LIMITED SOURCE CODE LICENSES Sample Clauses

LIMITED SOURCE CODE LICENSES. 4.4.1 Subject to the terms and conditions of this Agreement, Intel grants to Symantec a non-exclusive, non transferable, royalty free, internal use only license under Intel's trade secret rights to use the Source Code of the Common Base Agent ("CBA") software as set forth in Exhibit A (i.e. - Common Base Agent Ping Discovery Service and Common Base Agent Network Transport System) for the sole and exclusive purpose of facilitating identification of software bugs and anomalies and providing suggested fixes and workarounds to both Symantec's Licensed Symantec Products customers and Intel, provided that: 4.4.1.1 Symantec shall strictly comply with the Source Code Confidentiality provisions as set forth in Section 18.2.1; 4.4.1.2 No copyright, patent or other intellectual property rights are granted to Symantec pursuant to this Section 4. 4.1. Intel shall provide one (1) copy of the CBA Source Code to Symantec not later than Symantec's first commercial shipment of a Licensed Symantec Product and shall provide Symantec with periodic Source Code updates for the CBA software within a reasonable period following Intel's commercial shipment of a new Release; and 4.4.1.3 Intel shall not provide to Symantec, nor shall Intel be required to obtain for Symantec, the Source Code to any third party software which may be included in the CBA software. Notwithstanding the foregoing, Intel shall notify Symantec of any third party software contained in the CBA software. 4.4.2 Upon reasonable request by Symantec, which shall not be unreasonably denied by Intel, and subject to the terms and conditions of this Agreement, Intel shall, on a case by case basis, grant to Symantec a non-exclusive, non transferable, royalty free license under Intel's Intellectual Property rights to create derivatives of the Source Code of the Common Technology Software solely by porting the Source Code to function with Operating Systems ("OS's") which are not supported by Intel. In conjunction with the foregoing, Intel also grants to Symantec, a non-exclusive, non-transferable, royalty free license under Intel's Intellectual Property rights to copy and distribute the Common Technology Software derivatives in Object Code form only to customers of Licensed Symantec Products. The conditional rights and licenses set forth in this Section 4.4.2 are also subject to the following: 4.4.2.1 Symantec shall strictly comply with the Source Code Confidentiality provisions as set forth in Section 18.2.1; 4.4.2.2 Inte...
AutoNDA by SimpleDocs

Related to LIMITED SOURCE CODE LICENSES

  • SOURCE CODE ESCROW FOR LICENSED PRODUCT If Source Code or Source Code escrow is offered by either Contractor or Product manufacturer or developer to any other commercial customers, Contractor shall either: (i) provide Licensee with the Source Code for the Product; or (ii) place the Source Code in a third party escrow arrangement with a designated escrow agent who shall be named and identified to the State, and who shall be directed to release the deposited Source Code in accordance with a standard escrow agreement acceptable to the State; or (iii) will certify to the State that the Product manufacturer/developer has named the State, acting by and through the Authorized User, and the Licensee, as a named beneficiary of an established escrow arrangement with its designated escrow agent who shall be named and identified to the State and Licensee, and who shall be directed to release the deposited Source Code in accordance with the terms of escrow. Source Code, as well as any corrections or enhancements to such source code, shall be updated for each new release of the Product in the same manner as provided above and such updating of escrow shall be certified to the State in writing. Contractor shall identify the escrow agent upon commencement of the Contract term and shall certify annually that the escrow remains in effect in compliance with the terms of this clause. The State may release the Source Code to Licensees under this Contract who have licensed Product or obtained services, who may use such copy of the Source Code to maintain the Product.

  • Software License The SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE is licensed, not sold.

  • Software Licenses Seller has all necessary licenses to use all material third-party software used in Seller's business, and Seller's use of third-party software does not infringe the rights of any Person.

  • Software Licensing Contractor represents and warrants that the software, if any, as delivered to City, does not contain any program code, virus, worm, trap door, back door, time or clock that would erase data or programming or otherwise cause the software to become inoperable, inaccessible, or incapable of being used in accordance with its user manuals, either automatically, upon the occurrence of licensor-selected conditions or manually on command. Contractor further represents and warrants that all third party software, delivered to City or used by Contractor in the performance of the Contract, is fully licensed by the appropriate licensor.

  • Limited Software Warranty MyECheck represents, warrants, and covenants that: MyECheck warrants to the original end user (“Customer”), and not to subsequent end users, of the Extreme Networks software product (“Software”) that for ninety (90) days from the date of installation of the Software from MyECheck, the Software shall substantially conform with the specification for the Software at the (“Documentation”). MyECheck does not warrant (i) that the Software is error free, (ii) that Customer will be able to operate the Software without problems or interruptions or (iii) that the Software will be free of vulnerability to intrusion or attack. Except for the limited warranty set forth in this section, the Software is provided “AS IS.”

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

  • User License We grant you a non-assignable, non-sublicensable, non-exclusive, worldwide right and license to internally use and install the Software for the number of user(s) set forth in the Order Form for Commercial purposes.

  • End User License Agreement This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. xxxx://xxxxxxxxxxxxxxx.xxx/licenses/by-nc-nd/3.0/ You are free to: Share: to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work).

  • Developer License We grant you a non-assignable, non-sublicensable, non-exclusive, worldwide right and license for the number of Developer(s) indicated in the Order Form to install the Software on any number of Machines in order to internally use the Software to create, develop and test Applications. For clarity, a single Software license may be re-allocated to another Developer in the event that the original Developer is no longer employed by you or has been assigned to a new role where access to the Software will no longer be required on a permanent basis.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!