UNAUTHORIZED DISTRIBUTION OR ACCESS Clause Samples

UNAUTHORIZED DISTRIBUTION OR ACCESS. You agree to use commercially reasonable efforts, using industry standard technical protections and security practices to secure the physical or virtual computing environment upon which the Licensed Software resides, in order to prevent the unauthorized use, access or distribution of the Licensed Software by any third party. GLB ENT ▇▇▇▇ TEMPLATE v.1.0_ Symantec eDiscovery Platform 8.1_20January2015 Microsoft Office Professional Plus 2013 Professional Edition End User License Agreement Thank you for choosing a software application that includes Microsoft Office 2013. This is a license agreement between the licensor of the software application or suite of applications with which you acquired the Microsoft software (“licensor”) and you. For your convenience, we’ve organized this agreement into two parts. The first part includes introductory terms; the Additional Terms follow and contain greater detail. You should review the entire agreement, including any linked terms, because all of the terms are important and together create this contract that applies to you. You can review linked terms by pasting the forward link into your browser window. THE ADDITIONAL TERMS CONTAIN A BINDING ARBITRATION CLAUSE AND CLASS ACTION WAIVER. IF YOU LIVE IN THE UNITED STATES, THESE AFFECT YOUR RIGHTS TO RESOLVE A DISPUTE WITH THE LICENSOR OR MICROSOFT, AND YOU SHOULD READ THEM CAREFULLY. How does Internet activation work? Activation associates the use of the software with a specific computer or device. During activation, the software will automatically contact Microsoft or its affiliate to confirm the license is associated with the licensed computer. This process is called “activation.” Because activation is meant to identify unauthorized changes to the licensing or activation functions of the software, and to otherwise prevent unlicensed use of the software, you have no right to use the software after the time permitted for activation and you may not bypass or circumvent activation. If you have not entered a product key during the time permitted for activation, most features of the software will stop running. account or network, in an unauthorized manner. What about upgrading or converting the software? If you install the software covered by this agreement as an upgrade or conversion to your existing software, then the upgrade or conversion replaces the original software that you are upgrading or converting from. You do not retain any rights to the original software after you ...
UNAUTHORIZED DISTRIBUTION OR ACCESS. You agree to use commercially reasonable efforts, using industry standard technical protections and security practices to secure the physical or virtual computing environment upon which the Licensed Software resides, in order to prevent the unauthorized use, access or distribution of the Licensed Software by any third party. GLB ENT ▇▇▇▇ TEMPLATE v.1.0_Symantec Clearwell_2OCT2013 Below are three separate sets of license terms. Only one set applies to you. To determine which license terms apply to you check the license designation printed either on your product key, near the product name on your Certificate of Authenticity, or on the download page if you obtained your product key online. If your designation is FPP, then the Retail License Terms below apply to you. If your designation is OEM, then the OEM License Terms below apply to you. If your designation is Product Key Card or PKC, then the Product Key Card License Terms below apply to you. If you need assistance finding your license type, please go to: ▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/▇▇▇▇ to determine which license you have.