Common use of Reproduction rights and access protection Clause in Contracts

Reproduction rights and access protection. 2.1. The customer may duplicate the program supplied if the duplication in question is necessary for the purpose of using the program in connection with the acquired installation. The scope of use agreed between the parties is set forth in the licence agreement and the other delivery documents. Necessary duplications include installing the program from the original data carrier onto the mass storage device of the hardware used, as well as loading the program into the working memory. 2.2. Furthermore, the customer may make copies for backup purposes. As a matter of principle however, only one backup copy may be made and stored. This backup copy of the program supplied shall be labelled as such. 2.3. If making a regular backup of the entire dataset (including computer programs used) is crucial for reasons of data security or for ensuring the prompt reactivation of the computer system after a total failure, the customer may make the number of backup copies absolutely necessary. The data carriers in question shall be labelled accordingly. The backup copies may only be used for purely archival purposes. 2.4. The customer shall take appropriate measures to prevent third parties gaining unauthorised access to the software. The original data carriers provided, as well as any backup copies made, shall be kept in a safe location secured against unauthorised access by third parties. This obligation shall also be imposed on employees who use the software. 2.5. The customer may not make any further copies, including outputting the program code on a printer or photocopying the manual or documentation. Any additional manuals required for employee use shall be obtained from us. 2.6. If it is agreed between the parties that the customer may make use of the program on any or a certain number of hardware units, a record shall be kept of the number of copies used and, unless otherwise agreed in the contract, we shall be notified thereof upon request. 2.7. We are entitled to take the necessary measures for program protection, in particular by making use of the programs dependent upon the use of a program protection key or softkey (dongle). We are also entitled to ensure that the agreed scope of the right of use cannot be exceeded.

Appears in 4 contracts

Samples: General Terms and Conditions for the Supply of Goods and Services, General Terms and Conditions for the Supply of Goods and Services, General Terms and Conditions for the Supply of Goods and Services

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!