Lock and Key. The Customer commits itself to keep copies of the Software, crypto- graphic hardware components or other material safety provisions that are not (yet) deployed or no longer deployed with a Server and that are consequently unprotected by access restrictions to Servers (cf. 5.2.1) under lock and key. Likewise, access information for downloads and electronic transactions as well as activation keys, Subscription-binaries etc. are to be protected effectively against unauthorised access or dissemination. The information and safeguards may only be issued to authorised staff who have been instructed as to the illegality of dissemination and the creation of copies. Breaches of these lock and key requirements must be immediately re- ported to the Vendor.
Appears in 2 contracts
Samples: Software Subscription Agreement, Software Subscription Agreement
Lock and Key. The Customer commits itself to keep copies of the Software, crypto- graphic hardware components or other material safety provisions that are not (yet) deployed or no longer deployed with a Server server and that are consequently unprotected by access restrictions to Servers servers (cf. 5.2.1) under lock and key. Likewise, access information for downloads and electronic transactions as well as activation keys, Subscriptionsubscription-binaries etc. are to be protected effectively against unauthorised unauthorized access or dissemination. The information and safeguards may only be issued to authorised authorized staff who have been instructed as to the illegality of dissemination and the creation of copies. Breaches of these lock and key requirements must be immediately re- ported to the VendorMeetingSphere.
Appears in 1 contract
Samples: Software Subscription Agreement
Lock and Key. The Customer commits itself to keep copies of the Software, crypto- graphic hardware components or other material safety provisions that are not (yet) deployed or no longer deployed with a Server server and that are consequently unprotected by access restrictions to Servers servers (cf. 5.2.1) under lock and key. Likewise, access information for downloads and electronic transactions as well as activation keys, Subscriptionsubscription-binaries etc. are to be protected effectively against unauthorised access or dissemination. The information and safeguards may only be issued to authorised staff who have been instructed as to the illegality of dissemination and the creation of copies. Breaches of these lock and key requirements must be immediately re- ported to the VendorMeetingSphere.
Appears in 1 contract
Samples: Software Subscription Agreement