Protection of the software Sample Clauses

Protection of the software. 5.1 Unless any rights are expressly granted to the Licensee under this agreement, the Licensor shall be the exclusive proprietor of all rights to the software (especially the copyright; including all copies made by the Licensee).
AutoNDA by SimpleDocs
Protection of the software. The licensee is obliged to take appropriate measures to protect the software from any access by unauthorised third parties, and in particular is obliged to store all copies of the software in a safe place.
Protection of the software. The LICENSEE may not modify, edit, adapt, reverse engineer, reproduce, disassemble, decompile, or duplicate the SOFTWARE, or use any other technical or logical process to interfere with or obtain information about its structure, processes, operation, or other protectable features.
Protection of the software. In the event that Licensee learns or has reason to believe that a third party is infringing or threatens to infringe Licensor's intellectual property rights in the Software, it shall promptly notify the Licensor, and Licensor shall take such steps to enforce its rights in the Software against such infringement as Licensee shall determine appropriate, in its sole and exclusive discretion. Licensee agrees to cooperate with Licensor and to provide reasonable support to Licensor in such effort.
Protection of the software. 5.1 Checkmk is a registered trademark of tribe29. The present XXXX does not authorize the Customer to use trademarks of tribe29 for the purposes of distribution of Checkmk or any part thereof. Trademarks of tribe29 may be used for the purposes of the distribution of Checkmk only on the basis of a separate written agreement. If the Customer distributes open source components of Checkmk under an applicable open source license, the Customer must first remove all registered trademarks of tribe29 except for such trademarks as are contained in copyright notices of tribe29.
Protection of the software. 5.1 Checkmk is a registered trademark of Checkmk GmbH. The present XXXX does not authorize the Customer to use trademarks of Checkmk GmbH for the purposes of distribution of Checkmk or any part thereof. Trademarks of Checkmk GmbH may be used for the purposes of the distribution of Checkmk only on the basis of a separate written agreement. If the Customer distributes open source components of Checkmk under an applicable open source license, the Customer must first remove all registered trademarks of Checkmk GmbH except for such trademarks contained in copyright notices of Checkmk GmbH.

Related to Protection of the software

  • Protection of Trade Secrets The Executive agrees to maintain in strict confidence and, except as necessary to perform his duties for the Employer, the Executive agrees not to use or disclose any Trade Secrets of the Employer during or after his employment. “Trade Secret” means information, including a formula, pattern, compilation, program, device, method, technique, process, drawing, cost data or customer list, that: (i) derives economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Protection of Intellectual Property Rights (a) (i) Protect, defend and maintain the validity and enforceability of its Intellectual Property; (ii) promptly advise Bank in writing of material infringements or any other event that could reasonably be expected to materially and adversely affect the value of its Intellectual Property; and (iii) not allow any Intellectual Property material to Borrower’s business to be abandoned, forfeited or dedicated to the public without Bank’s written consent.

  • Hardware IF HARDWARE IS IDENTIFIED ON A TRANSACTION DOCUMENT, THE SALE AND USE OF THE HARDWARE WILL BE GOVERNED BY TERMS OTHER THAN THIS XXXX. OT DISCLAIMS ALL WARRANTIES AND LIABILITY WITH RESPECT TO THE HARDWARE.

  • Protection of Intellectual Property 1. The Parties shall grant and ensure adequate, effective and non-discriminatory protection of intellectual property rights, and provide for measures for the enforcement of such rights against infringement thereof, counterfeiting and piracy, in accordance with the provisions of this Article, Annex VI and the international agreements referred to therein.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Protection of Proprietary Information The Seller has taken all reasonable steps to maintain the confidentiality of and otherwise protect and enforce their rights in all proprietary information pertaining to the Seller or any Seller Product. Without limiting the generality of the foregoing, no portion of the source code for any software ever owned or developed by the Seller has been disclosed or licensed to any escrow agent or other Person.

Time is Money Join Law Insider Premium to draft better contracts faster.