software License Agreement, or in any manner lessen the rights or protections of Customer or the responsibilities or liabilities of Vendor. Order Fulfiller shall make the Software License Agreement terms and conditions available to all Customers at all times. 2) Compliance with the Software License Agreement is the responsibility of the Customer. DIR shall not be responsible for any Customer’s compliance with the Software License Agreement. If DIR purchases software licenses for its own use under this Contract, it shall be responsible for its compliance with the Software License Agreement terms and conditions.

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Software License The SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE is licensed, not sold.

  • SOFTWARE PRODUCT LICENSE The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold.

  • Intellectual Property Rights and Confidentiality Clauses 3.1 Party A shall have exclusive and proprietary ownership, rights and interests in any and all intellectual properties arising out of or created during the performance of this Agreement, including but not limited to copyrights, patents, patent applications, software, technical secrets, trade secrets and others. Party B shall execute all appropriate documents, take all appropriate actions, submit all filings and/or applications, render all appropriate assistance and otherwise conduct whatever is necessary as deemed by Party A at its sole discretion for the purposes of vesting any ownership, right or interest of any such intellectual property rights in Party A, and/or perfecting the protections for any such intellectual property rights in Party A. 3.2 The Parties acknowledge that the existence and the terms of this Agreement and any oral or written information exchanged between the Parties in connection with the preparation and performance of this Agreement are regarded as confidential information. Each Party shall maintain confidentiality of all such confidential information, and without obtaining the written consent of the other Party, it shall not disclose any relevant confidential information to any third party, except for the information that: (a) is or will be in the public domain (other than through the receiving Party’s unauthorized disclosure); (b) is under the obligation to be disclosed pursuant to the applicable laws or regulations, rules of any stock exchange, or orders of the court or other government authorities; or (c) is required to be disclosed by any Party to its shareholders, directors, employees, legal counsels or financial advisors regarding the transaction contemplated hereunder, provided that such shareholders, directors, employees, legal counsels or financial advisors shall be bound by the confidentiality obligations similar to those set forth in this Section. Disclosure of any confidential information by the shareholders, director, employees of or agencies engaged by any Party shall be deemed disclosure of such confidential information by such Party and such Party shall be held liable for breach of this Agreement.

  • Confidentiality and Intellectual Property Rights (a) The parties acknowledge that the information which the disclosing party submits to the receiving party in connection with this Agreement includes disclosing party's confidential and proprietary information, both of a technical and commercial nature. Receiving party agrees not to disclose such information to third parties without disclosing party's prior written consent. (b) The intellectual property rights, copyrights and other rights connected therewith, in respect of drawings, specifications, documents, data and software made available by the Seller to the Buyer shall be owned solely by the Seller and shall remain its property. Buyer is not allowed to permit any third party to fabricate the Products or any parts thereof. (c) The Buyer is obliged to inform the Seller of any intellectual property rights that may exist with respect to the Equipment if Services are rendered for Equipment not supplied by the Seller. In case of third-party claims that may be asserted on the grounds of the existence of intellectual property rights on the Equipment or Products not delivered by the Seller, the Buyer shall indemnify and hold harmless the Seller against any such claims. (d) With regard to software the Seller grants to the Buyer a non-exclusive and non-transmissible right to use the intellectual property right, in machine-readable, object code form, on one system limited to the operation of the agreed Equipment. The software license shall be unlimited in time and free of charge, if not otherwise agreed. Neither the Buyer nor any third party shall modify, reproduce, translate, reverse engineer, transfer from object code to the source code or decompile the Seller´s software. The license does not entitle the Buyer to use the software for any equipment other than the agreed Equipment, to grant sub-licenses or to copy the software documents without the Seller ´s prior written consent. The Buyer is only entitled to make a single copy for backup purposes to be able to reload the system limited to the one agreed Equipment. If the Buyer exchanges the agreed Equipment, new software has to be purchased and installed. In case of termination of the Agreement the license terminates and all copies of the software and the documentation shall be returned to the Seller promptly after termination.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!