Third-party software other than AMG Software mentioned within this agreement Sample Clauses

Third-party software other than AMG Software mentioned within this agreement. 2. If AMG determines an issue is related to the customer’s hardware and not the software on the product, AMG will be under no obligation to continue support efforts until the customer has resolved all hardware- related issues or problems.
AutoNDA by SimpleDocs

Related to Third-party software other than AMG Software mentioned within this agreement

  • Third Party Software/Open Source Nothing in this Agreement shall restrict, limit or otherwise affect any rights or obligations You may have, or conditions to which You may be subject, under any applicable open source licenses to any open source code contained in the Software. The Software may include or be bundled with other software programs licensed under different terms and/or licensed by a licensor other than Licensor. Use of any software programs accompanied by a separate license agreement is governed by that separate license agreement. Any third party software that may be provided with the Software is included for use at Your option.

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Modified Indemnity Where Agreement Involves Design Professional Services Notwithstanding the forgoing, if the services provided under this Agreement are design professional services, as defined by California Civil Code section 2782.8, as may be amended from time to time, the defense and indemnity obligation under Section 1, above, shall be limited to the extent required by California Civil Code section 2782.8.

  • Third Party Contractors Tenant shall obtain and deliver to Landlord, Third Party Contractor’s certificates of insurance and applicable endorsements at least seven (7) business days prior to the commencement of work in or about the Premises by any vendor or any other third-party contractor (collectively, a “Third Party Contractor”). All such insurance shall (a) name Landlord as an additional insured under such party’s liability policies as required by Section 10.3.1 above and this Section 10.6, (b) provide a waiver of subrogation in favor of Landlord under such Third Party Contractor’s commercial general liability insurance, (c) be primary and any insurance carried by Landlord shall be excess and non-contributing, and (d) comply with Landlord’s minimum insurance requirements.

  • E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.

  • Third Party Content Certain of the Service Content may be owned by third parties, as may be designated within the Services from time to time (“Third Party Content”). Our inclusion of any Third Party Content is not an endorsement of such content and we disclaim a l representations and warranties with respect to such Third Party Content in its entirety. Additiona ly, the Services may contain links to other Internet websites and services owned by third parties (“Third Party Services”). Any use of Third Party Services is at your own risk and subject to the terms of use with respect to such Third Party Services. We have no control over Third Party Services, and we disclaim a l representations and warranties with respect to such Third Party Services in their entirety. Any transactions you undertake with Third Party Services, including payment transactions, are solely between you and the applicable Third Party Services. You understand and agree that under no circumstances sha l we be responsible for or liable to anyone in connection with your use of Third Party Services and any transactions conducted with such Third Party Services. You agree to direct any questions, complaints, or claims related to a Third Party Service to such Third Party Service.

  • Software Casos de Uso Red Hat Enterprise Linux Desktop Red Hat Enterprise Linux Workstation Sistemas de computadoras personales con el fin principal de ejecutar aplicaciones y/o servicios para un usuario único que por lo general trabaja con una conexión directa al teclado y la pantalla. Nota: La implantación de autorizaciones asociadas de sistema Red Hat Network o Módulos de Gestión Inteligente en un sistema que no sea Red Hat Enterprise Linux Desktop o Workstation no es un Caso de Uso soportado.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

Time is Money Join Law Insider Premium to draft better contracts faster.