Supplier Off-Shore Restrictions Sample Clauses

Supplier Off-Shore Restrictions. Supplier may only offshore the Services pursuant to Section 2.6 of the Agreement, and as otherwise set forth in, the ASO.
AutoNDA by SimpleDocs

Related to Supplier Off-Shore Restrictions

  • Forfeiture Restrictions The Restricted Shares may not be sold, assigned, pledged, exchanged, hypothecated or otherwise transferred, encumbered or disposed of to the extent then subject to the Forfeiture Restrictions, and in the event of termination of the Employee’s employment with the Company for any reason other than as provided in Section 2(b), the Employee shall, for no consideration, forfeit to the Company all Restricted Shares then subject to the Forfeiture Restrictions. The prohibition against transfer and the obligation to forfeit and surrender Restricted Shares to the Company upon termination of employment are herein referred to as the “Forfeiture Restrictions.” The Forfeiture Restrictions shall be binding upon and enforceable against any transferee of Restricted Shares.

  • Disclosure Restrictions If necessary for the proper management and administration of the Business Associate or to carry out legal responsibilities of the Business Associate. PHI may only be disclosed to another person/entity for such purposes if: 3.2.1. Disclosure is required by law; or 3.2.2. Where the Business Associate obtains reasonable assurances from the person to whom disclosure is made that the PHI released will be held confidentially and only may be used or further disclosed as required by law or for the purposes of the disclosure; and person/entity agrees to notify Business Associate of any breaches of confidentiality in a timely fashion and in writing. Documentation needs to follow the same standards and time frames as item 6 below.

  • License Restrictions Licensor reserves all rights not expressly granted to You. The Software is licensed for Your internal use only. Except as this Agreement expressly allows, You may not (1) copy (except for back-up purposes), modify, alter, create derivative works, reverse engineer, decompile, or disassemble the Software except and only to the extent expressly permitted by applicable law; (2) transfer, assign, pledge, rent, timeshare, host or lease the Software, or sublicense any of Your license grants or rights under this Agreement; in whole or in part, without prior written permission of Licensor; (3) remove any patent, trademark, copyright, trade secret or other proprietary notices or labels on the Software or its documentation; or (4) disclose the results of any performance, functional or other evaluation or benchmarking of the Software to any third party without the prior written permission of Licensor. Hosting Restrictions. In the event that You desire to have a third party manage, host (either remotely or virtually) or use the Software on Your behalf, You shall (1) first enter into a valid and binding agreement with such third party that contains terms and conditions to protect Licensor’s rights in the Software that are no less prohibitive and/or restrictive than those contained in this Agreement, including, without limitation, the Verification section below; (2) prohibit use by such third party except for the sole benefit of You; and (3) be solely responsible to Licensor for any and all breaches of the above terms and conditions by such third party.

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

  • Usage Restrictions Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-Xxxxxx Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-Xxxxxx Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of Xxxxxx intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.

  • Age Restrictions Drivers must be 21 years of age or over.

  • Scope of Restrictions If the scope of any restriction contained in any preceding paragraphs of this Agreement is deemed too broad to permit enforcement of such restriction to its fullest extent, then such restriction shall be enforced to the maximum extent permitted by law, and Employee hereby consents and agrees that such scope may be judicially modified accordingly in any proceeding brought to enforce such restriction.

  • Company Restricted Stock “Company Restricted Stock” shall mean shares of Company Common Stock, whether granted by the Company pursuant to a Company Equity Plan, assumed by the Company in connection with any merger, acquisition or similar transaction or otherwise issued or granted, that are subject to a Contract pursuant to which the Company has the right to repurchase, redeem or otherwise reacquire such shares of Company Common Stock, including by forfeiture.

  • Geographic Restrictions The owner of the Website is based in the State of New York in the United States. We provide this Website for use only by persons located in the United States, and it may only be available to people located in the United States. We make no claims that the Website or any of its content is available or appropriate outside of the United States. Access to the Website may not be legal by certain persons or in certain countries.

  • ACCEPTABLE USE RESTRICTIONS You must: (a) not use the App or any Service in any unlawful manner, for any unlawful purpose, or in any manner inconsistent with this XXXX, or act fraudulently or maliciously, for example, by hacking into or inserting malicious code, including viruses, or harmful data, into the App, any Service or any operating system; (b) not infringe our intellectual property rights or those of any third party in relation to your use of the App or any Service; (c) not transmit any material that is defamatory, offensive or otherwise objectionable in relation to your use of the App or any Service; (d) not use the App or any Service in a way that could damage, disable, overburden, impair or compromise our systems or security or interfere with other users; and (e) not collect or harvest any information or data from any Service or our systems or attempt to decipher any transmissions to or from the servers running any Service.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!