Protection of the software Sample Clauses

Protection of the software. 5.1 Unless any rights are expressly granted to the Licensee under this agreement, the Licensor shall be the exclusive proprietor of all rights to the software (especially the copyright; including all copies made by the Licensee). 5.2 The Licensee shall carefully store all copies of the software in order to avoid misuse. They shall not make the (unaltered or altered) software available to third parties. 5.3 The Licensee is not entitled to alter or remove copyright notices, labels and/or control numbers or signs of the Licensor. 5.4 If the Licensee is no longer in the direct possession of the storage media, storage devices or other hardware on which the complete software or a part thereof, whether unaltered or altered, is stored they shall ensure that the stored software is completely and permanently deleted first.
Protection of the software. The licensee is obliged to take appropriate measures to protect the software from any access by unauthorised third parties, and in particular is obliged to store all copies of the software in a safe place.
Protection of the software. The LICENSEE may not modify, edit, adapt, reverse engineer, reproduce, disassemble, decompile, or duplicate the SOFTWARE, or use any other technical or logical process to interfere with or obtain information about its structure, processes, operation, or other protectable features.
Protection of the software. 5.1 Checkmk is a registered trademark of Checkmk GmbH. The present XXXX does not authorize the Customer to use trademarks of Checkmk GmbH for the purposes of distribution of Checkmk or any part thereof. Trademarks of Checkmk GmbH may be used for the purposes of the distribution of Checkmk only on the basis of a separate written agreement. If the Customer distributes open source components of Checkmk under an applicable open source license, the Customer must first remove all registered trademarks of Checkmk GmbH except for such trademarks contained in copyright notices of Checkmk GmbH. 5.2 Unless expressly granted under this XXXX, all rights in the Proprietary Software (and all copies thereof produced by the Customer), including but not limited to copyrights, trade secrets, rights to or in inventions and industrial property rights, are the exclusive property of Checkmk GmbH. The Customer may not use the Proprietary Software for the purposes of obtaining trade secrets of Checkmk GmbH. 5.3 The Customer will carefully protect all copies of Checkmk and the login data for the download area in order to prevent abuse. The Customer will make the software (whether unchanged or modified by the Customer) available to third parties only with the previous written consent of Checkmk GmbH. This will not apply to open source components. The distribution right pursuant to section 2.5b shall remain unaffected. The login data may be entrusted only to employees who are administrators or users of the software. 5.4 Markings of the software, in particular copyright notices, trademarks, serial numbers or the like may not be removed, altered or obliterated, except to the extent permitted as part of the white label functionality of the Checkmk Enterprise Managed Services Edition. If the software is modified or edited, these markings must be included in the modified version. Modifications or adaptations that are capable of removing or circumventing technical measures to protect the software, of accessing functions of the software for which no license has been granted, or of impairing or preventing the verification of compliance with license terms and usage restrictions, in particular the measurement of the number of monitored services, are expressly prohibited. For modifications and adaptations of open source components, the Customer's obligations shall be governed solely by the applicable open source license. 5.5 The Customer may make and retain copies of the software only insofar a...
Protection of the software. In the event that Licensee learns or has reason to believe that a third party is infringing or threatens to infringe Licensor's intellectual property rights in the Software, it shall promptly notify the Licensor, and Licensor shall take such steps to enforce its rights in the Software against such infringement as Licensee shall determine appropriate, in its sole and exclusive discretion. Licensee agrees to cooperate with Licensor and to provide reasonable support to Licensor in such effort.

Related to Protection of the software

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Description of the Services 1.1 The scope of the service to be rendered is described more fully in the Annexures and Schedules referred to below: ❑ Annexure A – Scope / Specification ❑ Annexure C – Pricing Schedule The Deliverables, due for completion by and governed by this Schedule 1. In the event that the Service Provider fails to meet the delivery dates as agreed, the following penalties will be imposed:

  • Description of the service 10.1.1 Automatic transfer service implies a transfer by the bank of the funds from the client’s account without further consent of the client, on the basis of fixed amount determined by the client in its application form or of information provided by the client’s creditor to the bank on the client’s debt. 10.1.2 The parties agree that the payment order created (generated) by the bank for the purposes of automatic transfer services shall have the legal force equal to the document having been printed on the paper and executed by the person(s) authorized to manage of the account. 10.1.3 The bank shall carry out the automatic transfer services in accordance with requirements and conditions stipulated in this agreement, the application on registration for automatic transfer service and the sources disseminated by the bank. 10.1.4 For the purposes of obtaining automatic transfer services the client shall apply to the bank with the application as per paragraph 1.2 of this agreement.

  • Provision of the Services The Supplier acknowledges and agrees that the Customer relies on the skill and judgment of the Supplier in the provision of the Services and the performance of its obligations under this Call Off Contract. The Supplier shall ensure that the Services: comply in all respects with any description of the Services in Call Off Schedule 2 (Services) or elsewhere in this Call Off Contract; and are supplied in accordance with the provisions of this Call Off Contract or the Tender. The Supplier shall perform its obligations under this Call Off Contract in accordance with: all applicable Law; Good Industry Practice; the Standards; the Security Policy; the ICT Policy (if so required by the Customer); the Supplier's own established procedures and practices to the extent the same do not conflict with the requirements of Clauses 7.1.3(a) to 7.1.3(e) and, where necessary the provisions of xxxxx://xxx.xxx.xx/government/publications/cyber-essentials-scheme-overview, or equivalent. The Supplier shall: at all times allocate sufficient resources with the appropriate technical expertise to supply the Deliverables and to provide the Services in accordance with this Call Off Contract; subject to Clause 22.1 (Variation Procedure), obtain, and maintain throughout the duration of this Call Off Contract, all the consents, approvals, licences and permissions (statutory, regulatory contractual or otherwise) it may require and which are necessary for the provision of the Services; ensure that any products or services recommended or otherwise specified by the Supplier for use by the Customer in conjunction with the Deliverables and/or the Services shall enable the Deliverables and/or the Services to meet the requirements of the Customer; ensure that the Supplier Assets will be free of all encumbrances (except as agreed in writing with the Customer); and ensure that the Services are fully compatible with any Customer Property or Customer Assets described in Part B of Call Off Schedule 4 (Implementation Plan, Customer Responsibilities and Key Personnel) (or elsewhere in this Call Off Contract) or otherwise used by the Supplier in connection with this Call Off Contract; minimise any disruption to the Sites and/or the Customer's operations when providing the Services; ensure that any Documentation and training provided by the Supplier to the Customer are comprehensive, accurate and prepared in accordance with Good Industry Practice; co-operate with the Other Suppliers and provide reasonable information (including any Documentation), advice and assistance in connection with the Services to any Other Supplier and, on the Call Off Expiry Date for any reason, to enable the timely transition of the supply of the Services (or any of them) to the Customer and/or to any Replacement Supplier; assign to the Customer, or if it is unable to do so, shall (to the extent it is legally able to do so) hold on trust for the sole benefit of the Customer, all warranties and indemnities provided by third parties or any Sub-Contractor in respect of any Deliverables and/or the Services. Where any such warranties are held on trust, the Supplier shall enforce such warranties in accordance with any reasonable directions that the Customer may notify from time to time to the Supplier; provide the Customer with such assistance as the Customer may reasonably require during the Call Off Contract Period in respect of the supply of the Services; deliver the Services in a proportionate and efficient manner; ensure that neither it, nor any of its Affiliates, embarrasses the Customer or otherwise brings the Customer into disrepute by engaging in any act or omission which is reasonably likely to diminish the trust that the public places in the Customer, regardless of whether or not such act or omission is related to the Supplier’s obligations under this Call Off Contract; and gather, collate and provide such information and co-operation as the Customer may reasonably request for the purposes of ascertaining the Supplier’s compliance with its obligations under this Call Off Contract. An obligation on the Supplier to do, or to refrain from doing, any act or thing shall include an obligation upon the Supplier to procure that all Sub-Contractors and Supplier Personnel also do, or refrain from doing, such act or thing.

  • Protection of Trade Secrets The Executive agrees to maintain in strict confidence and, except as necessary to perform his duties for the Employer, the Executive agrees not to use or disclose any Trade Secrets of the Employer during or after his employment. “Trade Secret” means information, including a formula, pattern, compilation, program, device, method, technique, process, drawing, cost data or customer list, that: (i) derives economic value, actual or potential, from not being generally known to, and not being readily ascertainable by proper means by, other persons who can obtain economic value from its disclosure or use; and (ii) is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

  • Provision of the Service Okta provides the Service to Customer under the Agreement. In connection with the Service, the parties anticipate that Okta may Process Customer Data that contains Personal Data relating to Data Subjects.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property. b) It shall be within the sole and absolute discretion of Transnet to determine what steps shall be taken against the infringer and the Supplier/Service Provider shall co-operate fully with Transnet, at Transnet’s cost, in whatever measure including legal action to bring any infringement of illegal use to an end. c) The Supplier/Service Provider shall cooperate to provide Transnet promptly with all relevant ascertainable facts. d) If proceedings are commenced by Transnet alone, Transnet shall be responsible for all expenses but shall be entitled to all damages or other awards arising out of such proceedings. If proceedings are commenced by both Parties, both Parties will be responsible for the expenses and both Parties shall be entitled to damages or other awards arising out of proceedings.

  • Protection of Trade Secrets or Confidential Information If the Contractor considers any portion of materials made or received in the course of performing the Contract (“contract-related materials”) to be trade secret under section 688.002 or 812.081, F.S., or otherwise confidential under Florida or federal law, the Contractor must clearly designate that portion of the materials as trade secret or otherwise confidential when submitted to the Department. The Contractor will be responsible for responding to and resolving all claims for access to contract-related materials it has designated trade secret or otherwise confidential. If the Department is served with a request for discovery of contract-related materials designated by the Contractor as trade secret or otherwise confidential, the Contractor will be responsible for filing the appropriate motion or objection in response to the request for discovery. The Department will provide materials designated trade secret or otherwise confidential if the Contractor fails to take appropriate and timely action to protect the materials designated as trade secret or otherwise confidential. The Contractor will protect, defend, indemnify, and hold harmless the Department for claims, costs, fines, and attorney’s fees arising from or relating to its designation of contract-related materials as trade secret or otherwise confidential.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.