Common use of Other Use Restrictions and Prohibitions Clause in Contracts

Other Use Restrictions and Prohibitions. Neither You nor Your Named Users shall, directly or indirectly: (i) Decompile, disassemble or reverse engineer the Software or modify, unbundle, or create derivative works based on the Software, except as expressly permitted by applicable law without the possibility of contractual waiver. If the law requires Pulse Secure to provide interface information to You to adapt the Software, Pulse Secure, at its option, may either (A) provide the information to You subject to Your acceptance of non-disclosure and use limitation terms that Pulse Secure reasonably requires, or (B) perform that adaptation itself at a reasonable charge for services; (ii) Copy the Software except for archival purposes or as necessary for You to install and make use of the Software as expressly licensed by Pulse Secure; (iii) Detach or separate any libraries, files, modules or other components embedded within a Software product or within a particular software image You have received even if any such library, file, module or other component is separately licensable, or use any such modules, files or other components separately from the Software product or software image in which it is embedded (except to the extent that a documented feature of the Software product is implemented by doing so); (iv) Furnish any copy of the Software or other means of access to the Software to any third party other than to Your contractor(s) solely for Your benefit in performing contract services for You and in that case only if that contractor has agreed to adhere to the terms of this Agreement. If You do furnish Software or access to Software to Your contractor(s), You shall remain fully and primarily responsible to Pulse Secure for compliance with all provisions of this Agreement; (v) Remove (or, if the license includes the right to make copies of the Software, fail to include in those copies) any readme files notices, disclaimers, marks and labels included in the Software as delivered by Pulse Secure; (vi) Use or allow use of the Software in violation of any applicable law or regulation or to support or facilitate any illegal activity; (vii) Use the Software or allow anyone else to use the Software for benchmarking or other testing not related to Your internal use; (viii) Attempt to gain unauthorized access to the Software or its related systems or networks; (ix) Copy any ideas, features or functions or graphics of the Software; or (x) Use or permit the use of the Software, including by uploading, emailing, posting publishing or otherwise transmitting any material for any purpose that may (a) menace or harass any person or cause damage or injury to any person or property; (b) involve the publication of any material that is false, defamatory, harassing or obscene; (c) violate privacy rights or promote bigotry, racism, hatred or harm; (d) constitute unsolicited bulk email, "junk mail," "spam," or chain letters; (e) constitute an infringement of intellectual property or other proprietary rights, or (f) otherwise violate applicable laws, ordinances, or regulations; and (g) in addition to any other rights afforded under this Agreement, Pulse Secure reserves the right to remove or disable access to any material that violates the foregoing restrictions and shall have no liability to You for taking (or not taking) such action.

Appears in 1 contract

Samples: End User License Agreement (Eula)

AutoNDA by SimpleDocs

Other Use Restrictions and Prohibitions. Neither You nor Your Named Users shall, directly or indirectly: (i) Decompile, disassemble or reverse engineer the Software or modify, unbundle, or create derivative works based on the Software, except as expressly permitted by applicable law without the possibility of contractual waiver. If the law requires Pulse Secure to provide interface information to You to adapt the Software, Pulse Secure, at its option, may either (A) provide the information to You subject to Your acceptance of non-disclosure and use limitation terms that Pulse Secure reasonably requires, or (B) perform that adaptation itself at a reasonable charge for services; (ii) Copy the Software except for archival purposes or as necessary for You to install and make use of the Software as expressly licensed by Pulse Secure; (iii) Detach or separate any libraries, files, modules or other components embedded within a Software product or within a particular software image You have received even if any such library, file, module or other component is separately licensable, or use any such modules, files or other components separately from the Software product or software image in which it is embedded (except to the extent that a documented feature of the Software product is implemented by doing so); (iv) Furnish any copy of the Software or other means of access to the Software to any third party other than to Your contractor(s) solely for Your benefit in performing contract services for You and in that case only if that contractor has agreed to adhere to the terms of this Agreement. If You do furnish Software or access to Software to Your contractor(s), You shall remain fully and primarily responsible to Pulse Secure for compliance with all provisions of this Agreement; (v) Remove (or, if the license includes the right to make copies of the Software, fail to include in those copies) any readme files notices, disclaimers, marks and labels included in the Software as delivered by Pulse Secure; (vi) Use or allow use of the Software in violation of any applicable law or regulation or to support or facilitate any illegal activity; (vii) Use the Software or allow anyone else to use the Software for benchmarking or other testing not related to Your internal use; (viii) Attempt to gain unauthorized access to the Software or its related systems or networks; ; (ix) Copy any ideas, features or functions or graphics of the Software; or (x) Use or permit the use of the Software, including by uploading, emailing, posting publishing or otherwise transmitting any material for any purpose that may (a) menace or harass any person or cause damage or injury to any person or property; (b) involve the publication of any material that is false, defamatory, harassing or obscene; (c) violate privacy rights or promote bigotry, racism, hatred or harm; (d) constitute unsolicited bulk email, "junk mail," "spam," or chain letters; (e) constitute an infringement of intellectual property or other proprietary rights, or (f) otherwise violate applicable laws, ordinances, or regulations; and (g) in addition to any other rights afforded under this Agreement, Pulse Secure reserves the right to remove or disable access to any material that violates the foregoing restrictions and shall have no liability to You for taking (or not taking) such action.

Appears in 1 contract

Samples: End User License Agreement

Other Use Restrictions and Prohibitions. Neither You nor Your Named Users shallshall not, directly or indirectly: (i) a. Decompile, disassemble or reverse engineer the Software or modifyScript Software; b. Modify, unbundle, or create derivative works based on the Script Software, except as expressly permitted by applicable law without the possibility of contractual waiver. If the law requires Pulse Secure to provide interface information to You to adapt the Software, Pulse Secure, at its option, may either (A) provide the information to You subject to Your acceptance of non-disclosure and use limitation terms that Pulse Secure reasonably requires, or (B) perform that adaptation itself at a reasonable charge for servicesin Section 1 herein; (ii) c. Copy the Script Software except for archival purposes or as necessary for You to install and make use of the Script Software as expressly licensed by Pulse SecurePalo Alto Networks; (iii) Detach d. Except as expressly permitted in Section 1 herein, detach or separate any libraries, files, modules or other components embedded within a Script Software product or within a particular software image You you have received even if that any such library, file, module or other component is separately licensable, or use any such modules, files or other components separately from the Script Software product or software image in which it is embedded (except to the extent that a documented feature of the Script Software product is implemented by doing so); (iv) e. Furnish any copy of the Script Software or other means of access to the Script Software to any third party other than to Your contractor(s) solely for Your benefit in performing its contract services for You and in that case only if that contractor has agreed to adhere to the terms of this Agreement. If You do furnish Script Software or access to Script Software to Your contractor(s), You shall remain fully and primarily responsible to Pulse Secure Palo Alto Networks for compliance with all provisions of this Agreement; (v) f. Remove (or, if the license includes the right to make copies of the Script Software, fail to include in those copies) any readme files notices, disclaimers, marks and labels included in the Script Software as delivered by Pulse Secure;Palo Alto Networks; or (vi) g. Use or allow use of the Script Software in violation of any applicable law or regulation or to support or facilitate any illegal activity; (vii) Use the Software or allow anyone else to use the Software for benchmarking or other testing not related to Your internal use; (viii) Attempt to gain unauthorized access to the Software or its related systems or networks; (ix) Copy any ideas, features or functions or graphics of the Software; or (x) Use or permit the use of the Software, including by uploading, emailing, posting publishing or otherwise transmitting any material for any purpose that may (a) menace or harass any person or cause damage or injury to any person or property; (b) involve the publication of any material that is false, defamatory, harassing or obscene; (c) violate privacy rights or promote bigotry, racism, hatred or harm; (d) constitute unsolicited bulk email, "junk mail," "spam," or chain letters; (e) constitute an infringement of intellectual property or other proprietary rights, or (f) otherwise violate applicable laws, ordinances, or regulations; and (g) in addition to any other rights afforded under this Agreement, Pulse Secure reserves the right to remove or disable access to any material that violates the foregoing restrictions and shall have no liability to You for taking (or not taking) such action.

Appears in 1 contract

Samples: Script Software Agreement

AutoNDA by SimpleDocs

Other Use Restrictions and Prohibitions. Neither You nor Your Named Users shall, directly or indirectly: (i) Decompile, disassemble or reverse engineer the Software or modify, unbundle, or create derivative works based on the Software, except as expressly permitted by applicable law without the possibility of contractual waiver. If the law requires Pulse Secure Xxxxxx to provide interface information to You to adapt the Software, Pulse SecureIvanti, at its option, may either (A) provide the information to You subject to Your acceptance of non-disclosure and use limitation terms that Pulse Secure Ivanti reasonably requires, or (B) perform that adaptation itself at a reasonable charge for services; (ii) Copy the Software except for archival purposes or as necessary for You to install and make use of the Software as expressly licensed by Pulse SecureXxxxxx; (iii) Detach or separate any libraries, files, modules or other components embedded within a Software product or within a particular software image You have received even if any such library, file, module or other component is separately licensable, or use any such modules, files or other components separately from the Software product or software image in which it is embedded (except to the extent that a documented feature of the Software product is implemented by doing so); (iv) Furnish any copy of the Software or other means of access to the Software to any third party other than to Your contractor(s) solely for Your benefit in performing contract services for You and in that case only if that contractor has agreed to adhere to the terms of this Agreement. If You do furnish Software or access to Software to Your contractor(s), You shall remain fully and primarily responsible to Pulse Secure Ivanti for compliance with all provisions of this Agreement; (v) Remove (or, if the license includes the right to make copies of the Software, fail to include in those copies) any readme files notices, disclaimers, marks and labels included in the Software as delivered by Pulse SecureXxxxxx; (vi) Use or allow use of the Software in violation of any applicable law or regulation or to support or facilitate any illegal activity; (vii) Use the Software or allow anyone else to use the Software for benchmarking or other testing not related to Your internal use; (viii) Attempt to gain unauthorized access to the Software or its related systems or networks; ; (ix) Copy any ideas, features or functions or graphics of the Software; or (x) Use or permit the use of the Software, including by uploading, emailing, posting publishing or otherwise transmitting any material for any purpose that may (a) menace or harass any person or cause damage or injury to any person or property; (b) involve the publication of any material that is false, defamatory, harassing or obscene; (c) violate privacy rights or promote bigotry, racism, hatred or harm; (d) constitute unsolicited bulk email, "junk mail," "spam," or chain letters; (e) constitute an infringement of intellectual property or other proprietary rights, or (f) otherwise violate applicable laws, ordinances, or regulations; and (g) in addition to any other rights afforded under this Agreement, Pulse Secure reserves the right to remove or disable access to any material that violates the foregoing restrictions and shall have no liability to You for taking (or not taking) such action.

Appears in 1 contract

Samples: End User License Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!