Technology Restrictions. Issuer will not directly itself, and will not permit or authorize third parties, including Issuer’s Users, employees or agents to: (a) rent, lease, sublet, resell, convert, license, exploit, use, modify, or otherwise permit unauthorized third parties to access or use any aspect of the API or Invest Now; (b) reverse engineer, reverse assemble or otherwise attempt to discover the source code for the API or Invest Now; (c) circumvent or disable any security or other technological features or measures of the API or Invest Now; (d) alter, modify, convert or attempt to, modify, convert or otherwise manipulate the API or Invest Now, software or code; or (e) clone or otherwise copy, replicate or duplicate in any fashion any part of the API or Invest Now design, workflow, features or methodology, all of which Issuer acknowledges are proprietary intellectual property wholly owned by FundAmerica.
Technology Restrictions. There are technology restrictions applicable to participation by Applicant in the DLM Program, which have been noticed previously to Applicant by Con Edison by the RFP, and as more particularly set forth therein. Among other things, Diesel-fired Electric Generating Equipment will not be permitted as part of the DLM Program, and if used will be grounds for cancelling the contract related to the Aggregation. In addition, Electric Generating Equipment is prohibited from operating under the DLM Program within one-half mile of a peaking generator located at Gowanus (Brooklyn), Narrows (Brooklyn), Xxxxxx Avenue (Brooklyn), Astoria (Queens), 00xx Xxxxxx (Xxxxxxxxx, Xxxx Xxxx) and 74th Street (Manhattan, East Side), all as shown on the Company’s website, but excluding as may be applicable to Renewable Generation. If Applicant wants to operate Electric Generating Equipment for Load Relief purposes under the DLM Program, then during enrollment Applicant shall provide all necessary information for approval, including generator information, nameplate rating, manufacturer, date of manufacture, fuel type or energy source, and the kW enrolled using the equipment. Applicant must state as part of enrolling Customers using Electric Generating Equipment other required information, and written certification by a professional engineer must be provided attesting to the accuracy of all generation-related information provided, including with respect to emission levels of the equipment; and Applicant shall be required to comply with future laws and standards accepted by Con Edison as applicable to the Company with regard to Electric Generating Equipment.
Technology Restrictions. Customer will not, and will not allow, permit or assist any User or third party to, directly or indirectly:
(a) reverse engineer, decompile, disassemble, modify, create derivative works of, derive or otherwise attempt to discover the source code underlying any Fivetran Product; resell any Fivetran Product or use any Fivetran Product for timesharing or service bureau purposes or otherwise for the benefit of a third party, except as part of a Powered by Fivetran deployment identified on an Order Form; attempt to probe, scan or test the vulnerability of any Fivetran Product, breach the security or authentication measures of any Fivetran Product without proper authorization or willfully render any part of a Fivetran Product unusable; use or access any Fivetran Product to develop a product or service that is competitive with any Fivetran Product, engage in competitive analysis or benchmarking, or publicly disseminate performance information or analysis regarding any Fivetran Product; remove any proprietary notices or labels on any Fivetran Product; or use any Fivetran Product in violation of any applicable laws or regulations (including any export law) or outside the scope expressly permitted hereunder (including in the applicable Order Form);
(b) post, upload, forward, or otherwise transmit any file or software code which contains, facilitates, or launches viruses, worms, trojan horses or any other contaminating or destructive features, or that otherwise interferes with the proper working of any Fivetran Product; attempt to access any other Fivetran systems that are not part of a Fivetran Product; use any Fivetran Product to upload, post, process, distribute, link to, publish, reproduce, or transmit any information, software or content for which Customer does not have the legal right to engage in such activities; or
(c) with respect to On-Prem Software, (i) translate or localize any On-Prem Software; (ii) redistribute, encumber, sell, rent, lease, sublicense, display, publish, disclose or otherwise transfer rights to any On-Prem Software, in whole or in part, to any third party; or (iii) allow any third party (other than contractors that are Users) to access or use the On-Prem Software. Without limiting its other remedies, Fivetran may suspend Customer’s access to the Fivetran Products if Customer breaches any of the above restrictions, or if Customer’s use of a Fivetran Product risks material harm to the Fivetran Product or others, provided that, where practi...
Technology Restrictions. Because there is no foolproof method for protecting children online at this time, the xxxx.xx Act specifies limitations put on specific technologies commonly used on the Internet today. These technologies are prohibited from use in any xxxx.xx domains: • Two-way and multi-user interactive services, which includes: e-mail, chat, instant messaging, Usenet, Message Boards of like user forum, and peer-to-peer connections, place “unless the registrant certifies to the registrar that such service will be offered in compliance with content standards established … and is designed to reduce the risk of exploitation of minors using such two-way and multi-user interactive services”; and • Hyperlinks that take a user outside of the xxxx.xx domain.
Technology Restrictions. Customer will not directly or indirectly: (a) reverse engineer, decompile, disassemble, modify, create derivative works of or otherwise create, attempt to create or derive, or permit or assist any third party to create or derive, the source code underlying any Bonterra Product; (b) attempt to probe, scan or test the vulnerability of any Bonterra Product without proper written authorization; (c) attempt tobreach the security or authentication measures of any Bonterra Product without proper authorization or wilfully render any part of any Bonterra Product unusable; (d) use or access any Bonterra Product to develop a product or service that is competitive with any of Bonterra’s products or services or engage in competitive analysis or benchmarking; (e) transfer, distribute, resell, lease, license, assign or, except to Users as expressly permitted hereunder, make available to any third party any Bonterra Product; or (f) otherwise use any Bonterra Product in violation of applicable law (including any export law).
Technology Restrictions. Customer will not directly or indirectly: (a) reverse engineer, decompile, disassemble, modify, create derivative works of or otherwise create, attempt to create or derive, or permit or assist any third party to create or derive, the source code underlying the UpMetrics Platform;
(b) attempt to probe, scan or test the vulnerability of the UpMetrics Platform, breach the security or authentication measures of the UpMetrics Platform without proper authorization or wilfully render any part of the UpMetrics Platform unusable; (c) use or access the UpMetrics Platform to develop a product or service that is competitive with UpMetrics’ products or services, or engage in competitive analysis or benchmarking; (d) transfer, distribute, resell, lease, license, or assign the UpMetrics Platform or otherwise offer the UpMetrics Platform on a standalone basis; or (e) otherwise use the UpMetrics Platform in violation of applicable law (including any export law) or outside the scope expressly permitted hereunder and in the applicable Order Form (collectively, the “License Restrictions”). Unless Customer and UpMetrics have entered into a separate addendum relating to Regulated Data, Customer will not upload or request UpMetrics process any Regulated Data or otherwise use the UpMetrics Platform in a manner that subjects UpMetrics to compliance requirements with laws, regulations and industry standards applicable to Regulated Data.
Technology Restrictions. Customer will not, and will not allow, permit or assist any User or third party (unless agreed in writing as an addendum to this agreement for every instance) to, directly or indirectly:
(a) reverse engineer, decompile, disassemble, modify, create derivative works of, derive or otherwise attempt to discover the source code underlying astRai; resell astRai or use Midoffice’s astRai for timesharing or service bureau purposes or otherwise for the benefit of a third party, except as part of a AeX deployment identified on an Subscription Order Form; attempt to probe, scan or test the vulnerability of astRai, breach the security or authentication measures of astRai without proper authorization or willfully render any part of astRai unusable; use or access astRai to develop a product or service that is competitive with astRai, engage in competitive analysis or benchmarking, or publicly disseminate performance information or analysis regarding astRai; remove any proprietary notices or labels on astRai; or use astRai in violation of any applicable laws or regulations (including any export law) or outside the scope expressly permitted hereunder (including in the applicable Subscription Order Form);
(b) post, upload, forward, or otherwise transmit any file or software code which contains, facilitates, or launches viruses, worms, trojan horses or any other contaminating or destructive features, or that otherwise interferes with the proper working of astRai; attempt to access any other Midoffice systems that are not part of astRai; use astRai to upload, post, process, distribute, link to, publish, reproduce, or transmit any information, software or content for which Customer does not have the legal right to engage in such activities; or
(c) with respect to On-Prem Software, (i) translate or localize any On-Prem Software;
Technology Restrictions. Except as expressly permitted herein, Client will not directly itself, and will not permit or authorize third parties, including Issuers or End-Users, employees or agents to: (a) rent, lease, sublet, resell, convert, license, exploit, use, modify, or otherwise permit unauthorized third parties to access or use any aspect of the Technology or Services; (b) reverse engineer, reverse assemble or otherwise attempt to discover the source code for the Technology; (c) circumvent or disable any security or other technological features or measures of the Technology; (d) alter, modify, convert or attempt to, modify, convert or otherwise manipulate the Technology, software or code; or (e) clone or otherwise copy, replicate or duplicate in any fashion any part of Technology design, workflow, features or methodology, all of which Client acknowledges are proprietary intellectual property wholly owned by Consultant. Client, including its Issuers, is granted a limited, revocable, nontransferable and nonexclusive license to use the Technology, solely in connection with the “Going Public” series and strictly in accordance with the terms of this Agreement for the term of this Agreement and in accordance with the terms hereof.
Technology Restrictions. Issuer will not directly itself, and will not permit or authorize third parties, including Issuer’s Users, employees or agents to: (a) rent, lease, sublet, resell, convert, license, exploit, use, modify, or otherwise permit unauthorized third parties to access or use any aspect of the API or Invest Now; (b) reverse engineer, reverse assemble or otherwise attempt to discover the source code for the API or Invest Now; (c) circumvent or disable any security or other technological features or measures of the API or Invest Now; (d) alter, modify, convert or attempt to, modify, convert or otherwise manipulate the API or Invest Now, software or code; or (e) clone or otherwise copy, replicate or duplicate in any fashion any part of the API or Invest Now design, workflow, features or methodology, all of which Issuer acknowledges are proprietary intellectual property wholly owned by FundAmerica. Reporting. FundAmerica will provide Issuer with access to regular updates via various web-accessible dashboards, various plug & play web widgets, and/or via WebHooks functionality of the API, which enables Issuer to pull data from our system directly into its servers and to get on-demand updates both for its own purposes and so it can create reports and alert systems for its customers and other users with respect to all receipts of funds, deposits, disbursements and other transactions for each open Escrow Account. When the Technology are used via the API, then FundAmerica shall not be obligated to push or send reports or alerts to Issuer or any other person. When the Technology are engaged via Invest Now or via manual dashboard tools then FundAmerica will send confirmations and alerts, generally on Issuer’s behalf (meaning “from” you, which you hereby unequivocally and unconditionally instruct, direct and authorize us to do in the form and format standard in our system or as customized for you). Data Privacy. Investor data received by FundAmerica in conjunction with the Technology shall only be used for the purposes of providing said Technology and as required by securities regulations and, provided issuer has engaged FundAmerica Stock Transfer (FASTransfer) as its registered transfer agent (the services for which are integrated into our Technology as an option), for providing FASTransfer with all data so issuers have the ability to manage their capitalization schedules and investor relations needs and obligations, as well as in conjunction with secondary market transactions...
Technology Restrictions. You are prohibited from creating, modifying, or changing the behavior of classes, interfaces, or subpackages that are in any way identified as "Java", "Javax", "Sun" or similar convention as specified by Oracle in any naming convention designation.