Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.
Xxxxx of License Georgia Institute of Technology shall grant the Student a limited, nonexclusive, nontransferable and revocable license to use and occupy an assigned space in a Georgia Institute of Technology facility in accordance with the terms and conditions of this Contract (the “License”). The parties to this Contract do not intend that an estate, a tenancy or any other interest in property should pass from Georgia Institute of Technology to Student. Instead, it is the intention of the parties that the relationship between Georgia Institute of Technology and Student be that of licensor and licensee and the sole right of Student to use the assigned space as a living unit shall be based upon the License granted in this Contract.
Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.
Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.
Grant of License to Use Intellectual Property Without limiting the provisions of Section 3.01 hereof or any other rights of the Collateral Agent as the holder of a Security Interest in any IP Collateral, for the purpose of enabling the Collateral Agent to exercise rights and remedies under this Agreement at such time as the Collateral Agent shall be lawfully entitled to exercise such rights and remedies, each Grantor hereby grants to the Collateral Agent, for the benefit of the Secured Parties, an irrevocable, nonexclusive license (exercisable without payment of royalty or other compensation to the Grantors) to use, license or sublicense any of the IP Collateral now owned or hereafter acquired by such Grantor, and wherever the same may be located (whether or not any license agreement by and between any Grantor and any other Person relating to the use of such IP Collateral may be terminated hereafter), and including in such license reasonable access to all media in which any of the licensed items may be recorded or stored and to all computer software and programs used for the compilation or printout thereof, provided, however, that any such license granted by the Collateral Agent to a third party shall include reasonable and customary terms necessary to preserve the existence, validity and value of the affected IP Collateral, including without limitation, provisions requiring the continuing confidential handling of trade secrets, requiring the use of appropriate notices and prohibiting the use of false notices, protecting and maintaining the quality standards of the Trademarks in the manner set forth below (it being understood and agreed that, without limiting any other rights and remedies of the Collateral Agent under this Agreement, any other Loan Document or applicable Law, nothing in the foregoing license grant shall be construed as granting the Collateral Agent rights in and to such IP Collateral above and beyond (x) the rights to such IP Collateral that each Grantor has reserved for itself and (y) in the case of IP Collateral that is licensed to any such Grantor by a third party, the extent to which such Grantor has the right to grant a sublicense to such IP Collateral hereunder). The use of such license by the Collateral Agent may only be exercised, at the option of the Collateral Agent, during the continuation of an Event of Default; provided that any license, sublicense or other transaction entered into by the Collateral Agent in accordance herewith shall immediately terminate at such time as the Collateral Agent is no longer lawfully entitled to exercise its rights and remedies under this Agreement. Nothing in this Section 4.01 shall require a Grantor to grant any license that is prohibited by any rule of law, statute or regulation, or is prohibited by, or constitutes a breach or default under or results in the termination of any contract, license, agreement, instrument or other document evidencing, giving rise to or theretofore granted, with respect to such property or otherwise unreasonably prejudices the value thereof to the relevant Grantor. In the event the license set forth in this Section 4.01 is exercised with regard to any Trademarks, then the following shall apply: (i) all goodwill arising from any licensed or sublicensed use of any Trademark shall inure to the benefit of the Grantor; (ii) the licensed or sublicensed Trademarks shall only be used in association with goods or services of a quality and nature consistent with the quality and reputation with which such Trademarks were associated when used by Grantor prior to the exercise of the license rights set forth herein; and (iii) at the Grantor’s request and expense, licensees and sublicensees shall provide reasonable cooperation in any effort by the Grantor to maintain the registration or otherwise secure the ongoing validity and effectiveness of such licensed Trademarks, including, without limitation the actions and conduct described in Section 4.02 below.
Licensed Materials The materials that are the subject of this Agreement are set forth in Appendix A ("Licensed Materials").
Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
SOFTWARE PRODUCT LICENSE The SOFTWARE PRODUCT is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE PRODUCT is licensed, not sold.