Software License The SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE is licensed, not sold.
Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).
Technical Interfaces 3.2.6.1 The Interconnection facilities provided by each Party shall be formatted using either Alternate Xxxx Inversion (AMI) line code with Superframe format framing or Bipolar 8-Zero Substitution with Extended Superframe (B8ZS ESF) format framing or any mutually agreeable line coding and framing.
Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Software Licensing Contractor represents and warrants that the software, if any, as delivered to City, does not contain any program code, virus, worm, trap door, back door, time or clock that would erase data or programming or otherwise cause the software to become inoperable, inaccessible, or incapable of being used in accordance with its user manuals, either automatically, upon the occurrence of licensor-selected conditions or manually on command. Contractor further represents and warrants that all third party software, delivered to City or used by Contractor in the performance of the Contract, is fully licensed by the appropriate licensor.
User Content 13.1 The Site permits the submission and posting of questions and answers in connection with Evaluation Processes and may also permit the submission and posting of other text and/or other content submitted by you and other users (all of the foregoing, collectively, “User Submissions”), and the hosting, sharing, and/or publishing of such User Submissions. You understand that whether or not such User Submissions are published, the Company does not guarantee any confidentiality with respect to any User Submissions. You acknowledge that you shall not be due any remuneration in connection with your User Submissions from the Company or from any other User. 13.2 You shall be solely responsible for your own User Submissions and the consequences of posting or publishing them. In connection with your User Submissions, you affirm, represent, and/or warrant that: (i) your submission of User Submissions and the publication and use thereof by the Company does not violate the copyrights, trade secrets rights or other intellectual property rights of any third party, nor shall it constitute or result in a breach of any duty or obligation of confidentiality owed by you to any third party, and (ii) you have the written consent, release, and/or permission of each and every identifiable individual person in the User Submission to use the name or likeness of each and every such identifiable individual person to enable inclusion and use of the User Submissions in the manner contemplated by the Company and this Agreement. 13.3 By submitting User Submissions to the Site, you hereby grant to the Company a perpetual, irrevocable, worldwide, royalty-free, transferable, sublicensable right and license to use, reproduce, modify, distribute and exploit such User Submission in any manner and in any form of media, whether currently or hereafter existing. You represent and warrant that you have all necessary right, title and interest in and to each such User Submission to validly grant such license to the Company. 13.4 In connection with User Submissions and any other transmission of messages or material facilitated by the Site, you further agree that you will not: (i) submit or transmit material that is not authorized by the copyright owner, protected by trade secret or otherwise subject to third party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from their rightful owner to post the material and grant the rights granted to the Company in Section 13.3 above; (ii) publish or transmit falsehoods or misrepresentations that could damage the Company or any third party; (iii) submit or transmit material that is unlawful, defamatory, libelous, threatening, pornographic, harassing, hateful, racially or ethnically offensive or encourages conduct that would be considered a criminal offense, give rise to civil liability, violate any law or is otherwise inappropriate; (iv) post or transmit advertisements or solicitations of business; or (v) impersonate another person. If notified by a user or a content owner of a User Submission that allegedly does not conform to this Agreement, the Company may investigate the allegation and determine in good faith and in its sole discretion whether to remove the User Submission, which it reserves the right to do at any time. Additionally, the Company may, at any time, remove any User Submission that in the sole judgment of the Company violates this Agreement. 13.5 User Submissions may be provided by (without limitation) Users who are members of a Start-Up management team, contacts referred by Start-Ups (including without limitation customers, scientific advisors, background references, suppliers and distributors), external experts referred by the Company. The insights, recommendations, views and other content reflected in a User Submission should be taken as opinion rather than statements of facts. Investors should conduct their own diligence before making an investment. Nothing contained in a User Submission constitutes tax, legal, insurance or investment advice, or the recommendation of or an offer to sell, or the solicitation of an offer to buy or invest in, any investment product, vehicle, service or instrument. Such an offer or solicitation may only be made by delivery to a prospective investor of formal offering materials, including subscription or account documents or form, which should be reviewed carefully by any such investor before making the decision to invest in any particular company issuer listed, reviewed or discussed on the Propel(x) platform. To the maximum extent permitted under applicable law, you hereby release Propel(x) (and our officers, directors, agents, investors, subsidiaries, and employees) and each other User from any and all claims, demands, liabilities, losses or damages (whether direct, indirect, consequential, incidental or otherwise) of every kind and nature, known and unknown, suspected or unsuspected, arising out of or in any way related to User Submissions (including your reliance thereon). You acknowledge that, in connection with the foregoing release, you hereby irrevocably waive all rights granted to you under Section 1542 of the California Civil Code or any analogous applicable state or federal law or regulation. Said Section 1542 of the Civil Code of the State of California reads as follows:
Software Licence The following licence terms apply whether HP provides software to Customer as part of a managed service or as a separate software transaction.
Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.