Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.
Evaluation Use In the event that the Software is licensed only for Evaluation Use, the terms of this paragraph shall apply. Your license to use the Software commences on installation of the Software and, unless You and NetIQ agree to a different period, will terminate after a period of 30 days (the “Evaluation Period”). You may use the Software for an unlimited number of users and servers during the Evaluation Period. At the end of the Evaluation Period, Your license to use the Evaluation version of the Software is automatically terminated. You may not extend the time limits of the Software in any manner. At the end of the Evaluation Period You agree to de-install the Software and if required by NetIQ, return all copies or partial copies of the Software or certify to NetIQ that all copies or partial copies of the Software have been deleted from Your computer libraries and/or storage devices and have been destroyed. If You desire to continue Your use of the Software beyond the Evaluation Period, You must contact NetIQ to acquire a license to the Software for the applicable fee. EVALUATION SOFTWARE IS PROVIDED ON AN “AS IS” BASIS, WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR REPRESENTATIONS OF TITLE OR NON-INFRINGEMENT.
Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.
Cloud Services You will not intentionally (a) interfere with other customers’ access to, or use of, the Cloud Service, or with its security; (b) facilitate the attack or disruption of the Cloud Service, including a denial of service attack, unauthorized access, penetration testing, crawling, or distribution of malware (including viruses, trojan horses, worms, time bombs, spyware, adware, and cancelbots); (c) cause an unusual spike or increase in Your use of the Cloud Service that negatively impacts the Cloud Service’s operation; or (d) submit any information that is not contemplated in the applicable Documentation.