USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.
Software Additional provisions relating to software.
Third Party Software Customer acknowledges that in order for MyEcheck to perform the Consulting Services, Customer may need to obtain additional third party services ("Third Party Services") or third party technology ("Third Party Technology"). Customer agrees that the rights and licenses with respect to Third Party Technology and Third Party Services shall be under terms set forth in the pertinent purchase, license or services agreements between Customer and the vendors of such Third Party Software or Third Party Services. Customer shall execute and comply with appropriate purchase, license, or services agreements with respect to any Third Party Software or Third Party Services. Any amounts payable to third party vendors or service providers under such agreements are the sole responsibility of Customer and shall be paid directly by Customer to such third party vendors or service providers. MyEcheck Services Agreement
Licensed Software Section 3.17(f).......................................27
Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).
Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.
Hardware “Hardware” means the hardware and other furniture, fixtures and equipment owned or leased and then currently being used by PROVIDER exclusively to perform the Services under any MOA or PSA or to support such performance. To the extent any such items are not used by PROVIDER exclusively to perform the Services, PROVIDER shall assist CUSTOMER or its designee in purchasing, leasing or otherwise obtaining the use of comparable items.
Computer Software All computer applications software, owned or licensed, whether for general business usage (e.g., accounting, word processing, graphics, spreadsheet analysis, etc.), or specific, unique-to-the-business usage, and all computer operating, security or programming software, owned or licensed by Seller and used in the operation of the Business; and
Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.
Open Source Software (i) The Company uses and has used any and all software and other materials distributed under a “free,” “open source,” or similar licensing model (including but not limited to the MIT License, Apache License, GNU General Public License, GNU Lesser General Public License and GNU Affero General Public License) (“Open Source Software”) in compliance with all license terms applicable to such Open Source Software; and (ii) the Company has not used or distributed and does not use or distribute any Open Source Software in any manner that requires or has required (A) the Company to permit reverse engineering of any software code or other technology owned by the Company or (B) any software code or other technology owned by the Company to be (1) disclosed or distributed in source code form, (2) licensed for the purpose of making derivative works or (3) redistributed at no charge.