Unauthorized Use of Equipment, Firmware or Software Sample Clauses

Unauthorized Use of Equipment, Firmware or Software. All Equipment and software (including the Software) provided therewith, or with the BluIP Communications Service, remain the exclusive property of BluIP and nothing in this BluIP Communications Service Agreement shall grant You the right to license or to use the Equipment or S/software other than as expressly stated herein or elsewhere in the Agreement. You acknowledge that You are not given any license to use the S/software used to provide the BluIP Communications Service in conjunction with providing the Services, or embedded in the Equipment, other than a nontransferable (except in connection with a transfer of the applicable Equipment), revocable license to use such S/software (without making any modification thereto) strictly in accordance with the terms and conditions of this BluIP Communications Service Agreement, and that the Equipment is exclusively for use in connection with the BluIP Communications Service. If You decide to use the Services through an interface device not provided by BluIP, which BluIP reserves the right to prohibit in particular cases or generally, You represent and warrant that You possess all required rights, including software and/or firmware licenses, to use that interface device with the BluIP Communications Service and You will Indemnify BluIP and its Related Parties against any and all third party claims that Your use of such interface device with the Services infringes such third party’s Intellectual Property Rights.
AutoNDA by SimpleDocs

Related to Unauthorized Use of Equipment, Firmware or Software

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Licensed Materials The materials that are the subject of this Agreement are set forth in Appendix A ("Licensed Materials").

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

Time is Money Join Law Insider Premium to draft better contracts faster.