Common use of Restricted Uses Clause in Contracts

Restricted Uses. 8.1 In relation to the Product Software, you warrant, represent and undertake that you shall: (i) only use the Product Software with the license key, if the Product Software is subject to the use of a license key; (ii) not use the Product Software with any other third party hardware and/or software; (iii) not license, sell, rent, lease, transfer, assign, distribute, host, or otherwise commercially exploit the Product Software, whether in whole or in part, or any content displayed on the Product Software; (iv) not copy (except as expressly permitted by this Agreement), enhance, decompile, modify, make derivative works of, disassemble, reverse compile or reverse engineer, attempt to derive the source of code of any part of the Product Software; (v) not copy (except as expressly permitted by this Agreement), reproduce, distribute, republish, download, display, post or transmit the whole or any part of the Product Software in any form or by any means, except as expressly permitted in this Agreement; (vi) not use any part of the Product Software to establish any independent data files, databases, compendiums or any other reference materials except to the extent such foregoing restriction is prohibited by applicable laws or applicable open source license to, and only to, any open source software component that is incorporated into the Product Software (if any). Any attempt to do so is a violation of the rights of Eaton; (vii) not access or view Product Software in order to build a similar or competitive product or service to the Product Software; (viii) not provide false data including false names, addresses, contact details and fraudulent credit card/debit card details; (ix) not enter into fraudulent or deceptive interactions or transactions with Eaton (which shall include entering into interactions or transactions purportedly on behalf of a third party where you have no authority to bind that third party or you are pretending to be a third party); (x) not use the Product Software in any way that is unlawful, fraudulent or deceptive, or has any unlawful, fraudulent or deceptive purpose or effect; (xi) not use the Product Software except in conjunction with the operation of Eaton products to which the Product Software pertains or other products described by Eaton in the Documentation; (xii) not sell any products or services purchased through Eaton, without Xxxxx’x express permission; (xiii) not intercept communications transmitted by way of a telecommunications system and/or information society service; (xiv) not to distribute, or otherwise provide to any third party any registration code algorithms, registration codes, or encryption keys, where applicable, used by or in connection with the Product Software without the prior written consent of Eaton; (xv) not attempt to create any registration codes or passwords, where applicable, to allow unauthorized activation of the Product Software, nor shall you assist others in doing so; (xvi) not use any registration code algorithms, registration codes or encryption keys, where applicable, that have not been purchased from Eaton or an authorized representative of Eaton; (xvii) not execute any form of network monitoring which will intercept data not intended for you; (xviii) not install the Product Software on multiple devices or in multiple locations without purchasing a separate license from Eaton or a third party authorized by Eaton; (xix) use of the Product Software must at all times comply with all applicable laws, rules and regulations and be strictly in accordance with this Agreement; (xx) not use the Product Software to transmit, or procure the sending of, any unsolicited or unauthorized advertising, promotional material, chain letters, mass mailings or any other form of similar solicitation (spam) or of any material that is illegal, offensive, abusive, indecent, defamatory, obscene, menacing or in breach of proprietary rights, confidence, privacy or any other right, or is injurious to third parties. (xxi) not attempt to gain unauthorized access to the Product Software, its facilities and/or services or any accounts, databases, computer systems, servers and networks connected to the Product Software and the server on which our site is stored. You shall not attack the Product Software via a denial of service attack. You will not misuse the Product Software by knowingly or recklessly introducing viruses, Trojans, worms, logic bombs, harmful data or other materials which is malicious or harmful; (xxii) not use the Product Software to harvest or otherwise collect by any means any program material or any information whatsoever (including without limitation email addresses or other personal details of other users); (xxiii) provide Eaton with accurate and complete information and acknowledge that Xxxxx’x ability to deliver the Product Software is dependent upon your cooperation, as well as the accuracy and completeness of any information you provide to Eaton. Eaton shall not be liable for any costs, expenses or liabilities resulting from your failure to cooperate or to provide such information; (xxiv) not access the Product Software through the use of any mechanism other than through the use of an authorized connection; (xxv) not use any automated technology such as a robot, spider or scraper, to access, scrape or data mine the Product Software; (xxvi) not modify the paper or digital copies of any Materials you print or download in any way, and you must not use any illustrations, photographs, video or audio sequences, or any graphics separately from any accompanying text; (xxvii) not, without Xxxxx’x prior express written permission, “mirror”, screen-scrape or frame by any other similar method, any Materials contained on this Product Software on any other server; (xxviii) not use any part of the Materials for commercial purposes without obtaining permission from our licensors or us. If you are in breach of these terms of use, your right to use the Product Software will cease immediately and you must, at our option, return or destroy any copies of the Materials you have made; (xxix) use reasonable endeavours to prevent any unauthorized access to, or use of, the Product Software and, in the event of any such unauthorized access or use, immediately without delay notify Eaton in writing by email or by phone to the relevant contact information provided in the “contact us” section below. 8.2 By breaching Clause 8.1 of this Agreement, you could potentially commit a criminal offence. We will report any such breach to the relevant law enforcement authorities, and we will co-operate with those authorities by disclosing your identity to them. In the event of such a breach, your right to use the Product Software will cease immediately. 8.3 We will not be liable for any loss or damage caused by a distributed denial of service attack, viruses or other technologically harmful material that may infect your computer equipment, computer programs, data or other proprietary material due to your use of the Product Software or to your downloading of any material posted on it, or any website linked to it.

Appears in 5 contracts

Samples: End User License Agreement, End User License Agreement, End User License Agreement

AutoNDA by SimpleDocs

Restricted Uses. 8.1 In relation to the Product Software, you warrant, represent and undertake that you shall: (i) only use the Product Software with the license key, if the Product Software is subject to the use of a license key; (ii) not use the Product Software with any other third party hardware and/or software; (iii) not license, sell, rent, lease, transfer, assign, distribute, host, or otherwise commercially exploit the Product Software, whether in whole or in part, or any content displayed on the Product Software; (iviii) not copy (except as expressly permitted by this Agreement), enhance, decompile, modify, make derivative works of, disassemble, reverse compile or reverse engineer, attempt to derive the source of code of any part of the Product Software; (viv) not copy (except as expressly permitted by this Agreement), reproduce, distribute, republish, download, display, post or transmit the whole or any part of the Product Software in any form or by any means, except as expressly permitted in this Agreement; (viv) not use any part of the Product Software to establish any independent data files, databases, compendiums or any other reference materials except to the extent such foregoing restriction is prohibited by applicable laws or applicable open source license to, and only to, any open source software component that is incorporated into the Product Software (if any). Any attempt to do so is a violation of the rights of Eaton; (viivi) not access or view Product Software in order to build a similar or competitive product or service to the Product Software; (viiivii) not provide false data including false names, addresses, contact details and fraudulent credit card/debit card details; (ixviii) not enter into fraudulent or deceptive interactions or transactions with Eaton (which shall include entering into interactions or transactions purportedly on behalf of a third party where you have no authority to bind that third party or you are pretending to be a third party); (xix) not use the Product Software in any way that is unlawful, fraudulent or deceptive, or has any unlawful, fraudulent or deceptive purpose or effect; (xix) not use the Product Software except in conjunction with the operation of Eaton products to which the Product Software pertains or other products described by Eaton in the Documentation; (xiixi) not sell any products or services purchased through Eaton, without Xxxxx’x express permission; (xiiixii) not intercept communications transmitted by way of a telecommunications system and/or information society service; (xivxiii) not to distribute, or otherwise provide to any third party any registration code algorithms, registration codes, or encryption keys, where applicable, used by or in connection with the Product Software without the prior written consent of Eaton; (xvxiv) not attempt to create any registration codes or passwords, where applicable, to allow unauthorized activation of the Product Software, nor shall you assist others in doing so; (xvixv) not use any registration code algorithms, registration codes or encryption keys, where applicable, that have not been purchased from Eaton or an authorized representative of Eaton; (xviixvi) not execute any form of network monitoring which will intercept data not intended for you; (xviiixvii) not install the Product Software on multiple devices or in multiple locations without purchasing a separate license from Eaton or a third party authorized by Eaton; (xixxviii) use of the Product Software must at all times comply with all applicable laws, rules and regulations and be strictly in accordance with this Agreement; (xxxix) not use the Product Software to transmit, or procure the sending of, any unsolicited or unauthorized advertising, promotional material, chain letters, mass mailings or any other form of similar solicitation (spam) or of any material that is illegal, offensive, abusive, indecent, defamatory, obscene, menacing or in breach of proprietary rights, confidence, privacy or any other right, or is injurious to third parties. (xxixx) not attempt to gain unauthorized access to the Product Software, its facilities and/or services or any accounts, databases, computer systems, servers and networks connected to the Product Software and the server on which our site is stored. You shall not attack the Product Software via a denial of service attack. You will not misuse the Product Software by knowingly or recklessly introducing viruses, Trojans, worms, logic bombs, harmful data or other materials which is malicious or harmful; (xxiixxi) not use the Product Software to harvest or otherwise collect by any means any program material or any information whatsoever (including without limitation email addresses or other personal details of other users); (xxiiixxii) provide Eaton with accurate and complete information and acknowledge that Xxxxx’x ability to deliver the Product Software is dependent upon your cooperation, as well as the accuracy and completeness of any information you provide to Eaton. Eaton shall not be liable for any costs, expenses or liabilities resulting from your failure to cooperate or to provide such information; (xxivxxiii) not access the Product Software through the use of any mechanism other than through the use of an authorized connection; (xxvxxiv) not use any automated technology such as a robot, spider or scraper, to access, scrape or data mine the Product Software; (xxvixxv) not modify the paper or digital copies of any Materials you print or download in any way, and you must not use any illustrations, photographs, video or audio sequences, or any graphics separately from any accompanying text; (xxviixxvi) not, without Xxxxx’x prior express written permission, “mirror”, screen-scrape or frame by any other similar method, any Materials contained on this Product Software on any other server; (xxviiixxvii) not use any part of the Materials for commercial purposes without obtaining permission from our licensors or us. If you are in breach of these terms of use, your right to use the Product Software will cease immediately and you must, at our option, return or destroy any copies of the Materials you have made; (xxixxxviii) use reasonable endeavours to prevent any unauthorized access to, or use of, the Product Software and, in the event of any such unauthorized access or use, immediately without delay notify Eaton in writing by email or by phone to the relevant contact information email address provided in the “contact us” section belowbelow and shall immediately without delay telephone Eaton to ensure the email communication has been received. 8.2 By breaching Clause 8.1 of this Agreement, you could potentially commit a criminal offence. We will report any such breach to the relevant law enforcement authorities, and we will co-operate with those authorities by disclosing your identity to them. In the event of such a breach, your right to use the Product Software will cease immediately. 8.3 We will not be liable for any loss or damage caused by a distributed denial of service attack, viruses or other technologically harmful material that may infect your computer equipment, computer programs, data or other proprietary material due to your use of the Product Software or to your downloading of any material posted on it, or any website linked to it.

Appears in 1 contract

Samples: End User License Agreement

AutoNDA by SimpleDocs

Restricted Uses. 8.1 In relation to the Product Software, you warrant, represent and undertake that you shall: (i) only use the Product Software with the license key, if the Product Software is subject to the use of a license key; (ii) not use the Product Software with any other third party hardware and/or software; (iii) not license, sell, rent, lease, transfer, assign, distribute, host, or otherwise commercially exploit the Product Software, whether in whole or in part, or any content displayed on the Product Software; (iv) not copy (except as expressly permitted by this Agreement), enhance, decompile, modify, make derivative works of, disassemble, reverse compile or reverse engineer, attempt to derive the source of code of any part of the Product Software; (v) not copy (except as expressly permitted by this Agreement), reproduce, distribute, republish, download, display, post or transmit the whole or any part of the Product Software in any form or by any means, except as expressly permitted in this Agreement; (vi) not use any part of the Product Software to establish any independent data files, databases, compendiums or any other reference materials except to the extent such foregoing restriction is prohibited by applicable laws or applicable open source license to, and only to, any open source software component that is incorporated into the Product Software (if any). Any attempt to do so is a violation of the rights of EatonXxxxx; (vii) not access or view Product Software in order to build a similar or competitive product or service to the Product Software; (viii) not provide false data including false names, addresses, contact details and fraudulent credit card/debit card details; (ix) not enter into fraudulent or deceptive interactions or transactions with Eaton Xxxxx (which shall include entering into interactions or transactions purportedly on behalf of a third party where you have no authority to bind that third party or you are pretending to be a third party); (x) not use the Product Software in any way that is unlawful, fraudulent or deceptive, or has any unlawful, fraudulent or deceptive purpose or effect; (xi) not use the Product Software except in conjunction with the operation of Eaton products to which the Product Software pertains or other products described by Eaton in the Documentation; (xii) not sell any products or services purchased through Eaton, without Xxxxx’x express permission; (xiii) not intercept communications transmitted by way of a telecommunications system and/or information society service; (xiv) not to distribute, or otherwise provide to any third party any registration code algorithms, registration codes, or encryption keys, where applicable, used by or in connection with the Product Software without the prior written consent of Eaton; (xv) not attempt to create any registration codes or passwords, where applicable, to allow unauthorized activation of the Product Software, nor shall you assist others in doing so; (xvi) not use any registration code algorithms, registration codes or encryption keys, where applicable, that have not been purchased from Eaton or an authorized representative of Eaton; (xvii) not execute any form of network monitoring which will intercept data not intended for you; (xviii) not install the Product Software on multiple devices or in multiple locations without purchasing a separate license from Eaton or a third party authorized by EatonXxxxx; (xix) use of the Product Software must at all times comply with all applicable laws, rules and regulations and be strictly in accordance with this Agreement; (xx) not use the Product Software to transmit, or procure the sending of, any unsolicited or unauthorized advertising, promotional material, chain letters, mass mailings or any other form of similar solicitation (spam) or of any material that is illegal, offensive, abusive, indecent, defamatory, obscene, menacing or in breach of proprietary rights, confidence, privacy or any other right, or is injurious to third parties. (xxi) not attempt to gain unauthorized access to the Product Software, its facilities and/or services or any accounts, databases, computer systems, servers and networks connected to the Product Software and the server on which our site is stored. You shall not attack the Product Software via a denial of service attack. You will not misuse the Product Software by knowingly or recklessly introducing viruses, Trojans, worms, logic bombs, harmful data or other materials which is malicious or harmful; (xxii) not use the Product Software to harvest or otherwise collect by any means any program material or any information whatsoever (including without limitation email addresses or other personal details of other users); (xxiii) provide Eaton Xxxxx with accurate and complete information and acknowledge that Xxxxx’x ability to deliver the Product Software is dependent upon your cooperation, as well as the accuracy and completeness of any information you provide to Eaton. Eaton Xxxxx shall not be liable for any costs, expenses or liabilities resulting from your failure to cooperate or to provide such information; (xxiv) not access the Product Software through the use of any mechanism other than through the use of an authorized connection; (xxv) not use any automated technology such as a robot, spider or scraper, to access, scrape or data mine the Product Software; (xxvi) not modify the paper or digital copies of any Materials you print or download in any way, and you must not use any illustrations, photographs, video or audio sequences, or any graphics separately from any accompanying text; (xxvii) not, without Xxxxx’x prior express written permission, “mirror”, screen-scrape or frame by any other similar method, any Materials contained on this Product Software on any other server; (xxviii) not use any part of the Materials for commercial purposes without obtaining permission from our licensors or us. If you are in breach of these terms of use, your right to use the Product Software will cease immediately and you must, at our option, return or destroy any copies of the Materials you have made; (xxix) use reasonable endeavours to prevent any unauthorized access to, or use of, the Product Software and, in the event of any such unauthorized access or use, immediately without delay notify Eaton Xxxxx in writing by email or by phone to the relevant contact information provided in the “contact us” section below. 8.2 By breaching Clause 8.1 of this Agreement, you could potentially commit a criminal offence. We will report any such breach to the relevant law enforcement authorities, and we will co-operate with those authorities by disclosing your identity to them. In the event of such a breach, your right to use the Product Software will cease immediately. 8.3 We will not be liable for any loss or damage caused by a distributed denial of service attack, viruses or other technologically harmful material that may infect your computer equipment, computer programs, data or other proprietary material due to your use of the Product Software or to your downloading of any material posted on it, or any website linked to it.

Appears in 1 contract

Samples: End User License Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!