Third Party Material (a) The Supplier must provide Third Party Material necessary or appropriate to supply the Services.
Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.
Permitted and Prohibited Uses 1.1. The Data may only be used for linguistic education and research, including but not limited to information retrieval, document understanding, machine translation or speech recognition.
Customer Content As part of the Services provided under this Agreement, Customer Data will be stored and processed in the data center region specified in the applicable Ordering Document. Axway shall not access Customer Content except in response to support or technical issues where Customer provides Axway with prior Customer’s written authorization required to access such Customer Content. Axway is not responsible for unauthorized access, alteration, theft or destruction of Customer Content arising from Customer’s own or its authorized users’ actions or omissions in contravention of the Documentation. Customer’s ability to recover any lost data resulting from Axway’s misconduct is limited to restoration by Axway from the most recent back-up.
EXCLUSION OF THIRD PARTY RIGHTS A person who is not a party to this Agreement has no right under the Contracts (Rights of Third Parties) Xxx 0000 to enforce any term of this Agreement, but this does not affect any right or remedy of a third party which exists or is available apart from that Act.
No Additional Work or Material No claim for additional services, not specifically provided in this contract, performed or furnished by the contractor, will be allowed, nor may the contractor do any work or furnish any material not covered by the contract unless the work or material is ordered in writing by the Project Director and approved by the Agency Head.
SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.
Third Party Content Certain of the Service Content may be owned by third parties, as may be designated within the Services from time to time (“Third Party Content”). Our inclusion of any Third Party Content is not an endorsement of such content and we disclaim a l representations and warranties with respect to such Third Party Content in its entirety. Additiona ly, the Services may contain links to other Internet websites and services owned by third parties (“Third Party Services”). Any use of Third Party Services is at your own risk and subject to the terms of use with respect to such Third Party Services. We have no control over Third Party Services, and we disclaim a l representations and warranties with respect to such Third Party Services in their entirety. Any transactions you undertake with Third Party Services, including payment transactions, are solely between you and the applicable Third Party Services. You understand and agree that under no circumstances sha l we be responsible for or liable to anyone in connection with your use of Third Party Services and any transactions conducted with such Third Party Services. You agree to direct any questions, complaints, or claims related to a Third Party Service to such Third Party Service.
E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.
Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.