Source Code Access Conditions Sample Clauses

Source Code Access Conditions. The following events shall constitute "Source Code Access Conditions": (i) D2's insolvency, general assignment for the benefit of creditors, or ceasing to do business, or (ii) D2's failure or inability to meet its warranty, maintenance and support obligations under Article 6, or its warranty obligations under Article 8.3, within fifteen days after written notice by LICENSEE to D2 of D2's failure to meet such obligations, or (iii) termination of this Agreement by LICENSEE pursuant to Articles 9.3 and 9.4, or (iv) as needed by LICENSEE for fault isolation. Software License D2 Technologies, Inc. and Maintenance Agreement August 4, 1997 CONFIDENTIAL 9
AutoNDA by SimpleDocs

Related to Source Code Access Conditions

  • Source Code OEM acknowledges the extreme importance of the confidentiality and trade secret status of the RSA Source Code and OEM agrees, in addition to complying with the requirements of Section 6.1 as it relates to the RSA Source Code, to: (i) only use the RSA Source Code at the address set forth on page 1 hereof or such alternate location specified in the applicable License/Product Schedule; (ii) inform any employee that is granted access to all or any portion of the RSA Source Code of the importance of preserving the confidentiality and trade secret status of the RSA Source Code; and (iii) maintain a controlled, secure environment for the storage and use of the RSA Source Code.

  • Site Access The Buyer agrees to RELEASE, INDEMNIFY AND HOLD HARMLESS the Seller Indemnitees from and against the entirety of any Adverse Consequences that are suffered by the Seller Indemnitees arising out of, resulting from or relating to any field visit or other due diligence activities relating to any performance of the Diligence Activities to the extent caused by acts or omissions of any Buyer Party or Buyer Diligence Representative, even if such Adverse Consequences arise out of or result from, solely or in part, the sole, active, passive, concurrent or comparative negligence, strict liability or other fault or violation of Law of or by the Seller Indemnitees, except Adverse Consequences to the extent resulting from the gross negligence or willful misconduct of the Seller Indemnitees.

  • Access Control Landlord shall be the sole determinant of the type and amount of any access control or courtesy guard services to be provided to the Project, if any. IN ALL EVENTS, LANDLORD SHALL NOT BE LIABLE TO TENANT, AND TENANT HEREBY WAIVES ANY CLAIM AGAINST LANDLORD, FOR (I) ANY UNAUTHORIZED OR CRIMINAL ENTRY OF THIRD PARTIES INTO THE PREMISES, THE BUILDING OR THE PROJECT, (II) ANY DAMAGE TO PERSONS, OR (III) ANY LOSS OF PROPERTY IN AND ABOUT THE PREMISES, THE BUILDING OR THE PROJECT, BY OR FROM ANY UNAUTHORIZED OR CRIMINAL ACTS OF THIRD PARTIES, REGARDLESS OF ANY ACTION, INACTION, FAILURE, BREAKDOWN, MALFUNCTION AND/OR INSUFFICIENCY OF THE ACCESS CONTROL OR COURTESY GUARD SERVICES PROVIDED BY LANDLORD, IF ANY. Tenant shall provide such supplemental security services and shall install within the Premises such supplemental security equipment, systems and procedures as may reasonably be required for the protection of its employees and invitees, provided that Tenant shall coordinate such services and equipment with any security provided by Landlord. The determination of the extent to which such supplemental security equipment, systems and procedures are reasonably required shall be made in the sole judgment, and shall be the sole responsibility, of Tenant. Tenant acknowledges that it has neither received nor relied upon any representation or warranty made by or on behalf of Landlord with respect to the safety or security of the Premises or the Project or any part thereof or the extent or effectiveness of any security measures or procedures now or hereafter provided by Landlord, and further acknowledges that Tenant has made its own independent determinations with respect to all such matters.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Technical Specifications Each Bloom System is an integrated system comprised of a fuel cell stack assembly and associated balance of plant components that converts a fuel into electricity using electrochemical means that (i) has a Nameplate Capacity of at least 0.5 kilowatts of electricity using an electrochemical process and (ii) has an electricity-only generation efficiency greater than thirty percent (30%).

  • Source Code Escrow On the date hereof, Company shall deliver to an independent third party escrow agent, selected and designated by AMEX and approved by Company (such approval not to be unreasonably withheld) ("Escrow Agent"), for deposit in accordance with an escrow agreement among the Escrow Agent and the parties hereto and substantially in the form attached as Exhibit E ("Escrow Agreement"), a current and complete copy of the source code (the "Source Code") for the Domain Name and any other materials required to operate the Source Code (the "Escrow Materials"). Within [ ** ] of the installation of any new update to the Service (or any other substantial modification to the Source Code, the Domain Name or the Service) or within [ ** ] of the last deposit hereunder, whichever is sooner, Company shall deliver to the Escrow Agent, for deposit in accordance with such Escrow Agreement, any and all changes to the Escrow Materials which correspond to changes, if any, made to the corresponding Escrow Material or shall notify Escrow Agent that no changes were made during the preceding period. All materials deposited hereunder shall be considered "Escrow Materials" as the term is used herein. In the event of (i) the Company's insolvency (as defined in Section 16(e)) or (ii) the Company's material breach of the terms of this Agreement specifically because of its gross negligence or willful misconduct and such breach is not fully remedied within thirty (30) days of AMEX's notice to Company, then notwithstanding any other rights and remedies to which AMEX may be entitled, AMEX shall immediately have the right to obtain a copy of the Escrow Materials from the Escrow Agent upon written notice as provided in the Escrow Agreement for use in continued provision of the Service. AMEX shall have the right, at any time upon at least ten (10) days' written notice to Company and Escrow Agent, to select and designate a new escrow agent to replace the Escrow Agent hereunder. Upon such notice, Escrow Agent shall completely, safely and securely transfer the Escrow Materials to the new escrow agent (which will then become the "Escrow Agent" hereunder) and confirm such transfer in writing to AMEX and Company. ** INDICATES CONFIDENTIAL TREATMENT REQUESTED.

  • Access; Confidentiality (a) At all times during the period commencing with the execution and delivery of this Agreement and continuing until the earlier to occur of the termination of this Agreement pursuant to Article VIII and the Merger Effective Time, the Company shall afford Parent, and Parent shall afford the Company, and each of their respective financial advisors, business consultants, legal counsel, accountants and other agents and representatives reasonable access during normal business hours, upon reasonable notice, to its properties, books and records and personnel; provided, however, that the disclosing party may restrict or otherwise prohibit access to any documents or information to the extent that (i) any applicable Law requires such party to restrict or otherwise prohibit access to such documents or information or (ii) access to such documents or information would give rise to a waiver of any attorney-client privilege, work product doctrine or other applicable privilege applicable to such documents or information, and provided further, that no information or knowledge obtained by the receiving party in any investigation conducted pursuant to the access contemplated by this Section 6.05 shall affect or be deemed to modify any representation or warranty of the disclosing party set forth in this Agreement or otherwise impair the rights and remedies available to receiving party hereunder. If the Company or Parent does not provide access or information in reliance on the preceding sentence, it shall use its commercially reasonable efforts to communicate the applicable information to the other party in a way that would not violate the applicable Law or obligation or to waive such a privilege including by providing such information in redacted form as necessary to preserve such a privilege or comply with such Law or otherwise make appropriate substitute disclosure arrangements, to the extent possible. Any investigation conducted pursuant to the access contemplated by this Section 6.05 shall be conducted in a manner that does not unreasonably interfere with the conduct of the business of the Company and its Subsidiaries or Parent and its Subsidiaries. Nothing in this Section 6.05 or elsewhere in this Agreement shall be construed to require the Company, any of its Subsidiaries, Parent, any of its Subsidiaries, or any of their respective Representatives of any of the foregoing to prepare any reports, analyses, appraisals, opinions or other information or to allow sampling of any environmental media or building component.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to:

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

  • Software Warranty NETGEAR warrants to the end-user that each item of Software, as delivered or updated by NETGEAR and properly installed and operated on the Hardware or other equipment it is originally licensed for, will function substantially as described in its then-current user documentation during its respective warranty period. If any item of Software fails to so perform during its warranty period, as the sole remedy NETGEAR or NETGEAR's supplier will at its discretion provide a suitable fix, patch or workaround for the problem which may be included in a future revision of the Software. For specific Software which is distributed by NETGEAR as a licensee of third parties, additional warranty terms offered by such third parties to end-users may apply.

Time is Money Join Law Insider Premium to draft better contracts faster.