Licensed Software Section 3.17(f).......................................27
Software Warranty NETGEAR warrants to the end-user that each item of Software, as delivered or updated by NETGEAR and properly installed and operated on the Hardware or other equipment it is originally licensed for, will function substantially as described in its then-current user documentation during its respective warranty period. If any item of Software fails to so perform during its warranty period, as the sole remedy NETGEAR or NETGEAR's supplier will at its discretion provide a suitable fix, patch or workaround for the problem which may be included in a future revision of the Software. For specific Software which is distributed by NETGEAR as a licensee of third parties, additional warranty terms offered by such third parties to end-users may apply.
Third Party Software Customer acknowledges that in order for MyEcheck to perform the Consulting Services, Customer may need to obtain additional third party services ("Third Party Services") or third party technology ("Third Party Technology"). Customer agrees that the rights and licenses with respect to Third Party Technology and Third Party Services shall be under terms set forth in the pertinent purchase, license or services agreements between Customer and the vendors of such Third Party Software or Third Party Services. Customer shall execute and comply with appropriate purchase, license, or services agreements with respect to any Third Party Software or Third Party Services. Any amounts payable to third party vendors or service providers under such agreements are the sole responsibility of Customer and shall be paid directly by Customer to such third party vendors or service providers. MyEcheck Services Agreement
Software Maintenance The Vendor represents and warrants that the Software delivered to the escrow agent pursuant to subsection 11.7 for redelivery to the Owner pursuant to the Escrow Agreement will be in a form suitable for reproduction by the Owner and will include the full Source Code language statement of the Software as used by the Vendor sufficient to allow maintenance and modification.
Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).
Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.
Software License ICS will grant the Business Manager a non-exclusive and royalty-free right and license to use and copy software owned by ICS and to use certain third party software according to the terms of the applicable third party licenses to ICS, all in connection with the Business Manager’s obligations under the Agreement. ICS will provide the Business Manager with all upgrades to the licensed software.
Source Code OEM acknowledges the extreme importance of the confidentiality and trade secret status of the RSA Source Code and OEM agrees, in addition to complying with the requirements of Section 6.1 as it relates to the RSA Source Code, to: (i) only use the RSA Source Code at the address set forth on page 1 hereof or such alternate location specified in the applicable License/Product Schedule; (ii) inform any employee that is granted access to all or any portion of the RSA Source Code of the importance of preserving the confidentiality and trade secret status of the RSA Source Code; and (iii) maintain a controlled, secure environment for the storage and use of the RSA Source Code.
Open Source Software (i) The Company uses and has used any and all software and other materials distributed under a “free,” “open source,” or similar licensing model (including but not limited to the MIT License, Apache License, GNU General Public License, GNU Lesser General Public License and GNU Affero General Public License) (“Open Source Software”) in compliance with all license terms applicable to such Open Source Software; and (ii) the Company has not used or distributed and does not use or distribute any Open Source Software in any manner that requires or has required (A) the Company to permit reverse engineering of any software code or other technology owned by the Company or (B) any software code or other technology owned by the Company to be (1) disclosed or distributed in source code form, (2) licensed for the purpose of making derivative works or (3) redistributed at no charge.
Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.