Unlicensed Software Sample Clauses

Unlicensed Software. Epic's various items of software are integrated for the benefit of Epic's customers. For Your and Epic's convenience, Epic may provide You with object and/or source code for items of software that are not licensed under this Agreement. In such event, Epic will normally deactivate the object and source code for the unlicensed items. You agree that You will not modify the source code of such items or of any of the Program Property in a manner that would allow You or anyone else to use the unlicensed object or source code. You agree not to use such unlicensed source or object code. You also agree not to copy such unlicensed source or object code other than as is incidental and necessary for any properly licensed copying of the licensed Program Property. In addition, although such code is not Program Property under this Agreement, the non-Program Property Code will also be subject to the restrictions on the use, confidentiality, safekeeping and copying of Program Property under Section 11 of this Agreement.
AutoNDA by SimpleDocs
Unlicensed Software. 1. The Parties shall ensure that all government agencies and all entities that the government owns or controls install and use only licensed software. 2. Measures China shall take include requiring annual audits by qualified third parties of China with no government ownership or affiliation and the publication online of the audit results, beginning within seven months after the date of entry into force of this Agreement. 3. The United States affirms that existing U.S. measures require government agencies and contractors to install and use only licensed software.
Unlicensed Software. Customer’s License provided by this Agreement any Order Forms thereunder is specifically limited to that identified on the Order Form.
Unlicensed Software. Given the integrated nature of Epic’s software, Epic may provide You code for software that You have not licensed. Epic typically restricts access to unlicensed software using license keys. You will respect Epic’s access restrictions and not use unlicensed code, except for incidental copying necessary for licensed use of the Program Property. The restrictions on use and the confidentiality and safekeeping terms that apply to the Program Property also apply to unlicensed code and documentation.
Unlicensed Software. 3.1 Nokia's price list may include multiple alternative versions and/or optional items of Nokia Software. Nokia Products delivered to the Purchaser may have a range of Nokia Software items stored in the memory (and included in any corresponding backup CD image) of a given Nokia Product, including items to which no license has been purchased by Purchaser. The Purchaser shall only acquire use rights to those items of Nokia Software that have been validly purchased by the Purchaser from an authorized source of Nokia Software. Use of any other Nokia Software without a valid license is prohibited, including any unlicensed object code of Nokia Software that may reside on the Nokia Product. Any use of Nokia Software beyond the limits set forth in Article 4 below shall be considered to be unlicensed use. 3.2 Nokia or its authorized reseller may from time to time grant temporary licenses to use Nokia Software for trial, testing and evaluation purposes (an "Evaluation License"). Each such license shall be for a limited period of thirty (30) days and of the same scope as a purchased license for a single processor as set forth in Section 4.1. The Purchaser may not continue use of Nokia Software beyond the term of any Evaluation License unless the Purchaser purchases a valid license for such Nokia Software from an authorized source.
Unlicensed Software. This is software for which the school or user does not possess a license (including downloads from the internet – please see the Internet Usage Policy for more details), and therefore has no legal entitlement to use. The use of such software would leave both the school and the individual open to legal action which could result in a heavy fine, or even imprisonment.

Related to Unlicensed Software

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Licensed Materials The materials that are the subject of this Agreement are set forth in Appendix A ("Licensed Materials").

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Software Products Save as otherwise set forth in the Agreement, the right to use any Software Product is personal to the Licensee, for its own internal use, and is non-transferable, except with the Licensor’s prior written consent, in which case the Licensee shall cause the assignee or sub-licensee to agree to the terms of this Software License.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Software Updates XXXXX agrees to keep current with software licensed from Skyward and will install new versions on a timeline approved by XXXXX governance. This timeline will be communicated by NWRDC to the Districts.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!