Party Software Sample Clauses

Party Software. The Provider represents and warrants that, to its knowledge, the Software does not violate any right to the Third-Party Software.
AutoNDA by SimpleDocs
Party Software. The use of the Third-Party Software by you and your End Users is governed by the terms of any licence agreement that may accompany or be included with that Third-Party Software. You appoint us as your agent to accept the terms of such licences on your behalf. You are responsible for ensuring that End Users comply with such licence agreements.
Party Software. The Software which is distributed to you may include various third party software components or software services (“Third Party Software” and together with the Software, the “Package”) which are provided under separate license terms (the “Third Party Terms”), as may be described in more detail in the “Notices.txt” file (if applicable) included in the Documentation. You are permitted to use the Third Party Software in conjunction with the Software, provided that such use is consistent with the terms of this Agreement. You may have broader rights to use the Third Party Software under the applicable Third Party Terms. Nothing in this Agreement is intended to impose further restrictions on your use of the Third Party Software in accordance with any Third Party Terms. The Software may also enable interoperation with certain other third party operating systems and applications. Develatio does not provide you with any such third party licenses and it is solely your responsibility to obtain all necessary software licenses from respective vendors.
Party Software. The Cyberbit Range may incorporate IBM’s QRadar SIEM (“QRadar”), the use of which is subject to the terms and conditions of the specific license under which it is distributed, available for your review at xxxxx://xxx-00.xxx.xxx/software/sla/sladb.nsf/pdf/ipla/$file/ipla_en.pdf (“IPLA”). You will defend, indemnify and hold Cyberbit harmless from and against any and all liability or claim arising from or in connection to your violation of any Third Party’s rights and/or your misuse of Third-Party’s Software and/or your breach of Third Party’s license agreement.
Party Software. From time to time, we may offer third-party software tools and products that you may elect to install on your computer (collectively "Third-Party Software"). Digital Banking may also provide a download option for Accounts that allows you to download certain information into Quicken™, QuickBooks™, and Microsoft™ Excel if you have installed one or more of these programs on your computer. You are responsible for obtaining a valid and separate license agreement with the provider of the Third-Party Software. When using Third-Party Software to download certain information about your Accounts, certain limitations and restrictions apply, including, without limitation: • account information in your Accounts may reflect transactions as of a prior time period and may not be current as of the point in time that you download such information; • statements generated by us are the official record of account transactions, positions and balances, and that the information you download is for tracking purposes only and should not be considered an official record; • information you can download may not include all of your account activity; • not all of the information in your Accounts can be downloaded into your Third-Party Software; • the account information that you download to your Third-Party Software will not be automatically updated by us, and you agree and acknowledge that you will have to update the Account information by downloading more current information from your Accounts; and You agree and understand that: • you assume all risk that any Third-Party Software you download and install, or any information you enter into the Third-Party Software or download using the Third-Party Software may be accessed by unauthorized third parties; • if you use the Third-Party Software to transmit information, you and the Third-Party-Software provider are responsible for the security and confidentiality of that information; • the Account information you download through Third-Party Software is provided to you "as is" and "as available”; • you are solely responsible for acquiring and maintaining a computer or other electronic device that has capabilities of handling and accessing the Third-Party Software, including any necessary equipment such as a modem, and that you are responsible for all costs associated with accessing the Third-Party Software; • we are not liable for any loss, damages or expenses of any kind as a result of your reliance upon the Account information downloaded t...
Party Software. Open source software licenses for components of the Service released under an open source license constitute separate written agreements. To the limited extent that the open source software licenses expressly supersede this Agreement, the open source licenses govern Customer’s agreement with NextRequest for the use of the components of the Service released under an open source license. For the avoidance of doubt, the owners of the open source licenses do not have access to Customer Content or Requester Content. Customer Content. As between Customer and NextRequest, Customer retains ownership of all Intellectual Property in Customer Content. Customer grants to NextRequest, its Service Providers and each of NextRequest’s respective subsidiaries, affiliates, and successors a worldwide, non-exclusive, royalty-free, fully-paid, transferable, irrevocable, perpetual, unlimited, and sub-licensable right to use, host, store, cache, reproduce, publish, publicly display, perform, distribute, transmit, translate, publicly perform, adapt, and modify Customer Content, in all media now known or later developed, for the purpose of providing, maintaining, operating, or improving the Service. NextRequest and its Service Providers may access or use Customer Content as necessary to maintain or provide the Service, comply with the law or an order of a governmental body, as permitted under Section 6 Requester Content. NextRequest and/or Requesters retain ownership of all Intellectual Property in Requester Content. NextRequest grants to Customer a worldwide, non-exclusive, royalty-free, fully-paid, non-transferrable, irrevocable, perpetual, and non- sublicensable right to use Requester Content for the Purpose. Usage Data. NextRequest retains ownership of all Intellectual Property in Usage Data, and Customer hereby unconditionally and irrevocably grants to NextRequest an assignment of all right, title and interest in and to the Usage Data, including all Intellectual Property rights relating thereto. NextRequest grants to Customer a worldwide, non-exclusive, royalty-free, fully-paid, non-transferrable, irrevocable, perpetual, and non- sublicensable right to use Usage Data for the Purpose. Transfer of Content. Customer Content may be disclosed and otherwise transferred to an acquirer, or successor or assignee as part of any merger, acquisition, debt financing, sale of company assets, or similar transaction, as well as in the event of an insolvency, bankruptcy, or receivership in wh...
Party Software. If You Purchased a remote “Train the Trainer” course or remote instructor or other similar service, then those are also included in the definition of Services.
AutoNDA by SimpleDocs
Party Software. Third-Party Software provided by Centre to Customer shall be subject to the license terms and conditions of such Software. Microsoft. Microsoft Software, which is provided by Centre to Customer under a Service Provider License Agreement (a “SPLA”), has specific terms and conditions for the use of such Software. These terms and conditions are contained in Appendix A. In the event of a conflict between the terms of this Agreement and the license terms and conditions of such Third-Party Software, the license terms and conditions of the Third-Party Software shall control.
Party Software. Third-Party Software" means software commercially available from a party other than the Seller, excluding any Open Source Software licenses.
Party Software. We have a third-party software and data sub-processor security review process that must be completed before using new services at our organization. We limit the amount of data shared with sub-processors to only what is necessary to perform their services. We identify all sub-processors (current list in Appendix) that will have access to user data and conduct due diligence to ensure that they have appropriate security measures in place. We also review sub-processor contracts to ensure that they contain appropriate data protection and security requirements. Background Checks All Epic employees undergo criminal background checks and sign agreements barring any use of confidential information outside of the scope of their work with the company. Other Security Practices External Security Assessment We conduct an annual external security assessment of our applications. We make the reports associated with these assessments available for our users, on request. Based on the assessment, the issues are resolved according to their severity level and overall security posture is evaluated. Incident Management and Response Epic has a standardized process for responding to security incidents. When a security incident is suspected, teams are notified through our alerting channels (pager-duty notifications, emails or instant messaging) and a central communication channel is established. After each incident, we conduct a post-mortem analysis to identify root causes and track any related follow-up work. If Epic believes that a customer’s personal information has been accessed or modified by an unauthorized third party, we designate such breach as a security incident. In the event of a security incident we will take all necessary steps to notify the affected customers within two business days following the incident, and recommend immediate corrective actions to mitigate the risks. We have established incident response procedures for security incidents that involve sub-processors, including notification requirements and escalation procedures.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!