UNAUTHORIZED MODIFICATIONS TO NS8 SOFTWARE Sample Clauses

UNAUTHORIZED MODIFICATIONS TO NS8 SOFTWARE. Licensee is prohibited from making any modifications to NS8's software or any other product or service of NS8 without first obtaining the express consent in writing of NS8 thereto which consent shall not be unreasonably withheld and executing a formal amendment to this Agreement reflecting NS8's agreement to the modification and setting forth the terms and conditions relating thereto. All modifications to NS8's software or any other product or service of NS8 must be performed by qualified NS8 personnel. Any such work or services will be subject to the provisions of section 1.7 or 1.8 as may be determined by NS8 to be applicable. NS8 shall respond promptly to any request for modifications and execute such modifications in accordance with the timeline established in the new agreement. If Licensee makes any modifications to NS8's software or any other product or service of NS8 without first obtaining the express consent in writing of NS8 and executing a formal amendment to this Agreement as aforesaid, then NS8 will have the right to suspend Licensee's access to NS8's management service and system or any other components thereof including, without limitation, consumer interface and consumer desk-top access unless such breach is fully remedied by Licensee with five (5) business days of receiving notice thereof from NS8. While Licensee is in breach of these provisions, NS8's Technical Support and Maintenance as hereinafter defined in this Agreement will be fully suspended and void. In addition, NS8 will accept no responsibility for any modifications to NS8's software or any other product or service of NS8 if such modifications have not been performed by qualified NS8 personnel. Notwithstanding the above, Licensee shall have the right to configure user configurable areas without notification, namely - UMS reports for internal and third party reports (including reports to Studios and ISP partners) and custom reporting from primary mySQL database. Any reskinning of the User Interface desired by Licensee must be performed utilizing an API provided to Licensee by NS8 which NS8 agrees to provide without additional charge. Licensee must provide NS8 with detailed specifications regarding its proposed skinning function.
AutoNDA by SimpleDocs

Related to UNAUTHORIZED MODIFICATIONS TO NS8 SOFTWARE

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • Licensed Software Section 3.17(f).......................................27

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Third Party Software Customer acknowledges that in order for MyEcheck to perform the Consulting Services, Customer may need to obtain additional third party services ("Third Party Services") or third party technology ("Third Party Technology"). Customer agrees that the rights and licenses with respect to Third Party Technology and Third Party Services shall be under terms set forth in the pertinent purchase, license or services agreements between Customer and the vendors of such Third Party Software or Third Party Services. Customer shall execute and comply with appropriate purchase, license, or services agreements with respect to any Third Party Software or Third Party Services. Any amounts payable to third party vendors or service providers under such agreements are the sole responsibility of Customer and shall be paid directly by Customer to such third party vendors or service providers. MyEcheck Services Agreement

  • Unauthorized Use If either Party becomes aware or has knowledge of any unauthorized use or disclosure of the other Party’s Confidential Information, it shall promptly notify the disclosing Party of such unauthorized use or disclosure.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Customer Data Customer shall remain the sole and exclusive owner of all Customer Data and other Confidential Information (as hereinafter defined), regardless of whether such data is maintained on magnetic tape, magnetic disk, or any other storage or processing device. All such Customer Data and other Confidential Information shall, however, be subject to regulation and examination by the appropriate auditors and regulatory agencies to the same extent as if such information were on Customer's premises. "Customer Data" means any and all data and information of any kind or nature submitted to M&I by Customer, or received by M&I on behalf of Customer, in connection with the Services.

  • Computer Software All computer applications software, owned or licensed, whether for general business usage (e.g., accounting, word processing, graphics, spreadsheet analysis, etc.), or specific, unique-to-the-business usage, and all computer operating, security or programming software, owned or licensed by Seller and used in the operation of the Business; and

  • Source Code OEM acknowledges the extreme importance of the confidentiality and trade secret status of the RSA Source Code and OEM agrees, in addition to complying with the requirements of Section 6.1 as it relates to the RSA Source Code, to: (i) only use the RSA Source Code at the address set forth on page 1 hereof or such alternate location specified in the applicable License/Product Schedule; (ii) inform any employee that is granted access to all or any portion of the RSA Source Code of the importance of preserving the confidentiality and trade secret status of the RSA Source Code; and (iii) maintain a controlled, secure environment for the storage and use of the RSA Source Code.

Time is Money Join Law Insider Premium to draft better contracts faster.