Permitted Scanning Techniques Sample Clauses

Permitted Scanning Techniques. Insecure offers licenses for a wide variety of network scanning technology. This is divided into five scanning techniques to best accommodate Licensees’ needs. Permitted scanning techniques for this Agreement are marked with XX below. Host Discovery Port Scanning OS Detection Service Detection Nmap Scripting Engine (NSE) Licensee covenants that Covered Products will only use the scanning technique(s) marked above as described in Schedule 1.
AutoNDA by SimpleDocs

Related to Permitted Scanning Techniques

  • Return of Materials Pertaining to Work Product Upon the request of Customer, but in any event upon termination or expiration of this Contract or a Statement of Work, Vendor shall surrender to Customer all documents and things pertaining to the Work Product, including but not limited to drafts, memoranda, notes, records, drawings, manuals, computer software, reports, data, and all other documents or materials (and copies of same) generated or developed by Vendor or furnished by Customer to Vendor, including all materials embodying the Work Product, any Customer confidential information, or Intellectual Property Rights in such Work Product, regardless of whether complete or incomplete. This section is intended to apply to all Work Product as well as to all documents and things furnished to Vendor by Customer or by anyone else that pertain to the Work Product.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.

  • Application of Funding Techniques to Programs 6.3.1 The State shall apply the following funding techniques when requesting Federal funds for the component cash flows of the programs listed in sections 4.2 and 4.3 of this Agreement.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Licensed Materials The materials that are the subject of this Agreement are set forth in Appendix A ("Licensed Materials").

  • Third Party Materials The Application may display, include, or make available third-party content (including data, information, applications, and other products, services, and/or materials) or provide links to third-party websites or services, including through third- party advertising ("Third-Party Materials"). You acknowledge and agree that Company is not responsible for Third-Party Materials, including their accuracy, completeness, timeliness, validity, copyright compliance, legality, decency, quality, or any other aspect thereof. Company does not assume and will not have any liability or responsibility to you or any other person or entity for any Third-Party Materials. Third-Party Materials and links thereto are provided solely as a convenience to you, and you access and use them entirely at your own risk and subject to such third parties' terms and conditions.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • COPYRIGHTED MATERIALS Dental Group hereby grants Manager the right to --------------------- use any and all copyrighted materials authored or owned by Dental Group including, specifically, the Dental Group dental management system software programs (the "Programs"). This license includes the right to sublicense the Programs and the right to prepare and own derivative works based on the Programs, all without a duty of accounting to Dental Group. Dental Group shall execute all documents required to enable Manager to own, use and exploit all such rights.

Time is Money Join Law Insider Premium to draft better contracts faster.