Software Scope of Use Restrictions Sample Clauses

Software Scope of Use Restrictions. Customer agrees to include terms and conditions in its Customer agreements that are reflective of the following: (a) the Customer is granted a non-exclusive, non-transferable and non-assignable right to use the Products solely for their intended use; (b) the Customer may not reverse engineer, decompile, alter, transfer, modify or create a derivative work of the Product; (c) no ownership rights to the Products and documentation are transferred to the Customer; (d) the Customer may not use the Products otherwise than as a part of the equipment, hardware or software in which any Product has been incorporated or for which it has been delivered; (e) the Customer may not remove any proprietary, copyrights, trade secret or warning legend from any Products or documentation or copies thereof;
AutoNDA by SimpleDocs

Related to Software Scope of Use Restrictions

  • License Restrictions Licensor reserves all rights not expressly granted to You. The Software is licensed for Your internal use only. Except as this Agreement expressly allows, You may not (1) copy (except for back-up purposes), modify, alter, create derivative works, reverse engineer, decompile, or disassemble the Software except and only to the extent expressly permitted by applicable law; (2) transfer, assign, pledge, rent, timeshare, host or lease the Software, or sublicense any of Your license grants or rights under this Agreement; in whole or in part, without prior written permission of Licensor; (3) remove any patent, trademark, copyright, trade secret or other proprietary notices or labels on the Software or its documentation; or (4) disclose the results of any performance, functional or other evaluation or benchmarking of the Software to any third party without the prior written permission of Licensor. Hosting Restrictions. In the event that You desire to have a third party manage, host (either remotely or virtually) or use the Software on Your behalf, You shall (1) first enter into a valid and binding agreement with such third party that contains terms and conditions to protect Licensor’s rights in the Software that are no less prohibitive and/or restrictive than those contained in this Agreement, including, without limitation, the Verification section below; (2) prohibit use by such third party except for the sole benefit of You; and (3) be solely responsible to Licensor for any and all breaches of the above terms and conditions by such third party.

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

  • LICENCE RESTRICTIONS You agree that you will: 17.1 not rent, lease, sub-license, loan, provide, or otherwise make available, the Apps or the Services in any form, in whole or in part to any person without prior written consent from us; 17.2 not copy the Apps, User Information or Services, except as part of the normal use of the Apps or where it is necessary for the purpose of back-up or operational security; 17.3 not translate, merge, adapt, vary, alter or modify, the whole or any part of the Apps, User Information or Services nor permit the Apps or the Services or any part of them to be combined with, or become incorporated in, any other programs, except as necessary to use the Apps and the Services on devices as permitted in these terms; 17.4 not disassemble, de-compile, reverse engineer or create derivative works based on the whole or any part of the Apps or the Services nor attempt to do any such things, except to the extent that (by virtue of sections 50B and 296A of the UK Copyright, Designs and Patents Act 1988) such actions cannot be prohibited because they are necessary to decompile the Apps to obtain the information necessary to create an independent program that can be operated with the Apps or with another program (Permitted Objective), and provided that the information obtained by you during such activities: (a) is not disclosed or communicated without our prior written consent to any third party to whom it is not necessary to disclose or communicate it in order to achieve the Permitted Objective; and (b) is not used to create any software that is substantially similar in its expression to the Apps; (c) is kept secure; and (d) is used only for the Permitted Objective; 17.5 comply with all applicable technology control or export laws and regulations that apply to the technology used or supported by the Apps or any Service; (a) not overload our servers by contributing or participation in a Denial of Service (DoS) attack.

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

  • Scope of Use The Fund will use the System and the Data Access Services only for the processing of securities transactions, the keeping of books of account for the Fund and accessing data for purposes of reporting and analysis. The Fund shall not, and shall cause its employees and agents not to (i) permit any unauthorized third party to use the System or the Data Access Services, (ii) sell, rent, license or otherwise use the System or the Data Access Services in the operation of a service bureau or for any purpose other than as expressly authorized under this Addendum, (iii) use the System or the Data Access Services for any fund, trust or other investment vehicle), other than as set forth herein, without the prior written consent of State Street, (iv) allow access to the System or the Data Access Services through terminals or any other computer or telecommunications facilities located outside the Designated Locations, (v) allow or cause any information (other than portfolio holdings, valuations of portfolio holdings, and other information reasonably necessary for the management or distribution of the assets of the Fund) transmitted from State Street’s databases, including data from third party sources, available through use of the System or the Data Access Services to be redistributed or retransmitted to another computer, terminal or other device for other than use for or on behalf of the Fund or (vi) modify the System in any way, including without limitation developing any software for or attaching any devices or computer programs to any equipment, system, software or database which forms a part of or is resident on the Designated Configuration.

  • Content Restrictions You agree not to use any Product or Service to store, display, or transmit content that is deceptive, libelous, defamatory, obscene, racist, hateful, infringing or illegal, and to the extent Authorized Users exercise the rights granted to you under this Agreement, you represent and agree that you will ensure that such Authorized Users will also comply with the obligations applicable to such exercise set forth in this Agreement. We take no responsibility and assume no liability for any Customer Property that you, an Authorized User, or third party out of our control posts, submits, displays, or otherwise makes available via the Products or Services, and you agree that we are acting only as a passive conduit for the online distribution and publications of such Customer Property.

  • ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service; (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

  • PROPRIETARY/RESTRICTIVE SPECIFICATIONS If a prospective bidder considers the specification contained herein to be proprietary or restrictive in nature, thus potentially resulting in reduced competition, they are urged to contact the Procurement Division prior to bid opening. Specifications which are unrelated to performance will be considered for deletion via addendum to this Invitation for Bids.

  • Disclosure and Use Restrictions Executive agrees and covenants: (i) to treat all Confidential Information as strictly confidential; (ii) not to directly or indirectly disclose, publish, communicate, or make available Confidential Information, or allow it to be disclosed, published, communicated, or made available, in whole or part, to any entity or person whatsoever (including other employees of the Company) not having a need to know and authority to know and use the Confidential Information in connection with the business of the Company and, in any event, not to anyone outside of the direct employ of the Company except as required in the performance of Executive’s authorized employment duties to the Company or with the prior consent of the Board acting on behalf of the Company in each instance (and then, such disclosure shall be made only within the limits and to the extent of such duties or consent); and (iii) not to access or use any Confidential Information, and not to copy any documents, records, files, media, or other resources containing any Confidential Information, or remove any such documents, records, files, media, or other resources from the premises or control of the Company, except as required in the performance of Executive’s authorized employment duties to the Company or with the prior consent of the Board acting on behalf of the Company in each instance (and then, such disclosure shall be made only within the limits and to the extent of such duties or consent). Nothing herein shall be construed to prevent disclosure of Confidential Information as may be required by applicable law or regulation, or pursuant to the valid order of a court of competent jurisdiction or an authorized government agency, provided that the disclosure does not exceed the extent of disclosure required by such law, regulation, or order. Executive shall promptly provide written notice of any such order to the Board.

  • Usage Restrictions Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-Xxxxxx Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-Xxxxxx Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of Xxxxxx intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!