Protection of the Systems and Software Products Sample Clauses

Protection of the Systems and Software Products. Pershing shall, from time to time, provide Broker with passwords, codes, certificates, and other identification devices and security measures (the "Identification Devices") necessary to access and use the Systems and Software Products. Broker shall determine whether and which of its customers, employees, or agents shall have access to the Systems and Software Products. Broker shall be solely responsible for the assignment, distribution, and maintenance of all Identification Devices to ensure that access to the Systems and Software Products is granted only to those individuals who are authorized by Broker. Nothing in this paragraph shall affect or diminish Pershing's right, in its sole discretion, to refuse to provide any or all the Systems and Software Products to Broker, its agents or employees or any customers of Broker. Broker shall be responsible for and shall provide the same level of security as Broker applies to its own source code and trade secrets in the protection, maintenance, and distribution of those Identification Devices and codes within its organization and to its agents and customers, but in no case less than reasonable security. Any loss, theft, or discovery of any Identification Devices shall be reported to Pershing immediately and Broker shall be responsible for any unauthorized use, and for any loss resulting from unauthorized use, of any Identification Device prior to the time the loss, theft, or discovery of the Identification Device is reported to Pershing.
AutoNDA by SimpleDocs
Protection of the Systems and Software Products. Pershing shall, from time to time, provide Broker with passwords, codes, certificates, and other identification devices and security measures (the "Identification Devices") necessary to access and use the Systems and Software Products. Broker shall determine whether and which of its customers, employees,or agents shall have access to the Systems and Software Products. Broker shall be solely responsible for the assignment, distribution, and maintenance of all Identification Devices such that it will grant access to the Systems and Software Products only to those individuals who are authorized by Broker. Nothing in this paragraph shall affect or diminish Pershing's right to refuse to provide any or all the Systems and Software Products to Broker, its agents or employees or any customers of Broker for default as set forth in this Agreement, provided that Pershing complies with its obligations to give notice of default as required pursuant to Paragraph 22.2 and the default has not been cured as permitted by that Paragraph. Broker shall be responsible for and shall provide the same level of security as Broker applies to its own source code and trade secrets in the protection, maintenance, and distribution of those Identification Devices and codes within its organization and to its agents and customers, but in no case less than reasonable security. Any loss, theft, or discovery of any Identification Devices shall be reported to Pershing immediately and Broker shall be responsible for any unauthorized use, and for any loss resulting from unauthorized use, of any Identification Device prior to the time the loss, theft, or discovery of the Identification Device is reported to Pershing, except where such security breach is due to an act or omission of Pershing. Pershing shall be responsible for and shall provide the same level of security as it applies to its own confidential information and trade secrets in the protection of personal and financial information transmitted through the System and Software Products, but in no case less than reasonable security.

Related to Protection of the Systems and Software Products

  • Licensed Software Section 3.17(f).......................................27

  • Technology For purposes of this Agreement, “Technology” means all Software, information, designs, formulae, algorithms, procedures, methods, techniques, ideas, know-how, research and development, technical data, programs, subroutines, tools, materials, specifications, processes, inventions (whether or not patentable and whether or not reduced to practice), apparatus, creations, improvements and other similar materials, and all recordings, graphs, drawings, reports, analyses, and other writings, and other embodiments of any of the foregoing, in any form or media whether or not specifically listed herein. Further, for purposes of this Agreement, “Software” means any and all computer programs, whether in source code or object code; databases and compilations, whether machine readable or otherwise; descriptions, flow-charts and other work product used to design, plan, organize and develop any of the foregoing; and all documentation, including user manuals and other training documentation, related to any of the foregoing.

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • Software Additional provisions relating to software.

  • License for Use of Software and Other Intellectual Property Unless expressly prohibited by the licensor thereof or any provision of applicable law, if any, the Borrower hereby grants to the Administrative Agent on behalf of the Secured Parties a limited license to use, without charge, the Borrower’s and the Servicer’s computer programs, software, printouts and other computer materials, technical knowledge or processes, data bases, materials, trademarks, registered trademarks, trademark applications, service marks, registered service marks, service xxxx applications, patents, patent applications, trade names, rights of use of any name, labels, fictitious names, inventions, designs, trade secrets, goodwill, registrations, copyrights, copyright applications, permits, licenses, franchises, customer lists, credit files, correspondence, and advertising materials or any property of a similar nature, as it pertains to the Borrower Collateral, or any rights to any of the foregoing, only as reasonably required in connection with the collection of the Transferred Receivables and the advertising for sale, and selling any of the Borrower Collateral, or exercising of any other remedies hereto, and the Borrower agrees that its rights under all licenses and franchise agreements shall inure to the Administrative Agent’s benefit (on behalf of the Secured Parties) for purposes of the license granted herein. Except upon the occurrence and during the continuation of a Termination Event, the Administrative Agent and the Lenders agree not to use any such license without giving the Borrower prior written notice.

  • Third Party Software Customer acknowledges that in order for MyEcheck to perform the Consulting Services, Customer may need to obtain additional third party services ("Third Party Services") or third party technology ("Third Party Technology"). Customer agrees that the rights and licenses with respect to Third Party Technology and Third Party Services shall be under terms set forth in the pertinent purchase, license or services agreements between Customer and the vendors of such Third Party Software or Third Party Services. Customer shall execute and comply with appropriate purchase, license, or services agreements with respect to any Third Party Software or Third Party Services. Any amounts payable to third party vendors or service providers under such agreements are the sole responsibility of Customer and shall be paid directly by Customer to such third party vendors or service providers. MyEcheck Services Agreement

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Products and Services Part 2.9(a) of the Disclosure Schedule accurately identifies and describes each Company Product currently being designed, developed, manufactured, marketed, distributed, provided, licensed, or sold by the Company.

  • Support Services Other than the assistance provided in the Information, the BNPP Entities do not offer any support services in connection with the Software.

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

Time is Money Join Law Insider Premium to draft better contracts faster.