Security at Source Code Sites Sample Clauses

Security at Source Code Sites. The Source Code, Optimized Source Code, and the computers used in the development of the Optimized Code must be located at the Source Code Sites. There shall be a maximum of two Source Code Sites. Source Codes Sites must be secure with access restricted to Authorized Employees. E-world shall provide On2 with written notice of the location of and security arrangements in place at each Source Code Site.
AutoNDA by SimpleDocs

Related to Security at Source Code Sites

  • Source Code Escrow On the date hereof, Company shall deliver to an independent third party escrow agent, selected and designated by AMEX and approved by Company (such approval not to be unreasonably withheld) ("Escrow Agent"), for deposit in accordance with an escrow agreement among the Escrow Agent and the parties hereto and substantially in the form attached as Exhibit E ("Escrow Agreement"), a current and complete copy of the source code (the "Source Code") for the Domain Name and any other materials required to operate the Source Code (the "Escrow Materials"). Within [ ** ] of the installation of any new update to the Service (or any other substantial modification to the Source Code, the Domain Name or the Service) or within [ ** ] of the last deposit hereunder, whichever is sooner, Company shall deliver to the Escrow Agent, for deposit in accordance with such Escrow Agreement, any and all changes to the Escrow Materials which correspond to changes, if any, made to the corresponding Escrow Material or shall notify Escrow Agent that no changes were made during the preceding period. All materials deposited hereunder shall be considered "Escrow Materials" as the term is used herein. In the event of (i) the Company's insolvency (as defined in Section 16(e)) or (ii) the Company's material breach of the terms of this Agreement specifically because of its gross negligence or willful misconduct and such breach is not fully remedied within thirty (30) days of AMEX's notice to Company, then notwithstanding any other rights and remedies to which AMEX may be entitled, AMEX shall immediately have the right to obtain a copy of the Escrow Materials from the Escrow Agent upon written notice as provided in the Escrow Agreement for use in continued provision of the Service. AMEX shall have the right, at any time upon at least ten (10) days' written notice to Company and Escrow Agent, to select and designate a new escrow agent to replace the Escrow Agent hereunder. Upon such notice, Escrow Agent shall completely, safely and securely transfer the Escrow Materials to the new escrow agent (which will then become the "Escrow Agent" hereunder) and confirm such transfer in writing to AMEX and Company. ** INDICATES CONFIDENTIAL TREATMENT REQUESTED.

  • Source Code 5.1 Nothing in this XXXX shall give to the User or any other person any right to access or use the Source Code or constitute any licence of the Source Code.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Security / Passwords 2.1. A digital certificate and/or an encryption key may be required to access certain Services. You may apply for a digital certificate and/or an encryption key by following the procedures set forth at xxxx://xxx.xxx.xxx/certs/. You also will need an identification code (ID) and password(s) (Password) to access the Services.

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Return of Documents, Equipment, Etc All writings, records, and other documents and things comprising, containing, describing, discussing, explaining, or evidencing any Confidential Information, and all equipment, components, parts, tools, and the like in Executive’s custody or possession that have been obtained or prepared in the course of Executive’s employment with the Company shall be the exclusive property of the Company, shall not be copied and/or removed from the premises of the Company, except in pursuit of the business of the Company, and shall be delivered to the Company, without Executive retaining any copies, upon notification of the termination of Executive’s employment or at any other time requested by the Company. The Company shall have the right to retain, access, and inspect all property of Executive of any kind in the office, work area, and on the premises of the Company upon termination of Executive’s employment and at any time during employment by the Company to ensure compliance with the terms of this Agreement.

  • Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

Time is Money Join Law Insider Premium to draft better contracts faster.