Limited Use Proprietary Programs Sample Clauses

Limited Use Proprietary Programs. If the Deployment Programs listed in section A are used for internet hosting purposes as specified in section F.2, they are limited use proprietary programs and may only be used with your proprietary application(s) as defined on Exhibit D, Proprietary Application Hosting Registration Form.
AutoNDA by SimpleDocs
Limited Use Proprietary Programs. The programs listed in section A are limited use proprietary programs. These programs may only be used with your proprietary application(s) as defined on the attached Proprietary Application Hosting Registration Form
Limited Use Proprietary Programs. The following programs listed in section A above and marked with an asterisk (*) are limited use proprietary programs: Oracle Database Enterprise Edition—Processor Perpetual—Limited Use Proprietary* and Internet Application Server Java Edition—Processor Perpetual -Limited Use Proprietary*. These programs may only be used with your proprietary application, NetSuite, as defined on Exhibit A, Proprietary Application Hosting Registration Form. [**].
Limited Use Proprietary Programs. If the Deployment Programs listed in section A are used for internet hosting purposes as specified in section F.2, they are limited use proprietary programs and may only be used with your proprietary application(s) as defined on Exhibit D, Proprietary Application Hosting Registration Form. Technical Contact Xxxx Xxxxxxxx Contract Administrator Xxxx Xxxxxxxx Location 0000 Xxxxxx Xxxxx Xxxxx 000 Xxx Xxxxx, XX 00000 Location 0000 Xxxxxx Xxxxx Xxxxx 000 Xxx Xxxxx, XX 00000 Phone 000.000.0000 Phone 000.000.0000 Email Address xxxxxxxx@xxxxxxxx.xxx Email Address xxxxxxxx@xxxxxxxx.xxx This quote is valid through October 31, 2007, and shall become binding upon execution by you and acceptance by Oracle. Signature /s/ Xxxxx XxXxxxxx Signature /s/ Xxxxxx X. Xxxxx Name Xxxxx XxXxxxxx Name Xxxxxx X. Xxxxx Title CFO Title Manager, License Contracts Signature Date 31-Oct-07 Signature Date October 31, 2007 Effective Date 31-Oct-07 (to be completed by Oracle) Oracle Database Enterprise Edition – Processor 1 [**] [**] Oracle Real Application Clusters – Processor 1 [**] [**] Oracle Partitioning – Processor 1 [**] [**] Oracle Diagnostic Management Pack – Processor 1 [**] [**] Oracle Tuning Management Pack – Processor 1 [**] [**] Internet Application Server Java Edition – Processor 1 [**] [**] Coherence Grid Edition – Processor 1 [**] [**] Coherence Real Time Client – Processor 1 [**] [**] Data Mining – Processor 1 [**] [**] Oracle Database Enterprise Edition [**] Processor 14437688 Internet Application Server Java Edition [**] Processor 14437688 Oracle Database Enterprise Edition [**] Processor 14437688 Oracle Database Enterprise Edition [**] Processor 14437688 Oracle Database Enterprise Edition [**] Processor 15487628 Internet Application Server Java Edition [**] Processor 15487628 Internet Application Server Java Edition [**] Processor 13489791 [**] – Confidential treatment has been requested for the bracketed portions. The confidential redacted portion has been omitted and filed separately with the Securities and Exchange Commission. USA Oracle Database Enterprise Edition [**] Processor Oracle Real Application Clusters [**] Processor Oracle Partitioning [**] Processor Oracle Diagnostic Management Pack [**] Processor Oracle Tuning Management Pack [**] Processor Internet Application Server Java Edition [**] Processor Coherence Grid Edition [**] Processor Coherence Real Time Client [**] Processor Data Mining [**] Processor [**] – Confidential treatment has been requested for t...

Related to Limited Use Proprietary Programs

  • Proprietary Property All modeling algorithms, tools, computer programs, know-how, methodologies, processes, technologies, ideas, concepts, skills, routines, subroutines, operating instructions and other materials and aides used in performing the duties set forth in Section 2.02 that relate to advice regarding current and potential Assets, and all modifications, enhancements and derivative works of the foregoing.

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

  • Contract Database Metadata Elements Title: Great Neck Union Free School District and Great Neck Paraprofessionals Association (2011) Employer Name: Great Neck Union Free School District Union: Great Neck Paraprofessionals Association Local: Effective Date: 07/01/2011 Expiration Date: 06/30/2015 PERB ID Number: 5132 Unit Size: Number of Pages: 28 For additional research information and assistance, please visit the Research page of the Catherwood website - xxxx://xxx.xxx.xxxxxxx.xxx/library/research/ For additional information on the ILR School - xxxx://xxx.xxx.xxxxxxx.xxx/ ARTICLE# TITLE PAGE# Preamble 2 Article 1 Association Rights 2 Article 2 Board-Administration-Association Relationship and Procedures 4 Article 3 Exchange of Proposals 6 Article 4 Professionals Duties and Responsibilities of Paraprofessionals 7 Article 5 Work Assignments 8 Article 6 Annual Appointment 10 Article 7 Selection and Promotion 10 Article 8 Evaluations and Standards 11 Article 9 Procedures for Termination of Employment 11 Article 10 Conferences 12 Article 11 Human Resource File 12 Article 12 Professional Growth 13 Article 13 Sick Leave 14 Article 14 Personal Leave 16 Article 15 Other Leaves 17 Article 16 Grievance Procedures 18 Article 17 Legal Assistance 19 Article 18 Conformity to Law 19 Article 19 Health Insurance 20 Article 20 Retirement Plan 20 Article 21 Salary Schedule 21 Article 22 Seniority Policy 23 Article 23 Compensation for Financial Loss 24 Article 24 Duration of Agreement 25 Appendix A Determination of Negotiating Unit 25 Appendix B Payroll Deduction Authorization 26 Appendix C Bus Aides 26 Appendix D Salary Schedules 27

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.

  • Third Party Proprietary Data The Disclosing Party's Third Party Proprietary Data, if any, will be identified in a separate technical document.

  • Software License Agreement 1) Customers acquiring software licenses under the Contract shall hold, use and operate such software subject to compliance with the Software License Agreement set forth in Appendix D of this Contract. No changes to the Software License Agreement terms and conditions may be made unless previously agreed to between Vendor and DIR. Customers may not add, delete or alter any of the language in Appendix D; provided however, that a Customer and Vendor may agree to additional terms and conditions that do not diminish a term or condition in the Software License Agreement, or in any manner lessen the rights or protections of Customer or the responsibilities or liabilities of Vendor. Order Fulfiller shall make the Software License Agreement terms and conditions available to all Customers at all times. 2) Compliance with the Software License Agreement is the responsibility of the Customer. DIR shall not be responsible for any Customer’s compliance with the Software License Agreement. If DIR purchases software licenses for its own use under this Contract, it shall be responsible for its compliance with the Software License Agreement terms and conditions.

  • Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Proprietary Data NASDAQ OMX grants to Subscriber a nonexclusive, non-transferable license during the term of the Agreement to receive and use the Information transmitted to it by Distributor and thereafter, to use such Information as permitted under the terms of this Agreement and/or the NASDAQ OMX Requirements. Subscriber acknowledges and agrees that NASDAQ OMX has proprietary rights to the Information that originates on or derives from markets regulated or operated by NASDAQ OMX, and compilation or other rights to Information gathered from other sources. Subscriber further acknowledges and agrees that NASDAQ OMX 's third-party information providers have exclusive proprietary rights to their respective Information. In the event of any misappropriation or misuse by Subscriber or anyone who accesses the Information through Subscriber, NASDAQ OMX or its third-party information providers shall have the right to obtain injunctive relief for its respective materials. Subscriber will attribute source as appropriate under all the circumstances.

  • Software License The SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE is licensed, not sold.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!