Restrictions on Access and Use. You and your applicable Affiliates agree to not: (i) access, use, copy, display, distribute, transfer, lease, sell, resell, license, sublicense, or otherwise make available the MicroStrategy Products in any manner or for any purpose not authorized by the Agreement, including in a manner that exceeds your authorized access and use rights or that is intended to avoid incurring fees or exceed usage limits or quotas, or in a manner contrary to applicable law; (ii) modify, reverse engineer, decompile or create derivative works of any portion of the MicroStrategy Products, except as provided in the Documentation or except to the extent permitted by applicable law; (iii) interfere with or disrupt the integrity or performance of MicroStrategy Products or attempt to gain unauthorized access to a MicroStrategy Product or its related systems or networks; (iv) use the MicroStrategy Products to develop or train any product or service that is competitive with our business or offerings; (v) make available to any third- party any analysis of the operation or benchmarking of the MicroStrategy Products or any Reports, without our prior written consent; (vi) use any MicroStrategy Product to provide time-sharing services, software-as-a-service offering, service bureau services or similar services or (vii) use the MicroStrategy Products to store or transmit material in violation of third-party privacy rights or that is infringing or otherwise unlawful or tortious or that constitutes Malicious Code. g.
Restrictions on Access and Use. Except as otherwise expressly permitted herein, You shall not (i) use, or allow the use of, the Service or the Recall Data for any purpose (including, without limitation, for any commercial use or to perform analytics), other than the Permitted Use, or otherwise in contravention of this Agreement or any federal, state, local, foreign or other applicable laws, rules or regulations, (ii) sell or resell the Recall Data or information derived therefrom, in whole or in part, to any person or third party, (iii) share Your User Credentials or any Authorized User Credentials with any person or entity, (iv) permit use of Your User Account or the Recall Data, in whole or in part, by any person or entity, (v) cause, permit or authorize the decompilation, modification, disassembly or reverse engineering of the Service, or create derivative works thereof, (vi) sell, assign, rent, transfer, distribute, act as a service bureau, sublicense or otherwise grant rights in the Service or the Recall Data to any person or entity, (vii) recreate, compile or integrate the Recall Data with other data, (viii) engage in the practice of “screen scraping,” “database scraping” or any other practice or activity the purpose of which is to obtain lists of vehicles, portions of a database or other lists or information (including, without limitation, any Recall Data) in or from the Service, (ix) introduce into the Service any virus, spyware, ransomware, worms, Trojan horses, malware, logic bombs, software or other code or routine intended to disrupt, delete, damage or alter the Service, or (x) use the Service in any manner that could damage, disable, overburden, or impair the Service or interfere with any other user’s use and enjoyment of the Service. YOU MAY NOT MAKE USE OF ANY ROBOTS, WEBCRAWLERS, SPIDERS, OR SIMILAR DATA MINING, DATA GATHERING OR EXTRACTION TOOLS OR MANUAL PROCESSES TO COLLECT, GATHER, INDEX, PROCESS, COPY OR STORE ANY CONTENT OR INFORMATION (INCLUDING, WITHOUT LIMITATION, ANY RECALL DATA) FROM THE SERVICE. SYSTEMATIC RETRIEVAL OR USE OF THE SERVICE OR ANY RECALL DATA TO CREATE OR COMPILE, DIRECTLY OR INDIRECTLY, IN WHOLE OR IN PART, A COLLECTION, COMPILATION, DATABASE OR DIRECTORY IS STRICTLY PROHIBITED.
Restrictions on Access and Use. Client may access and use the Products and Documentation solely for its internal business purposes during the term of the Agreement. Client will not (a) use the Products on behalf of or for the benefit of any person or entity other than Client except as expressly stated otherwise in this Agreement;
Restrictions on Access and Use. 9.1 You may not sublicense, assign, resell, share, pledge, rent or transfer any of your rights under this End User Agreement in relation to the Software or Services or any part of them.
9.2 You are not permitted to copy, redistribute, display, perform, reproduce, license, transfer or publish the Software, any of the Software content or any Data without the express permission of the Licensor (which may be withheld at the sole discretion of the Licensor) or as otherwise expressly permitted by your Order Document or Dongle if such item allows for more than one concurrent use of the Software.
9.3 You may not modify, translate, reverse engineer, decompile, disassemble or create derivative works of the Software or otherwise attempt to: (a) defeat, avoid, by- pass, remove, deactivate or otherwise circumvent any software protection mechanisms in the Software, including, without limitation, any such mechanism used to restrict or control the functionality of (or upgrades to) the Software; or
Restrictions on Access and Use. You and your applicable Affiliates agree to not: (i) access, use, copy, display, distribute, transfer, lease, sell, resell, license, sublicense, or otherwise make available the MicroStrategy Products in any manner or for any purpose not authorized by the Agreement, including in a manner that exceeds your authorized access and use rights or that is intended to avoid incurring fees or exceed usage limits or quotas, or in a manner contrary to applicable law; (ii) modify, reverse engineer, decompile or create derivative works of any portion of the MicroStrategy Products, except as provided in the Documentation or except to the extent permitted by applicable law; (iii) interfere with or disrupt the integrity or performance of MicroStrategy Products or attempt to gain unauthorized access to a MicroStrategy Product or its related systems or networks; (iv) use the MicroStrategy Products to develop or train any product or service that is competitive with our business or offerings; (v) make available to any third- party any analysis of the operation or benchmarking of the MicroStrategy Products or any Reports, without our prior written consent; (vi) use any MicroStrategy Product to provide time-sharing services, software-as-a-service offering, service 서비스 제공자가 운영하는 서버 및 워크스테이션에 해당 온프레미스 소프트웨어를 설치, 복제 및 실행하고, (ii) 고객의 지정 사용자가 해당 서버 및 워크스테이션에서 고객의 내부 사업 목적에 한하여 온프레미스 소프트웨어에 액세스할 수 있도록 하는 제한적이고, 개인적이고, 재라이선스가 불가능하며, 이전 불가능하고, 비독점적인 라이선스를 고객에게 허여합니다. c. 특정 제한. 주문서에는 마이크로스트레티지 소프트웨어의 지정 사용자에 대한 특정 수량의 라이선스 또는 온프레미스 소프트웨어의 경우 특정 수량의 CPU 라이선스가 명시될 수 있습니다. 지정 사용자에 대한 특정 수량의 라이선스가 확인되는 경우, 해당 숫자만큼의 지정 사용자만이 하나의 프로덕션환경 및 최대 2개의 비프로덕션 환경에서 마이크로스트레티지 소프트웨어에 액세스하여 사용할 수 있습니다. 특정 수량의 CPU 라이선스가 확인되는 경우, 고객은 불특정 수의 지정 사용자를 지원하기 위하여 하나의 프로덕션환경 및 최대 2개의 비프로덕션 환경에서 해당 수량만큼의 CPU에 해당 마이크로스트레티지 소프트웨어를 설치 및 실행할 수 있습니다. d. 특정 제한. 주문서에는 마이크로스트레티지 소프트웨어의 지정 사용자에 대한 특정 수량의 라이선스 또는 온프레미스 소프트웨어의 경우 특정 수량의 CPU 라이선스가 명시될 수 있습니다. 지정 사용자에 대한 특정 수량의 라이선스가 확인되는 경우, 해당 숫자만큼의 지정 사용자만이 하나의 프로덕션환경 및 최대 2개의 비프로덕션 환경에서 마이크로스트레티지 소프트웨어에 액세스하여 사용할 수 있습니다. 특정 수량의 CPU 라이선스가 확인되는 경우, 고객은 불특정 수의 지정 사용자를 지원하기 위하여 하나의 프로덕션환경 및 최대 2개의 비프로덕션 환경에서 해당 수량만큼의 CPU에 해당 마이크로스트레티지 소프트웨어를 설치 및 실행할 수 있습니다. e. 배치 환경. 주문서에 특정 운영 또는 클라우드 환경이 명시된 경우, 마이크로스트레티지 소프트웨어는 해당 특정 환경에서만 액세스, 설치 또는 실행될 수 있습니다. 단, 기술적으로 다른 운영 또는 클라우드 환경에서의 배치가 필요한 온프레미스 소프트웨어는 예외로 합니다.
Restrictions on Access and Use. The right of the Contractor to access and use the Province Shared Infrastructure shall be subject to the following:
(a) the Province Shared Infrastructure shall be made available during the normal hours of the operation of the Province Shared Infrastructure during which the same is generally made available to other users thereof. The Province may change and modify such hours of operation from those in effect on the Effective Date and from time to time on reasonable prior written notice to the Contractor provided that:
(i) the Province Shared Infrastructure shall be available for use for a reasonable number of hours during each Business Day and at reasonable hours as may be required to support the delivery and performance of the Services,
(ii) any such change or modification of the hours of operation apply generally to users of the Province Shared Infrastructure and do not apply only or principally to the Contractor, and
(iii) the Contractor will not be liable for any breach of or failure to perform its obligations under this Agreement including any failure to meet the Contractor Service Levels to the extent that such breach or failure to perform is attributable to any such change or modification of the hours of operation of the Province Share Infrastructure;
(b) in exercising its right of access to or use of the Province Shared Infrastructure, the Contractor shall:
(i) not alter, change, damage or remove any equipment, data or information comprising part of the Province Shared Infrastructure, and
(ii) following each exercise of access to or use of the Province Shared Infrastructure, leave the Province Shared Infrastructure in substantially the same condition as existed prior to access to or use of the Province Shared Infrastructure by the Contractor, except with the prior written consent of the Province or as specifically contemplated in or resulting from the Services provided under this Agreement;
(c) the Contractor will access and use the Province Shared Infrastructure only for the purpose of delivering and performing the Services under this Agreement, and for no additional, ancillary or other purpose unless specifically authorized in writing by the Province;
(d) the Contractor will advise the Province of any intended reduction in use of the Province Shared Infrastructure as soon as the Contractor is reasonably aware of the same, including any determination by the Contractor to discontinue all or partial use of the Province Shared Infrastructure provided...
Restrictions on Access and Use. User shall not access or attempt to access the Service by any means other than the web and mobile device interfaces provided by HME, or to attempt to circumvent or disable any access or use restrictions put in place by HME. User shall use the Service only for purposes and in a manner that are permitted by applicable laws, rules and regulations. User shall not (and shall not attempt to) decompile, reverse engineer or otherwise derive or discover the source code of the software underlying the Service, or use the Service in a service bureau or other resale capacity.
Restrictions on Access and Use. Participant shall not: (i) cause, permit or authorize the decompilation, modification, disassembly or reverse engineering of CAN Spring Storms Portal, or otherwise discover the services, software and/or technology of CAN Spring Storms Portal, or create derivative works thereof; (ii) allow unauthorized third parties to view, access or use CAN Spring Storms Portal; (iii) sell, assign, rent, transfer, distribute, act as a service bureau, sublicense or otherwise grant rights in CAN Spring Storms Portal to any third person; (iv) use, or allow the use of, CAN Spring Storms Portal in contravention of any federal, state, local, foreign or other applicable laws, rules or regulations;
Restrictions on Access and Use. [Use only one of the following clauses as appropriate:]
Restrictions on Access and Use. 9.1 You may not sublicense, assign, resell, share, pledge, rent or transfer any of your rights under this End User Agreement in relation to the Software or Services or any part of them.
9.2 You are not permitted to copy, redistribute, display, perform, reproduce, license, transfer or publish the Software, any of the Software content or any Data without the express permission of the Licensor (which may be withheld at the sole discretion of the Licensor) or as otherwise expressly permitted by your Order Document or Dongle if such item allows for more than one concurrent use of the Software.
9.3 You may not modify, translate, reverse engineer, decompile, disassemble or create derivative works of the Software or otherwise attempt to: (a) defeat, avoid, by- pass, remove, deactivate or otherwise circumvent any software protection mechanisms in the Software, including, without limitation, any such mechanism used to restrict or control the functionality of (or upgrades to) the Software; or (b) derive the source code or the underlying ideas, algorithms, structure or organisation form of the Software. You will at all times, including during and after the term of this End User Agreement, keep the Software, the content associated with it (together with all access details, including passwords and codes) and any Documentation, confidential.
9.4 In respect of your access and use of the Software you will comply with all applicable laws and regulations and all guidelines, procedures and policies notified by the Licensor and/or the Distributor (if applicable) from time to time.
9.5 In connection with the Software, you agree that: (a) you may not distribute through the Software or any Database any attachments, documents or files that: (i) infringe on any copyright, patent, trade secret, trademark or other third party proprietary rights; (ii) violate any law, statute, ordinance or regulation; (iii) are defamatory, libellous or obscene; or (iv) contain viruses, trojan horses, worms, time bombs, or similar harmful programming routines; (b) you may not use the Software for any unlawful purpose;