Malicious Technology Sample Clauses

Malicious Technology. Supplier warrants that the Deliverables as delivered and unmodified form will not: (i) contain any Malicious Technology, (ii) contain any files or features that will disable or destroy any functionality of the Deliverables, (iii) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (iv) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If the Supplier is in breach of this subsection, no “right to cure” period will apply. Embarq reserves the right to pursue any available civil or criminal action against Supplier for violation of this provision. Supplier will not install, use or execute any software on any Embarq CPUs without Embarq’s written approval. “
AutoNDA by SimpleDocs
Malicious Technology. Service Provider warrants that the Deliverables or Services will not at the time of leaving the Service Provider’s data center network edge (i) contain any Malicious Technology or Disabling Device, (ii) contain any files or features that will disable or destroy any functionality of the Deliverables or Services, (iii) monitor Sprint’s use of the Deliverables or Services where not specifically permitted in Section 5.9 [Monitoring] of this Fourteenth Amendment or otherwise as part of the Services provided such monitoring is approved by Sprint as part of the Service Provider obligations under this Fourteenth
Malicious Technology. Deliverables will not: (i) contain any Malicious Technology; (ii) contain any files or features that will disable or destroy any functionality of the Deliverables; (iii) monitor use of the Deliverables by Sprint; (iv) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (v) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If Company is in breach of this subsection, [*****] period will apply. Sprint reserves the right to pursue any available civil or criminal action against Company for violation of this provision. Company will not install, use or execute any software on any Sprint CPU without the written approval of Sprint. Company acknowledges that it does not have any right to electronically repossess or use any self-help related to the Deliverables. “Malicious Technology” means any software, electronic, mechanical or other means, device or function, e.g. (key, node, lock, time-out, “back door,” trapdoor,” “booby trap,” “drop dead device,” “data scrambling device,” “Trojan Horse”) that would allow Company or a third party to: (x) monitor or gain unauthorized access to any Sprint system; (y) use any electronic self-help mechanism; or (z) restrict, disable, limit or impair the performance of a Sprint system.
Malicious Technology. The Licensor Products will not: (i) contain any Malicious Technology, (ii) contain any files or features that will disable or destroy any functionality of the Licensor Products, (iii) monitor Pear's or its Users' use of the Integrated Products; (iv) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (v) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If the Licensor is in breach of this Section, no "right to cure" period will apply. Pear reserves the right to pursue any available civil or criminal action against Licensor for violation of this provision. Licensor will not install, use or execute any software on any Pear CPUs without Pear's written approval. "Malicious Technology" means any software, electronic, mechanical or other means, device or function , e.g. (key node, lock, time-out, "back door," trapdoor," "booby trap," "drop dead device," "data scrambling device," "Trojan Horse,") that would allow Licensor or a third party to: (i) monitor or gain unauthorized access to any Pear system, (ii) use any electronic self-help mechanism or (iii) restrict, disable, limit or impair the performance of a Pear system or network.
Malicious Technology. Deliverables will not: (a) contain any Malicious Technology; (b) contain any files or features that will disable or destroy any functionality of the Deliverables; (c) monitor use of the Deliverables by Sprint; (d) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (e) alter, damage or erase any data or computer programs without control of a person operating the computing equipment on which it resides. If Supplier is in breach of this subsection, no “right to cure” period will apply. Sprint reserves the right to pursue any available civil or criminal action against Supplier for violation of this provision. Supplier will not install, use or execute any software on any Sprint CPU without the written approval of Sprint. Supplier acknowledges that it does not have any right to electronically repossess or use any self-help related to the Deliverables. “
Malicious Technology. Deliverables and Systems and any Software, Machines and any other technology or items furnished by Supplier to provide the Services will not (i) contain any Malicious Technology; (ii) contain any files or features that will disable or destroy any functionality of the Deliverables; (iii) monitor use of the Deliverables by Sprint; (iv) replicate, transmit or activate itself without control of a person operating the computing equipment on which it resides; or (v) execute, invoke or activate any Disabling Device. Sprint reserves the right to pursue any available civil or criminal action against Supplier for violation of this provision. Supplier will not install, use or execute any software on any Sprint CPU without the written approval of Sprint. Supplier acknowledges that it does not have any right to electronically repossess or use any self-help related to the Deliverables. “Malicious Technology” means any software, electronic, mechanical or other means, device or function (e.g. key, node, lock, time-out, “back door,” trapdoor,” “booby trap,” “drop dead device,” “data scrambling device,” “Trojan Horse”) that would allow Supplier or a third party to: (x) monitor or gain unauthorized access to any Sprint system; or (y) use any electronic self-help mechanism;

Related to Malicious Technology

  • Third Party Technology The assignment of any applicable license agreements with respect to Third Party Technology are set forth in the General Assignment and Assumption Agreement.

  • Licensed Technology The term "Licensed Technology" shall mean the ------------------- Licensed Patents, plus all improvements thereto developed by Licensor, and all related data, know-how and technology.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you. [ ] List here previous Inventions which you desire to have specifically excluded from the operation of this Agreement. Continue on reverse side if necessary.

  • Licensed Software Section 3.17(f).......................................27

  • Joint Technology The Parties agree that, in order to effectuate the provisions of Section 4.4.2, subject to any exclusive licenses granted hereunder, (a) the non-use provisions of this Article 9 shall not apply to each Party’s use of Joint Technology, and (b) each Party may disclose the Joint Technology to Third Parties who are under terms of confidentiality no less strict than those contained in this Agreement.

  • Technology For purposes of this Agreement, “Technology” means all Software, information, designs, formulae, algorithms, procedures, methods, techniques, ideas, know-how, research and development, technical data, programs, subroutines, tools, materials, specifications, processes, inventions (whether or not patentable and whether or not reduced to practice), apparatus, creations, improvements and other similar materials, and all recordings, graphs, drawings, reports, analyses, and other writings, and other embodiments of any of the foregoing, in any form or media whether or not specifically listed herein. Further, for purposes of this Agreement, “Software” means any and all computer programs, whether in source code or object code; databases and compilations, whether machine readable or otherwise; descriptions, flow-charts and other work product used to design, plan, organize and develop any of the foregoing; and all documentation, including user manuals and other training documentation, related to any of the foregoing.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • New Technology If New Technology becomes available from any source, including Supplier, then KP may evaluate and contract with any supplier so that KP will have access to New Technology at all times. If Supplier cannot offer New Technology at comparable or lower prices, KP may either (a) amend contract pricelist to add Supplier's New Technology at a mutually agreed-upon price; or (b) contract with other suppliers for New Technology. Regardless of whether New Technology is added to this Agreement, Supplier and KP will negotiate in good faith to equitably adjust the pricing for any current Product under this Agreement affected by the New Technology.

  • Patent Rights The term “

  • Proprietary Materials Money Manager shall provide to RIMCo the following Proprietary Materials as requested: • Photographs of Portfolio Manager(s)—please provide a professionally taken color (business) headshot in portrait format. This can be provided as a 5x7 print or 300ppi resolution (or higher) Mac or PC electronic file. • Background/Biographical—please include an approved three to four sentence description of your firm, as well as a 100 word or less biography of each portfolio manager that works on a Xxxxxxx portfolio. Please make sure to identify the lead portfolio manager for each portfolio. • Logos (Trademarks)—please provide us with a 300ppi resolution (or higher) electronic Mac or PC file, preferably an .eps or in its original format—Adobe Photoshop, Freehand, or Illustrator. Include any footnote information and identity guidelines you would like included when we make use of your trademark. Please send these materials along with the appropriate marketing contact information such as their name, email address and phone number to: Xx. Xxxxxxx Xxxxxxx c/x Xxxxxxx Design Group Xxxxxxx Investment Group P.O. Box 1616 Tacoma, WA 98401-1616 U.S.A. Email Address: xxxxxxxx@xxxxxxx.xxx

Time is Money Join Law Insider Premium to draft better contracts faster.