Protection and Security of Software and Documentation Sample Clauses

Protection and Security of Software and Documentation a. Customer will establish reasonable precautions and use commercially reasonable efforts, no less rigorous that those Customer uses to protect its own confidential information to protect and maintain the confidentiality and security of the Software and the Documentation. Without limiting the generality of the foregoing, Customer will use reasonable measures to protect the Software and Documentation from unauthorized copying, dissemination, disclosure or other unauthorized use. b. Customer will not, and will not permit any third party to, (i) copy or use the Software or Documentation except as expressly authorized by this Agreement (including this Schedule); (ii) sublicense, rent, distribute, transfer, publish, disclose, display or otherwise make available the Software to others; (iii) use the Software or Documentation for third-party training, commercial time-sharing or service bureau use; or (iv) alter, change, modify or otherwise create derivative works of the Software or Documentation. c. Customer will not, and will not permit any third party to, reverse engineer, disassemble or decompile any Software, except to the extent expressly permitted by applicable law. If Customer intends or begins to take any such action based on any applicable law, Customer shall notify Bank and Bank shall have the right to immediately terminate this Agreement and/or the license to the Software upon notice to Customer. d. Customer will maintain a complete and accurate list of all locations where Customer has loaded and maintains the Software, and make such list available to Bank upon Bank request.
AutoNDA by SimpleDocs
Protection and Security of Software and Documentation. 1. Customer will establish reasonable precautions and use commercially reasonable efforts, no less rigorous that those Customer uses to protect its own confidential information to protect and maintain the confidentiality and security of the Software and the Documentation. Without limiting the generality of the foregoing, Customer will use reasonable measures to protect the Software and Documentation from unauthorized copying, dissemination, disclosure or other unauthorized use. 2. Customer will not, and will not permit any third party to, (i) copy or use the Software or Documentation except as expressly authorized by this Agreement; (ii) sublicense, rent, distribute, transfer, publish, disclose, display or otherwise make available the Software to others; (iii) use the Software or Documentation for third-party training, commercial time-sharing or service bureau use; or (iv) alter, change, modify or otherwise create derivative works of the Software or Documentation. 3. Customer will not, and will not permit any third party to, reverse engineer, disassemble or decompile any Software, except to the extent expressly permitted by applicable law. If Customer intends or begins to take any such action based on any applicable law, Customer shall notify Bank and Bank shall have the right to immediately terminate this Agreement and/or the license to the Software upon notice to Customer. 4. Customer will maintain a complete and accurate list of all locations where Customer has loaded and maintains the Software, and make such list available to Bank upon Bank’s request.
Protection and Security of Software and Documentation. 1.1 Individual will establish reasonable precautions and use commercially reasonable efforts, no less rigorous than those Individual uses to protect its own confidential information to protect and maintain the confidentiality and security of the Software and the Documentation. Without limiting the generality of the foregoing, Individual will use reasonable measures to protect the Software and Documentation from unauthorized copying, dissemination, disclosure or other unauthorized use. 1.2 Individual will not, and will not permit any third party to, (i) copy or use the Software or Documentation except as expressly authorized by this Agreement (including this Schedule); (ii) sublicense, rent, distribute, transfer, publish, disclose, display or otherwise make available the Software to others; (iii) use the Software or Documentation for third-party training, commercial time-sharing or service bureau use; or
Protection and Security of Software and Documentation. Customer shall establish reasonable precautions and use commercially reasonable efforts, no less rigorous than those Customer uses to protect its own confidential information, to protect and maintain the confidentiality and security of the Software and the Documentation. Without limiting the generality of the foregoing, Customer shall use reasonable measures to protect the Software and Documentation from unauthorized access, dissemination, or disclosure. Customer shall not disclose the Software or Documentation to any Person except to its employees on a “need to know” basis. Customer shall not, and shall not permit any third Person to (a) copy or use the Software or Documentation except as expressly authorized by this Agreement, (b) sublicense, rent, distribute, transfer, publish, disclose, display, or otherwise make available the Software to any other Person, (c) use the Software or Documentation for third-person training, commercial time-sharing, or service bureau use, or (d) alter, change, modify, or otherwise create derivative works of the Software or Documentation. Customer shall not, and shall not permit any third Person to, reverse engineer, disassemble, or decompile any Software. Customer shall maintain a complete and accurate list of all locations where Customer has loaded and maintains the Software and make such list available to Bank upon Bank's request.

Related to Protection and Security of Software and Documentation

  • Software and Documentation Licensee may make as many copies of the Software necessary for it to use the Software as licensed. Each copy of the Software made by Licensee must contain the same copyright and other notices that appear on the original copy. Licensee will not modify the Documentation. Documentation may: (a) only be used to support Licensee’s use of the Software; (b) not be republished or redistributed to any unauthorized third party; and (c) not be distributed or used to conduct training for which Licensee, or any other party, receives a fee. Licensee will not copy any system schema reference document related to the Software.

  • Technical Documentation Prior to commencement of the Tests on Completion, the Contractor shall supply to the Engineer the technical documentation as specified in the Employer’s Requirements. The Works or Section shall not be considered to be completed for the purposes of taking- over under sub-clause 10.1 [Taking Over of the Works and Sections] until the Engineer has received the technical documentation as defined in this sub-clause 5.7, the "history file" including design calculations and certain certification as well as any other documents required to meet the CE Marking requirements.

  • Licensed Documentation If commercially available, Licensee shall have the option to require the Contractor to deliver, at Contractor’s expense: (i) one (1) hard copy and one (1) master electronic copy of the Documentation in a mutually agreeable format; (ii) based on hard copy instructions for access by downloading from the Internet

  • Hardware and Software In order to use the Services, you must obtain and maintain, at your expense, compatible hardware and software as specified by Credit Union from time to time. Credit Union is not responsible for any third party software you may need to use the Services. Any such software is accepted by you as is and is subject to the terms and conditions of the software agreement you enter into directly with the third party software provider at time of download and installation.

  • Required hardware and software The minimum system requirements for using the DocuSign system may change over time. The current system requirements are found here: xxxxx://xxxxxxx.xxxxxxxx.xxx/guides/signer-guide- signing-system-requirements.

  • Intellectual Property; Software Other than as set forth on Schedule 5.12: (a) There are no Copyrights, Patent Rights and Trademarks (including any assumed or fictitious names used by the Company within the previous two (2) years) owned by or licensed to the Company. (b) There is no Software owned by or licensed to the Company except for mass market Software licensed to the Company that is commercially available and subject to “shrink-wrap” or “click-through” license agreements. (c) The Company is not a party to Contracts which relate to: (i) any Copyrights, Patent Rights or Trademarks; (ii) any Trade Secrets owned by or licensed to the Company; and (iii) any Software, other than market Software licensed to the Company that is commercially available and subject to “shrink-wrap” or “click-through” license agreements. (d) The Company owns the entire right, title and interest in and to, or has the valid and enforceable right to use, the Intellectual Property and Software used in the Business as currently conducted, and to the Knowledge of Seller there is no other Intellectual Property necessary for the Company to conduct the Business as currently conducted. (i) No infringement, misappropriation or violation of any Intellectual Property, or any rights of publicity or privacy relating to the use of names, likenesses, voices, signatures or biographical information, of any other Person has occurred or results in any way from the operation of the Business or the use, sale or distribution of any Intellectual Property owned by or licensed exclusively to the Company; (ii) no claim of any infringement, misappropriation, violation or dilution of any Intellectual Property or any such rights of any other Person has been made or asserted in respect of the operation of the Business; (iii) no claim of invalidity of any Intellectual Property owned by the Company has been made by any other Person; (iv) no Proceedings are pending or, to the Knowledge of Seller, threatened that challenge the validity, ownership or use of any Intellectual Property owned by the Company; (v) the Company has not had notice of, and, to the Knowledge of Seller, there is no basis for, a claim against the Company that the operations, activities, products, Software, equipment or processes of the Business infringe, misappropriate, violate or dilute any Intellectual Property or any such rights of any other Person; and (vi) to the Knowledge of Seller, no Person infringes, misappropriates or violates any Intellectual Property owned or exclusively licensed by or to Seller, in each case except as could not, individually or in the aggregate, reasonably be expected to have a Material Adverse Effect.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Security of All Software Components Supplier will inventory all software components (including open source software) used in Deliverables, and provide such inventory to Accenture upon request. Supplier will assess whether any such components have any security defects or vulnerabilities that could lead to a Security Incident. Supplier will perform such assessment prior to providing Accenture with access to such software components and on an on-going basis thereafter during the term of the Agreement. Supplier will promptly notify Accenture of any identified security defect or vulnerability and remediate same in a timely manner. Supplier will promptly notify Accenture of its remediation plan. If remediation is not feasible in a timely manner, Supplier will replace the subject software component with a component that is not affected by a security defect or vulnerability and that does not reduce the overall functionality of the Deliverable(s).

  • LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!