Possession and Use of Source Code Sample Clauses

Possession and Use of Source Code. If Source Code is obtained by COUNTY under the 36 provisions of Subparagraph VIII.F.4. below, such Source Code shall remain subject to every license 37 restriction, proprietary rights protection, and other COUNTY obligations specified in this Agreement. 1 COUNTY may use Source Code for the sole purpose of supporting its use of the Licensed Software as 2 expressly permitted under this Agreement, and for no other purpose whatsoever. When Source Code 3 resides in a central processing unit, COUNTY shall limit access to its authorized employees who have a 4 need to know in order to support the Licensed Software. COUNTY shall at all times implement strict 5 access security measures in order to prevent unauthorized disclosure, use, or removal of Source Code.
AutoNDA by SimpleDocs
Possession and Use of Source Code. If Source Code is obtained by COUNTY under the 15 provisions of Subparagraph VIII.F.4. below, such Source Code shall remain subject to every license 16 restriction, proprietary rights protection, and other COUNTY obligations specified in this Agreement.
Possession and Use of Source Code. Upon the occurrence of a Release Condition, County shall be entitled to obtain the Source Code from the Source Code Escrow pursuant to the terms of any Source Code Escrow Agreement or Paragraph 11.3.3 (Source Code Release Conditions). County shall be entitled to use the Source Code as needed to remedy the event of release and mitigate any damages arising from such event, provided that mitigation of damages shall not include the sale or sublicense of the Source Code. Such use will include, but not be limited to, County’s right to perform its own support and maintenance, alter or modify the Source Code and/or obtain the benefits sought under this Agreement, subject to the limitations of Paragraph 11.3.6 (Proprietary Rights) below.
Possession and Use of Source Code. Subject to the provisions of Subparagraph 11.3.D (License of Source Code), Source Code obtained by COUNTY under the provisions of this Agreement shall remain subject to every license restriction, proprietary rights protection, and other COUNTY obligation specified in this Agreement, provided that COUNTY may make the Source Code available to third parties as needed to assist it in making authorized use of the System. COUNTY may use the Source Code for the sole purpose of supporting its use of the System as expressly permitted under this Agreement or to obtain the benefits sought under this Agreement. In no event shall COUNTY be permitted to grant access to the Source Code to a direct competitor of CONTRACTOR. Likewise, COUNTY shall not be permitted to sell or transfer its rights in the Source Code to any other party. When Source Code is not in use, COUNTY agrees to keep such Source Code in a locked, secure place. When Source Code resides in a central processing unit, COUNTY shall limit access to its authorized employees and consultants who have a need to know in order to support the System.
Possession and Use of Source Code. If Source Code is obtained by COUNTY as authorized 15 by CONTRACTOR such Source Code shall remain subject to every license restriction, proprietary 16 rights protection, and other COUNTY obligations specified in this Agreement. COUNTY may use
Possession and Use of Source Code. If Source Code is obtained by COUNTY under the 30 provisions of Subparagraph VIII.D.4., below, such Source Code shall remain subject to every license 31 restriction, proprietary rights protection, and other COUNTY obligations specified in this Agreement. 32 COUNTY may use Source Code for the sole purpose of supporting its use of the Licensed Software as 33 expressly permitted under this Agreement, and for no other purpose whatsoever. When Source Code 34 resides in a central processing unit, COUNTY shall limit access to its authorized employees who have a 35 need to know in order to support the Licensed Software. COUNTY shall at all times implement strict 36 access security measures in order to prevent unauthorized disclosure, use, or removal of Source Code. 37 // 1 COUNTY also agrees that all persons with access to the Source Code shall execute confidentiality 2 agreements consistent with the obligations of COUNTY hereunder.
Possession and Use of Source Code. If Source Code is obtained by COUNTY as authorized by CONTRACTOR such Source Code shall remain subject to every license restriction, proprietary rights protection, and other COUNTY obligations specified in this Agreement. COUNTY may use Source Code for the sole purpose of supporting its use of the Licensed Software as expressly permitted under this Agreement, and for no other purpose whatsoever. When Source Code resides in a central processing unit, COUNTY shall limit access to its authorized employees who have a need to know in order to support the Licensed Software. COUNTY shall at all times implement strict access security measures in order to prevent unauthorized disclosure, use, or removal of Source Code. COUNTY also agrees that all persons with access to the Source Code shall execute confidentiality agreements consistent with the obligations of COUNTY hereunder. //
AutoNDA by SimpleDocs

Related to Possession and Use of Source Code

  • Possession and Use Contractor may possess, use and reproduce Confidential Information solely for the Purpose. Contractor shall not use the Confidential Information for any other purpose.

  • Possession and Use of Collateral Subject to the provisions of the Security Documents, the Issuer and the Guarantors shall have the right to remain in possession and retain exclusive control of and to exercise all rights with respect to the Collateral (other than monies or U.S. government obligations deposited pursuant to Article VIII, and other than as set forth in the Security Documents and this Indenture), to operate, manage, develop, lease, use, consume and enjoy the Collateral (other than monies and U.S. government obligations deposited pursuant to Article VIII and other than as set forth in the Security Documents and this Indenture), to alter or repair any Collateral so long as such alterations and repairs do not impair the creation or perfection of the Lien of the Security Documents thereon, and to collect, receive, use, invest and dispose of the reversions, remainders, interest, rents, lease payments, issues, profits, revenues, proceeds and other income thereof.

  • Installation and Use Rights You may install and use any number of copies of the software on your devices.

  • Publicity/Use of Names Neither Party shall use the name, trademark, trade name or logo of the other Party, its Affiliates or their respective employee(s) in any publicity, promotion, news release or disclosure relating to this Agreement or its subject matter, without the prior express written permission of the other Party, except for those disclosures expressly authorized under this Article 4. Following execution of this Agreement, either Party may issue a press release announcing the existence of this Agreement in form and substance agreed to in writing by both Parties, such agreement to not be unreasonably withheld or delayed. Each Party agrees not to issue any other press release or other public statement disclosing other information relating to this Agreement or the transactions contemplated hereby without the prior written consent of the other Party, which consent shall not be unreasonably withheld or delayed; provided that Arvinas agrees that it shall be deemed reasonable for Pfizer to withhold its consent for the disclosure of any information related to a Target or a specific Compound or the amount of any payment made or to be made under this Agreement; and provided further that any disclosure which is required by Law or the rules of a securities exchange, as reasonably advised by the disclosing Party’s counsel, may be made subject to the following. Each Party agrees to provide to the other Party a copy of any public announcement regarding this Agreement or the subject matter thereof as soon as reasonably practicable under the circumstances prior to its scheduled release. Except under extraordinary circumstances or to the extent any such advance notice or notice period is not consistent with applicable Law, each Party shall provide the other with an advance copy of any such announcement at least [**] prior to its scheduled release. Each Party shall have the right to expeditiously review and recommend changes to any such announcement and, except as otherwise required by Law, the Party whose announcement has been reviewed shall remove any information the reviewing Party reasonably deems to be inappropriate for disclosure. The contents of any announcement or similar publicity which has been reviewed and approved by the reviewing Party can be re-released by either Party without a requirement for re-approval. In addition, except to the extent required by Laws in connection with patent enforcement activities conducted in accordance with Article 7, Pfizer shall not use the name “Yale” or “Yale University,” nor any variation or adaptation thereof, nor any trademark, trade name or other designation owned by Yale University, nor the names of any of its trustees, officers, faculty, students, employees or agents, for any purpose without the prior written consent of Yale University in each instance, such consent to be granted or withheld by Yale University in its sole discretion, except that Pfizer may state that it has sublicensed from Yale University one or more of the patents or applications comprising the Yale Licensed Patents.

  • SERVICES NOT EXCLUSIVE/USE OF NAME Your services to the Fund pursuant to this Agreement are not to be deemed to be exclusive, and it is understood that you may render investment advice, management and other services to others, including other registered investment companies, which may or may not be a series of the Trust, provided, however, that such other services and activities do not, during the term of this Agreement, interfere in a material manner, with your ability to meet all of your obligations with respect to rendering services to the Fund. For the avoidance of doubt, the rendering of investment advice, management or other services to any client including separate accounts, mutual funds and private funds, pursuant to a substantially similar strategy as that of the Fund will not be deemed to interfere in a material manner. The Trust and you acknowledge that all rights to the name “Xxxxxx” or any variation thereof belong to you or one or more of your affiliates, and that the Trust is being granted a limited license to use such words in the Fund’s name or in any class name. In the event you cease to be the adviser to the Fund, the Trust’s right to the use of the name “Xxxxxx” in the Fund’s name and in any class shall automatically cease on the ninetieth day following the termination of this Agreement. The right to the name may also be withdrawn by you during the term of this Agreement upon ninety (90) days’ written notice by you to the Trust. Nothing contained herein shall impair or diminish in any respect, your right to use the name “Xxxxxx” in the name of, or in connection with, any other business enterprises with which you are or may become associated. There is no charge to the Trust for the right to use this name.

  • Incorporation of Software Code I agree that I will not incorporate into any Company software or otherwise deliver to Company any software code licensed under the GNU General Public License or Lesser General Public License or any other license that, by its terms, requires or conditions the use or distribution of such code on the disclosure, licensing, or distribution of any source code owned or licensed by Company except in strict compliance with Company’s policies regarding the use of such software.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Consent to Use of Data You grant NCR Voyix a perpetual, non-exclusive, irrevocable, sub-licensable, transferrable license to use the data transmitted through the Platform: (a) to provide the NCR Voyix Product and the Platform as well as related products, software, materials and services under this Agreement or another agreement between you and NCR Voyix; (b) for product and service enhancements, as well as research and development purposes; and (c) after it has been aggregated, for analytics, commercial and benchmarking purposes.

  • Selection of Subcontractors, Procurement of Materials and Leasing of Equipment The contractor shall not discriminate on the grounds of race, color, religion, sex, national origin, age or disability in the selection and retention of subcontractors, including procurement of materials and leases of equipment. The contractor shall take all necessary and reasonable steps to ensure nondiscrimination in the administration of this contract. a. The contractor shall notify all potential subcontractors and suppliers and lessors of their EEO obligations under this contract. b. The contractor will use good faith efforts to ensure subcontractor compliance with their EEO obligations.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!