Communications Equipment (a) Subject to the provisions of this Section 3.5, Tenant shall have the non-exclusive right, at its sole cost and expense and for Tenant’s use, to install, maintain and operate upon the roof of the Building one (1) or a reasonable and necessary additional number of transmitters and/or receiver antennas or dishes approved by Landlord, which approval shall not be unreasonably withheld or delayed (collectively, the “Communications Equipment”) for use by Tenant in the conduct of its business; provided that such Communications Equipment may not materially compromise the aesthetics or appearance of the Building nor shall Landlord be required to incur any expense in accommodating the Communications Equipment. The Communications Equipment must be (i) designed, installed and operated in compliance with all Legal Requirements, and (ii) installed and operated so as not to adversely affect or impact structural, mechanical, electrical, elevator, or other systems serving the Building or customary telephone service for the Building and so as not to cause injury to persons or property, and without limitation of the foregoing, so as not to void or impair any applicable roof warranty. Upon the expiration or termination of this Lease, Tenant shall remove the Communications Equipment and repair any damage to the Building caused by the installation, maintenance, use or removal of the Communications Equipment. (b) Landlord hereby grants to Tenant the right to install (at Tenant’s sole cost and expense) any additional equipment required to operate the Communications Equipment and to connect the Communications Equipment to Tenant’s other machinery and equipment located in the Leased Premises (e.g., conduits and cables) in the shafts, ducts, chases and utility closets located in the core of the building (“Additional Equipment”), which Additional Equipment shall be deemed a part of the Communications Equipment for all purposes of this Section 3.5; provided that (i) the use of such space in the Building core by Tenant (except customary chases for cabling) may not materially adversely affect the marketability of the remaining space on any floor of the Building, and (ii) to the extent any such Additional Equipment occupies space (other than space in customary chases for the Building) that would have otherwise been Net Rentable Area on a floor of the Building, such space shall be included within the Net Rentable Area of the Leased Premises and Tenant shall be obligated to pay Annual Basic Rent and Additional Rent with respect to such space as if such space was included in the Leased Premises. Tenant’s use of such space in the Building core shall be subject to the provisions of this Lease relating to Tenant’s use of Common Areas of the Building. (c) Subject to the Building Rules and other reasonable rules relating to Building security and safety that may be promulgated by Landlord pertaining to access by tenants to the roof of the Building and provided Tenant does not unreasonably disturb any other tenants of the Building, Tenant and Tenant’s contractors shall have reasonable access to the Communications Equipment and the Additional Equipment for purposes of operating, servicing, repairing or otherwise maintaining said equipment. (d) Nothing contained in this Section 3.5 shall be deemed to prohibit or restrict any other individual or entity, including Landlord or any other tenant of the Building, from installing communications equipment on the roof of the Building or to use the roof for any other purpose. (e) In connection with its installation, repair, maintenance and removal of any Communications Equipment and Additional Equipment, Tenant, at Tenant’s sole cost and expense, shall comply with all applicable Building Rules and Legal Requirements and repair any damage to the Building caused by such installation, repair, maintenance or removal. In the event that the placement of Tenant’s Communications Equipment or Additional Equipment interferes with Landlord’s performance of any repair or maintenance to the Common Areas, including the roofs of the Buildings, any costs incurred by Landlord to temporarily or permanently relocate and reinstall Tenant’s Communications Equipment or Additional Equipment shall be included in the cost of such repair or maintenance as a Operating Expense. (f) Tenant’s Communications Equipment and Additional Equipment existing as of the Commencement Date are hereby deemed to be approved by Landlord. Any changes to the existing Communications Equipment and/or Additional Equipment by Tenant shall first be approved by Landlord, which approval will not be unreasonably withheld or delayed. (g) If Landlord shall place on the roof of any Building communications equipment of its own, or shall grant to any third party the right to locate and maintain any such equipment, all such equipment shall be located, designed and operated so as not to interfere with signals to and from Tenant’s Communications Equipment and Additional Equipment, the installation of which, in accordance with this Section 3.5, predates the installation of such other equipment. Similarly, any Communications Equipment and Additional Equipment hereafter installed by Tenant shall be located and designed so as not to interfere with signals to and from such other equipment belonging to Landlord or to third parties, that may have previously been installed. The party responsible for the communications equipment which interferes with equipment previously installed by others shall be required, at its or their expense, to take all measures necessary to eliminate the source of interference caused by such party’s equipment.
License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.
End User License Agreement This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. xxxx://xxxxxxxxxxxxxxx.xxx/licenses/by-nc-nd/3.0/ You are free to: Share: to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work).
Software License Agreement 1) Customers acquiring software licenses under the Contract shall hold, use and operate such software subject to compliance with the Software License Agreement set forth in Appendix D of this Contract. No changes to the Software License Agreement terms and conditions may be made unless previously agreed to between Vendor and DIR. Customers may not add, delete or alter any of the language in Appendix D; provided however, that a Customer and Vendor may agree to additional terms and conditions that do not diminish a term or condition in the Software License Agreement, or in any manner lessen the rights or protections of Customer or the responsibilities or liabilities of Vendor. Order Fulfiller shall make the Software License Agreement terms and conditions available to all Customers at all times. 2) Compliance with the Software License Agreement is the responsibility of the Customer. DIR shall not be responsible for any Customer’s compliance with the Software License Agreement. If DIR purchases software licenses for its own use under this Contract, it shall be responsible for its compliance with the Software License Agreement terms and conditions.
Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.
Software License The SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE is licensed, not sold.
Programming Phase Schematic Design Phase: 2.2.1.3. Design Development Phase:
Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.
Server License We grant you a non-assignable, non-sublicensable, non-exclusive, worldwide right and license to internally use and install the Software on the number of Server(s) listed in the Order Form for Commercial purposes. Unless stated otherwise in the Order Form, for the purposes of this license grant, you may install the Software on one (1) Machine as a substitute for, and not in addition to, one (1) Server. The total count of Server(s) where the Software is installed must not exceed the number of licenses purchased on the applicable Order Form(s).
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.