Permitted License Uses and Restrictions (a) This Order Form Supplement allows you, as an authorized User under the Master Subscription Agreement, to use the Software on any Supported Device and on no other devices. (b) You may not distribute or make the Software available over a network where it could be used by multiple devices at the same time. (c) With respect to updates to the Software that xxxxxxxxxx.xxx may make available for download, this Order Form Supplement allows you to download such Software updates to update or restore the Software on any Supported Device. (d) Except as and only to the extent permitted by applicable law, or by licensing terms governing use of open-sourced components included with the Software, neither you nor any other Customer personnel may copy, decompile, reverse engineer, disassemble, attempt to derive the source code of, decrypt, modify, or create derivative works of the Software or Software updates, or any part thereof. Any attempt to do so is a violation of the rights of xxxxxxxxxx.xxx and its licensors. If you or any other Customer personnel violate this restriction, you or they, and the Customer, may be subject to prosecution and damages. (e) Neither you nor the Customer may rent, lease, lend, redistribute or sublicense the Software. The Customer may, however, allow other authorized Users under the Master Subscription Agreement to use the Software in connection with a re-assignment of the Supported Device to another authorized User under the Master Subscription Agreement. (f) The Software is available only for Supported Devices, and is not available for all devices. Please check xxx.xxxxxxxxxx.xxx or contact your xxxxxxxxxx.xxx representative to determine whether a specific device-iOS software combination is supported by the Software. (g) In addition to mobile applications offered by xxxxxxxxxx.xxx (and for purposes of this section 5(g), “xxxxxxxxxx.xxx” shall include any Affiliates of xxxxxxxxxx.xxx), xxxxxxxxxx.xxx may offer platforms for the creation of third-party mobile applications, including but not limited to the Salesforce1 platform. Third parties may obtain information from, or access data stored on, Users’ mobile devices to provide services associated with any third-party mobile applications that Users download, install, use, or otherwise interact with over a xxxxxxxxxx.xxx platform. Xxxxxxxxxx.xxx’s mobile applications may also contain links or integrations to other mobile applications provided by third parties. Xxxxxxxxxx.xxx is not responsible for the security and privacy of data collected through third-party mobile applications or the privacy and security practices of the foregoing third parties. (h) Without limiting the generality of anything herein, you acknowledge and agree that the Software may collect user or device data for the purposes of providing services or functions that are relevant to use of the Software.
Ownership and License in Deliverables Unless otherwise specified in a specific Purchase Order concerning procurement of a SaaS product:
Your Billing Rights: Keep this Document for Future Use This notice tells you about your rights and our responsibilities under the Fair Credit Billing Act.
Information Concerning the Fund and SubAdviser From time to time as the Adviser or the Fund may request, the SubAdviser will furnish the requesting party information and reports on portfolio transactions and reports on Fund assets held in the portfolio, all in such detail, form and frequency as the Adviser or the Fund may reasonably request. The SubAdviser will also provide the Adviser with notice and analysis of events that may affect or relate to the valuation of the Fund’s portfolio.
Purchaser Can Protect Its Interest Purchaser represents that by reason of its, or of its management’s, business or financial experience, Purchaser has the capacity to protect its own interests in connection with the transactions contemplated in this Agreement, and the Related Agreements. Further, Purchaser is aware of no publication of any advertisement in connection with the transactions contemplated in the Agreement.
Security Interests in Personal and Mixed Property To the extent not otherwise satisfied pursuant to subsection 4.1F, Administrative Agent shall have received evidence satisfactory to each of them that Company and Subsidiary Guarantors shall have taken or caused to be taken all such actions, executed and delivered or caused to be executed and delivered all such agreements, documents and instruments, and made or caused to be made all such filings and recordings (other than the filing or recording of items described in clauses (iii), (iv) and (v) below) that may be necessary or, in the opinion of Agents, desirable in order to create in favor of Administrative Agent, for the benefit of Lenders, a valid and (upon such filing and recording) perfected First Priority security interest in the entire personal and mixed property Collateral. Such actions shall include the following:
THE ACADEMY The Academy is a Mainstream Academy as defined in clause 1.4 of the Master Agreement.
What Will Happen After We Receive Your Letter When we receive your letter, we must do two things:
Happen After We Receive Your Letter When we receive your letter, we must do two things:
NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.