Reproduction rights and access protection Sample Clauses

Reproduction rights and access protection. 2.1. The customer may duplicate the program supplied if the duplication in question is necessary for the purpose of using the program in connection with the acquired installation. The scope of use agreed between the parties is set forth in the licence agreement and the other delivery documents. Necessary duplications include installing the program from the original data carrier onto the mass storage device of the hardware used, as well as loading the program into the working memory. 2.2. Furthermore, the customer may make copies for backup purposes. As a matter of principle however, only one backup copy may be made and stored. This backup copy of the program supplied shall be labelled as such. 2.3. If making a regular backup of the entire dataset (including computer programs used) is crucial for reasons of data security or for ensuring the prompt reactivation of the computer system after a total failure, the customer may make the number of backup copies absolutely necessary. The data carriers in question shall be labelled accordingly. The backup copies may only be used for purely archival purposes. 2.4. The customer shall take appropriate measures to prevent third parties gaining unauthorised access to the software. The original data carriers provided, as well as any backup copies made, shall be kept in a safe location secured against unauthorised access by third parties. This obligation shall also be imposed on employees who use the software. 2.5. The customer may not make any further copies, including outputting the program code on a printer or photocopying the manual or documentation. Any additional manuals required for employee use shall be obtained from us. 2.6. If it is agreed between the parties that the customer may make use of the program on any or a certain number of hardware units, a record shall be kept of the number of copies used and, unless otherwise agreed in the contract, we shall be notified thereof upon request. 2.7. We are entitled to take the necessary measures for program protection, in particular by making use of the programs dependent upon the use of a program protection key or softkey (dongle). We are also entitled to ensure that the agreed scope of the right of use cannot be exceeded.
AutoNDA by SimpleDocs
Reproduction rights and access protection. 3.1. The customer may copy the program as far as the respective reproduction is necessary for the use of the program. Necessary reproductions include installation of the program from the original data carrier to the main memory of the hardware used as well as loading the program into the random access memory. 3.2. Furthermore, the customer can create a copy for backup purposes; however, only one backup copy may be created and maintained. This backup copy shall be labeled as a backup copy of the program, with the copyright notice of Tobit Software. 3.3. The customer is obligated to take suitable measures to prevent unauthorized access by third parties to the program and the documentation. The original data carriers and the backup copies shall be kept in a safe place that is protected against unau- thorized access. The employees of the customer shall be instructed expressly to comply with these contrac- tual terms and the copyright law.
Reproduction rights and access protection. 1. The user shall be entitled to copy the software supplied insofar as such copies are required to use the Licensed Software in accordance with its intended purpose, including error correction. In partic- ular, installation of the Licensed Software from the original data medium onto the memory of the hardware in use and loading of the program into the internal memory shall be deemed necessary reproduction. 2. In addition, the user may also make a copy for backup purposes. Only one single backup copy may be made and retained however. The user shall visibly mark the backup copy created with the word- ing "Backup Copy" and a copyright notice in favour of DMG MORI. 3. The user shall be obliged to take appropriate measures to prevent unauthorised access to the Li- censed Software and license code, as well as the user documentation, by third parties. The original data medium supplied, the license code and the backup copies must be stored in a secure location protected against third party access.

Related to Reproduction rights and access protection

  • Information and Access (a) The Company and Parent each shall (and shall cause its Subsidiaries to, and shall use its commercially reasonable efforts to cause, its and their respective Representatives to), upon the reasonable request by the other, furnish to the other, as promptly as practicable, with all information concerning itself, its Representatives and such other matters as may be necessary or advisable in connection with the Schedule 14D-9 or Schedule TO (including with respect to Parent, information concerning the Investors) and any information or documentation to effect the expiration of all waiting periods under applicable Antitrust Laws and all filings, notices, reports, consents, registrations, approvals, permits and authorizations, made or sought by or on behalf of Parent, the Company or any of their respective Affiliates to or from any third party, including any Governmental Entity, in each case necessary or advisable in connection with the Transactions and, with respect to the information supplied in writing by or on behalf of Parent, its Affiliates or its or their respective Representatives for inclusion in or incorporation by reference into the Schedule 14D-9, including with respect to the Investors. Each of Parent and the Company acknowledges and agrees that such information supplied by it pursuant to this Section 7.8(a) (as applicable) will be correct and complete in all material respects at the time so supplied. (b) In addition to and without limiting the rights and obligations set forth in Section 7.8(a), the Company shall (and shall cause its Subsidiaries to), upon reasonable prior notice, afford Parent and its Representatives reasonable access, during normal business hours, from the date of this Agreement and continuing until the earlier of the Effective Time and the termination of this Agreement pursuant to Article IX, to the Company Employees, agents, properties, offices and other facilities, Contracts, books and records, and, during such period, the Company shall (and shall cause its Subsidiaries to) furnish promptly to Parent all other information and documents concerning or regarding its businesses, properties and assets and personnel as may reasonably be requested by or on behalf of Parent; provided, however, that, subject to compliance with the obligations set forth in Section 7.8(c): (i) neither the Company nor any of its Subsidiaries shall be required to provide such access or furnish such information or documents to the extent doing so would, in the reasonable opinion of the Company’s outside legal counsel result in (A) a violation of applicable Law, (B) the breach of any contractual confidentiality obligations in any Contract with a third party entered into prior to the date of this Agreement or following the date of this Agreement in compliance with Section 7.1 and Section 7.2; (C) waive the protection of any attorney-client privilege or protection (including attorney-client privilege, attorney work-product protections and confidentiality protections) or any other applicable privilege or protection concerning pending or threatened Proceedings, in any material respect; or (D) such information or documents are reasonably pertinent to any adverse Proceeding between the Company and its Affiliates, on the one hand, and Parent and its Affiliates, on the other hand (subject to any rules or guidelines of discovery applicable to such adverse Proceeding); and (ii) in no event shall the work papers of the Company’s and its Subsidiaries’ independent accountants and auditors be accessible to Parent or any of its Representative unless and until such accountants and auditors have provided a consent related thereto in form and substance reasonably acceptable to such auditors or independent accountants. Any investigation conducted pursuant to the access contemplated by this Section 7.8(b) will be conducted in a manner that does not unreasonably interfere with the conduct of the business of the Company and its Subsidiaries and that would not reasonably be expected to create a risk of damage or destruction to any property or assets of the Company or its Subsidiaries. Any access to the properties of the Company and its Subsidiaries shall be subject to the Company’s reasonable security measures and insurance requirements and shall not include the right to perform any “invasive” testing or soil, air or groundwater sampling, including any Phase II environmental assessments. All requests for such access or information made pursuant to this Section 7.8(b) shall be initially directed to the Person set forth on Section 7.8(b) of the Company Disclosure Schedule, which Person may be replaced by the Company at any time by providing written notice to Parent, and any access granted in connection with a request made pursuant to this Section 7.8(b) shall be supervised by such Persons. (c) In the event that the Company objects to any request submitted pursuant to Section 7.8(b) on the basis of one or more of the matters set forth in clause (i) of Section 7.8(b), it must do so by providing Parent, in reasonable detail, the nature of what is being prevented and/or withheld and the reasons and reasonable support therefor, and prior to preventing such access or withholding such information or documents from Parent and its Representatives, the Company shall cooperate with Parent to make appropriate substitute arrangements to permit reasonable disclosure that does not suffer from any of the impediments expressly set forth in clause (i) of Section 7.8(b) (other than clause (D)) including through the use of commercially reasonable efforts to take such actions and implement appropriate and mutually agreeable measures to as promptly as practicable permit such access and the furnishing of such information and documents in a manner to remove the basis for the objection, including by arrangement of appropriate “counsel-to-counsel” disclosure, clean room procedures, redaction and other customary procedures, entry into a customary joint defense agreement and, with respect to the contractual confidentiality obligations contemplated by clause (i)(B) of Section 7.8(b), obtaining a waiver with respect to or consent under such contractual confidentiality obligations. (d) Without limiting the generality of the other provisions of this Section 7.8, the Company and Parent, as each deems advisable and necessary, after consultation with their respective outside legal counsel, may reasonably designate competitively sensitive information and documents (including those that relate to valuation of the Company or Parent (as the case may be)) as “Outside Counsel Only Information.” Such information and documents shall only be provided to the outside legal counsel of the Company or Parent (as the case may be), or subject to such other similar restrictions mutually agreed to by the Company and Parent, and subject to any amendment, supplement or other modification to the Confidentiality Agreement or additional confidentiality or joint defense agreement between or among the Company and Parent; provided, however, that, subject to any applicable Laws relating to the exchange of information, the outside legal counsel receiving such information and documents may prepare one or more reports summarizing the results of any analysis of any such shared information and documents, and disclose such reports, other summaries or aggregated information derived from such shared information and documents to Representatives of such outside legal counsel’s client. (e) No access or information provided to Parent or any of its Representatives or to the Company or any of its Representatives following the date of this Agreement, whether pursuant to this Section 7.8 or otherwise, shall affect or be deemed to affect, modify or waive the representations and warranties of the Parties set forth in this Agreement and, for the avoidance of doubt, all information and documents disclosed or otherwise made available pursuant to Section 7.5, Section 7.6, this Section 7.8 or otherwise in connection with this Agreement and the Transactions shall be governed by the terms and conditions of the Confidentiality Agreement mutatis mutandis as if Parent were Counterparty (as defined in the Confidentiality Agreement) and subject to applicable Laws relating to the exchange or sharing of information and any restrictions or requirements imposed by any Governmental Entity; provided, that, in the event of a conflict, the provisions of Section 7.13 shall override any conflicting provisions of the Confidentiality Agreement, and any Person who is a potential source of, or may provide, equity, debt or any other type of financing to Parent or any of its Representatives in connection with the Transactions shall be deemed a “Representative” for purposes of the Confidentiality Agreement without the prior written consent of the Company.

  • Inclusion and accessibility The institution will provide support to incoming mobile participants with fewer opportunities, according to the requirements of the Erasmus Charter for Higher Education. Information and assistance can be provided by the following contact points and information sources: Although a brief overview is provided in this agreement, more detailed information is sent to the nominees in order for them to prepare their exchange.

  • Records and Access The Advisor, in the conduct of its responsibilities to the Company, shall maintain adequate and separate books and records for the Company’s operations in accordance with GAAP, which shall be supported by sufficient documentation to ascertain that such books and records are properly and accurately recorded. Such books and records shall be the property of the Company and shall be available for inspection by the Board and by counsel, auditors and other authorized agents of the Company, at any time or from time to time during normal business hours. The Advisor shall at all reasonable times have access to the books and records of the Company and the Operating Partnership.

  • Cooperation and Access The Cooperative Member agrees that it will cooperate in compliance with any reasonable requests for information and/or records made by the Cooperative. The Cooperative reserves the right to audit the relevant records of any Cooperative Member. Any breach of this provision shall be considered material and shall make the Agreement subject to termination on ten (10) days written notice to the Cooperative Member.

  • Dissemination of Research Findings and Acknowledgement of Controlled-Access Datasets Subject to the NIH GDS Policy

  • Power Supply Information and Access to Information POWER SUPPLY INFORMATION

  • Inspection and Access Landlord and its agents, representatives, and contractors may enter the Premises at any reasonable time to inspect the Premises and to make such repairs as may be required or permitted pursuant to this Lease and for any other business purpose. Landlord and Landlord’s representatives may enter the Premises during business hours on not less than 48 hours advance written notice (except in the case of emergencies in which case no such notice shall be required and such entry may be at any time) for the purpose of effecting any such repairs, inspecting the Premises, showing the Premises to prospective purchasers and, during the last year of the Term, to prospective tenants or for any other business purpose. Landlord may erect a suitable sign on the Premises stating the Premises are available to let or that the Project is available for sale. Landlord may grant easements, make public dedications, designate Common Areas and create restrictions on or about the Premises, provided that no such easement, dedication, designation or restriction materially, adversely affects Tenant’s use or occupancy of the Premises for the Permitted Use. At Landlord’s request, Tenant shall execute such instruments as may be necessary for such easements, dedications or restrictions. Tenant shall at all times, except in the case of emergencies, have the right to escort Landlord or its agents, representatives, contractors or guests while the same are in the Premises, provided such escort does not materially and adversely affect Landlord’s access rights hereunder.

  • Zone File Access Agreement Registry Operator will enter into an agreement with any Internet user, which will allow such user to access an Internet host server or servers designated by Registry Operator and download zone file data. The agreement will be standardized, facilitated and administered by a Centralized Zone Data Access Provider, which may be ICANN or an ICANN designee (the “CZDA Provider”). Registry Operator (optionally through the CZDA Provider) will provide access to zone file data per Section 2.1.3 of this Specification and do so using the file format described in Section 2.1.4 of this Specification. Notwithstanding the foregoing, (a) the CZDA Provider may reject the request for access of any user that does not satisfy the credentialing requirements in Section 2.1.2 below; (b) Registry Operator may reject the request for access of any user that does not provide correct or legitimate credentials under Section 2.1.2 below or where Registry Operator reasonably believes will violate the terms of Section 2.1.5. below; and, (c) Registry Operator may revoke access of any user if Registry Operator has evidence to support that the user has violated the terms of Section 2.1.5 below.

  • REPORTS AND ACCESS The Advisor agrees to supply such information to the Fund's administrator and to permit such compliance inspections by the Fund's administrator as shall be reasonably necessary to permit the administrator to satisfy its obligations and respond to the reasonable requests of the Trustees.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!