Software Policy Sample Clauses

Software Policy.  IT Personnel support all software installed on City computers; however, IT staff may be unable to fully support the use of non-standard or specialty software.  IT may decline to install, reinstall, or otherwise fix software that is not approved by the IT Department.  To ensure that IT is able to support all software installed on City computers, IT must approve the installation and use of all software.  Because all software on City computers must comply with the publishers’ licensing requirements, IT staff will not install software unless and until ownership and proper licensing is established.  All City employees, either temporary or full-time, must conform to copyright laws and software licensing agreements.  Copying and/or duplicating software is prohibited unless specifically permitted within the software license agreement.  The City’s current preferred enterprise solution is Tyler Technology application software whenever practical.  All software must be purchased following City of Pueblo Purchasing Guidelines. Implementation or enhancement of any City software is done by the IT Department.  Microsoft application software. Microsoft Office is made available through O365 cloud-based services, and is acquired through IT using a volume purchase agreement. This ensures low pricing and the appropriate version of software to address the requirements. Other Microsoft application software, such as Visio, Project, Publisher and individual Office applications when needed (Word, Excel, Access, PowerPoint) will also be purchased through IT’s volume purchase agreement.  Microsoft Operating Systems (Windows 7, 8.1 and 10). Generally, operating system software is purchased as part of a new PC purchase. In some cases, it is appropriate to upgrade operating systems. In such cases, the upgraded software is purchased through IT’s volume license.  Software that is not the City’s property or licensed to the City will not be installed on City computers.
AutoNDA by SimpleDocs
Software Policy. All software on ADM Board owned computers or devices must be purchased by and remain the property of the ADM Board. Upon delivery, all software must be registered properly and installed by the Information Technology Department. Employees may not duplicate any licensed software or related documentation for use, either on ADM Board premises or elsewhere, unless expressly authorized to do so by written agreement with the licensor. Employees may not provide software licensed to the ADM Board to anyone outside the organization or install it on personal devices. Employees should be aware that the illegal duplication of software or installing it on personal devices may result in the filing of criminal copyright infringement charges by the owners of the copyrights and can subject both the employee and the ADM Board to liability. The ADM Board regulates employees’ use of its computer software, therefore employees may not load software on ADM Board computers or any other devices without consent from the Manger of Information Technology.
Software Policy. Ensuring the prevention of software theft is both a managerial and individual employee responsibility. Both corporate and individual users of software are subject to the provisions of the Copyright Act 1968 which allows the imposition of corporate penalties and penalties against individual users resulting in fines and/or imprisonment. Illegally copied software may also carry with it a high risk of computer virus infection. Subsequent eradication of virus infection may not easily be achieved and may be too late to prevent destruction of sensitive or vital data.
Software Policy. All computing resources must run State standard real-time virus protection software. The virus protection software is not disabled or altered in a manner that shall reduce the effectiveness of the software. The software’s virus definitions are kept current on a regular scheduled basis. For users who access the network from home or other remote locations, a Secure Remote Access service is provided as an enterprise service in the Enterprise Services standard. Every virus that is not automatically cleaned by the virus protection software constitutes a security incident and is reported to the Organization ISO. (See Security Incident Procedures, below.) Endpoint protection is provided as an enterprise service in the Enterprise Services Standard.
Software Policy. All software and hardware must be approved and installed by the IT Department. Employees and contractors are prohibited from installing any software or using any hardware on Company information system resources that have not been approved by the IT Department.

Related to Software Policy

  • Software Updates XXXXX agrees to keep current with software licensed from Skyward and will install new versions on a timeline approved by XXXXX governance. This timeline will be communicated by NWRDC to the Districts.

  • Software Warranty We warrant that the Tyler Software will perform without Defects during the term of this Agreement. If the Tyler Software does not perform as warranted, we will use all reasonable efforts, consistent with industry standards, to cure the Defect in accordance with the maintenance and support process set forth in Section C(9), below, the SLA and our then current Support Call Process.

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • Software Licenses Seller has all necessary licenses to use all material third-party software used in Seller's business, and Seller's use of third-party software does not infringe the rights of any Person.

  • Software Licensing Contractor represents and warrants that the software, if any, as delivered to City, does not contain any program code, virus, worm, trap door, back door, time or clock that would erase data or programming or otherwise cause the software to become inoperable, inaccessible, or incapable of being used in accordance with its user manuals, either automatically, upon the occurrence of licensor-selected conditions or manually on command. Contractor further represents and warrants that all third party software, delivered to City or used by Contractor in the performance of the Contract, is fully licensed by the appropriate licensor.

  • Software License The SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE is licensed, not sold.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

  • Software Upgrades All Software Releases (including all Error corrections made available pursuant to this Agreement) that RSA in its sole discretion: (a) deems to be logical improvements to the Software; (b) make generally available to all licensees of the Software; and (c) does not separately price or market.

  • Required hardware and software The minimum system requirements for using the DocuSign system may change over time. The current system requirements are found here: xxxxx://xxxxxxx.xxxxxxxx.xxx/guides/signer-guide- signing-system-requirements.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!