UNAUTHORIZED DISTRIBUTION OR ACCESS Sample Clauses

UNAUTHORIZED DISTRIBUTION OR ACCESS. You agree to use commercially reasonable efforts, using industry standard technical protections and security practices to secure the physical or virtual computing environment upon which the Licensed Software resides, in order to prevent the unauthorized use, access or distribution of the Licensed Software by any third party. GLB ENT XXXX TEMPLATE v.1.0_Symantec Clearwell_2OCT2013 Below are three separate sets of license terms. Only one set applies to you. To determine which license terms apply to you check the license designation printed either on your product key, near the product name on your Certificate of Authenticity, or on the download page if you obtained your product key online. If your designation is FPP, then the Retail License Terms below apply to you. If your designation is OEM, then the OEM License Terms below apply to you. If your designation is Product Key Card or PKC, then the Product Key Card License Terms below apply to you. If you need assistance finding your license type, please go to: xxx.xxxxxxxxx.xxx/xxxxxx/xxxx to determine which license you have.
AutoNDA by SimpleDocs
UNAUTHORIZED DISTRIBUTION OR ACCESS. You agree to use commercially reasonable efforts, using industry standard technical protections and security practices to secure the physical or virtual computing environment upon which the Licensed Software resides, in order to prevent the unauthorized use, access or distribution of the Licensed Software by any third party. GLB ENT XXXX TEMPLATE v.1.0_ Symantec eDiscovery Platform 8.1_20January2015 Microsoft Office Professional Plus 2013 Professional Edition End User License Agreement Thank you for choosing a software application that includes Microsoft Office 2013. This is a license agreement between the licensor of the software application or suite of applications with which you acquired the Microsoft software (“licensor”) and you. For your convenience, we’ve organized this agreement into two parts. The first part includes introductory terms; the Additional Terms follow and contain greater detail. You should review the entire agreement, including any linked terms, because all of the terms are important and together create this contract that applies to you. You can review linked terms by pasting the forward link into your browser window. THE ADDITIONAL TERMS CONTAIN A BINDING ARBITRATION CLAUSE AND CLASS ACTION WAIVER. IF YOU LIVE IN THE UNITED STATES, THESE AFFECT YOUR RIGHTS TO RESOLVE A DISPUTE WITH THE LICENSOR OR MICROSOFT, AND YOU SHOULD READ THEM CAREFULLY. How does Internet activation work? Activation associates the use of the software with a specific computer or device. During activation, the software will automatically contact Microsoft or its affiliate to confirm the license is associated with the licensed computer. This process is called “activation.” Because activation is meant to identify unauthorized changes to the licensing or activation functions of the software, and to otherwise prevent unlicensed use of the software, you have no right to use the software after the time permitted for activation and you may not bypass or circumvent activation. If you have not entered a product key during the time permitted for activation, most features of the software will stop running. account or network, in an unauthorized manner. What about upgrading or converting the software? If you install the software covered by this agreement as an upgrade or conversion to your existing software, then the upgrade or conversion replaces the original software that you are upgrading or converting from. You do not retain any rights to the original software after you ...

Related to UNAUTHORIZED DISTRIBUTION OR ACCESS

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • UNAUTHORIZED TRANSFERS To report a lost or stolen Card, PIN, Access Code or any combination thereof, You will call Us at the telephone number shown in this Agreement. You may also report the loss of a Card, PIN, Access Code or any combination thereof, by writing to Us at the address shown in this Agreement. You should also call the number or write to the address listed above if You believe a transfer has been made using the information from Your check without Your permission.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Information Access Each Party (“Disclosing Party”) shall make available to another Party (“Requesting Party”) information that is in the possession of the Disclosing Party and is necessary in order for the Requesting Party to: (i) verify the costs incurred by the Disclosing Party for which the Requesting Party is responsible under this Agreement; and (ii) carry out its obligations and responsibilities under this Agreement. The Parties shall not use such information for purposes other than those set forth in this Article 25.1 of this Agreement and to enforce their rights under this Agreement.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all the provisions of the Federal Immigration and Nationality Act, 8 U.S.C.A. § 1101, et seq., as amended, and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for performance of work and/or services covered by this Agreement, and should any liability or sanctions be imposed against City for such use of unauthorized aliens, Consultant hereby agrees to and shall reimburse City for the cost of all such liabilities or sanctions imposed, together with any and all costs, including attorneys’ fees, incurred by City.

  • Unauthorized Absence An unauthorized absence from the work site or failure to report for duty after a leave request has been disapproved, revoked, or canceled by the appointing authority, or at the expiration of a leave, shall be without pay. Such absence may also be grounds for disciplinary action.

  • User Access Transfer Agent shall have a process to promptly disable access to Fund Data by any Transfer Agent personnel who no longer requires such access. Transfer Agent will also promptly remove access of Fund personnel upon receipt of notification from Fund.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!