Third Party Systems Software Acquired During the Term Sample Clauses

Third Party Systems Software Acquired During the Term. With respect to any Third Party Systems Software acquisitions that are made in Vendor’s name, prior to the introduction of such Software, Vendor shall comply with the following: (i) Vendor shall use Commercially Reasonable Efforts to obtain for ACI, ACI Affiliates and End Users a perpetual, non-exclusive license to Use such Software at the expiration or termination of this Agreement and at no additional charge to ACI; or Confidential Master Services Agreement (ii) If Vendor is unable to obtain such license, Vendor shall notify ACI of its inability to obtain such a license and of the cost and viability of any other software that can perform the requisite functions and with respect to which Vendor has the ability to obtain such a license. Such notice shall contain the proposed third-party vendor’s then-current terms and conditions, if any, for licensing the software to ACI in accordance with Section 7.3(c)(i). With ACI’s prior approval, Vendor may introduce such software in providing the Services. Moreover, if Vendor desires to introduce Software, the rights to which have been acquired by Vendor as part of an enterprise agreement, then Vendor shall notify ACI of the relevant terms of such agreement and shall obtain ACI’s written consent prior to using such Software to provide the Services.
AutoNDA by SimpleDocs
Third Party Systems Software Acquired During the Term. With respect to any Third Party Systems Software acquisitions that are made in Vendor's name, prior to the introduction of such Software, Vendor shall comply with the following: (i) Vendor shall use Commercially Reasonable Efforts to obtain for Phoenix, Phoenix Affiliates and End Users a perpetual, non-exclusive license to Use such Software at the expiration or termination of this Agreement and at no additional charge to Phoenix (and Vendor shall use Commercially Reasonable Efforts to include in such licenses appropriate source code escrow terms to ensure that Phoenix, Phoenix Affiliates, and End Users can exercise the foregoing license); or (ii) If Vendor is unable to obtain such license, Vendor shall notify Phoenix of its inability to obtain such a license and of the cost and viability of any _______________________________________________________________________________________________________________ July 29, 2004 Phoenix and Vendor CONFIDENTIAL Page 30 BRMFS1 509411v3 Technology Services Agreement _______________________________________________________________________________________________________________ other software that can perform the requisite functions and with respect to which Vendor has the ability to obtain such a license. Such notice shall contain the proposed third-party vendor's then current terms and conditions, if any, for licensing the software to Phoenix in accordance with 7.3(c)(i). With Phoenix's prior approval, Vendor may introduce such software in providing the Services; provided, however that Vendor may introduce any Third Party Systems Software to be used as Shared Software without approval from Phoenix provided such Shared Software is Commercially Available Software. Moreover, if Vendor desires to introduce Software, the rights to which have been acquired by Vendor as part of an enterprise agreement, then Vendor shall notify Phoenix of the relevant terms of such agreement and, unless such Software is Shared Software, shall obtain Phoenix's written consent prior to using such Software to provide the Services.
Third Party Systems Software Acquired During the Term. With respect to any Third Party Systems Software acquisitions that are made in Vendor’s name, prior to the introduction of such Software, Vendor shall comply with the following: (i) Vendor shall use Commercially Reasonable Efforts to obtain for Phoenix, Phoenix Affiliates and End Users a perpetual, non-exclusive license to Use such Software at the expiration or termination of this Agreement and at no additional charge to Phoenix (and Vendor shall use Commercially Reasonable Efforts to include in such licenses appropriate source code escrow terms to ensure that Phoenix, Phoenix Affiliates, and End Users can exercise the foregoing license); or (ii) If Vendor is unable to obtain such license, Vendor shall notify Phoenix of its inability to obtain such a license and of the cost and viability of any other software that can perform the requisite functions and with respect to which Vendor has the ability to obtain such a license. Such notice shall contain the proposed third-party vendor’s then current terms and conditions, if any, for licensing the software to Phoenix in accordance with 7.3(c)(i). With Phoenix’s prior approval, Vendor may introduce such software in providing the Services; provided, however that Vendor may introduce any Third Party Systems Software to be used as Shared Software without approval from Phoenix provided such Shared Software is Commercially Available Software. Moreover, if Vendor desires to introduce Software, the rights to which have been acquired by Vendor as part of an enterprise agreement, then Vendor shall notify Phoenix of the relevant terms of such agreement and, unless such Software is Shared Software, shall obtain Phoenix’s written consent prior to using such Software to provide the Services.

Related to Third Party Systems Software Acquired During the Term

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Required hardware and software The minimum system requirements for using the DocuSign system may change over time. The current system requirements are found here: xxxxx://xxxxxxx.xxxxxxxx.xxx/guides/signer-guide- signing-system-requirements.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

  • Inspection Testing Authorization and Right of Access 2.1 Equipment Testing and Inspection 2.2 Authorization Required Prior to Parallel Operation

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!