Usage Model Sample Clauses

Usage Model. MSP agrees to pay the applicable monthly usage Fees, as calculated based on the usage-based tier (“Usage Based Program Tier”) designated in the Order Form, which shall be the greater of the (i) Fees calculated per Device for all Customer Devices that the Software has been made available (regardless of usage) at any time during that month, or (ii) the applicable Usage Based Program Tier minimum. Unless otherwise agreed in the applicable Order Form, Malwarebytes shall invoice MSP the applicable Fees at the end of each calendar month and MSP shall pay such Fees within 30 days from the date of invoice. MSP acknowledges that as part of committing to the usage based billing model, it commits to a certain Usage Based Program Tier which requires MSP commit to a certain minimum monthly payment regardless of actual usage. Accordingly, if MSP makes the Software available to less than that minimum number of Devices in a calendar month, then MSP’s payment obligations for such month shall still require the payment of monthly usage Fees calculated based on the minimum number of Devices associated with the Usage Based Program Tier it has committed to.
AutoNDA by SimpleDocs
Usage Model. MSP agrees to pay the applicable monthly usage fees, as determined between the applicable Distributor and MSP, per Device for all Customer Devices that the Software has been made available at any time during that month. Distributor shall invoice MSP the applicable fees at the end of each calendar month and MSP shall pay such fees in accordance with the payment terms decided between such parties. For example, if the Software has been installed on 5,000 Devices in month one and in month two only 2,000 of those Devices actively use the Software, however, the Software remains installed on the remaining 3,000 Devices for at least one day of that month, then in both month one and month two, MSP shall pay the applicable monthly fees for all 5,000 Devices. MSP acknowledges that as a condition for electing to use the usage model, the minimum license Device quantity that Malwarebytes makes available for licensing the Software is 50 Devices per month. Accordingly, if MSP makes the Software available to less than 50 Devices in a calendar month, then MSP’s payment obligations for such month shall still require the payment of monthly usage fees for 50 Devices.
Usage Model. The Motive Duet "Infrastructure Software" (consisting of Motive Duet Server, Motive Solo Server, and Motive Integration Server licenses), Motive Solo Self Service Licenses, and Motive Support Desktop Licenses shall be provided and licensed on an [*]. Compaq will use the Motive Software for providing basic service and standard warranty support for Compaq systems only. Software provided under this Exhibit shall not be used to support Compaq's [*] line or any other product sold by Compaq's [*].

Related to Usage Model

  • Service Providing Methodology 1.3.1 Party A and Party B agree that during the term of this Agreement, where necessary, Party B may enter into further service agreements with Party A or any other party designated by Party A, which shall provide the specific contents, manner, personnel, and fees for the specific services. 1.3.2 To fulfill this Agreement, Party A and Party B agree that during the term of this Agreement, where necessary, Party B may enter into equipment or property leases with Party A or any other party designated by Party A which shall permit Party B to use Party A’s relevant equipment or property based on the needs of the business of Party B. 1.3.3 Party B hereby grants to Party A an irrevocable and exclusive option to purchase from Party B, at Party A’s sole discretion, any or all of the assets and business of Party B, to the extent permitted under PRC law, at the lowest purchase price permitted by PRC law. The Parties shall then enter into a separate assets or business transfer agreement, specifying the terms and conditions of the transfer of the assets.

  • Model List your model number of the product you are bidding.

  • HIV/AIDS Model Workplace Guidelines Grantee will: a. implement the System Agency’s policies based on the Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome (HIV/AIDS), AIDS Model Workplace Guidelines for Businesses at xxxx://xxx.xxxx.xxxxx.xx.xx/hivstd/policy/policies.shtm, State Agencies and State Grantees Policy No. 090.021. b. educate employees and clients concerning HIV and its related conditions, including AIDS, in accordance with the Texas. Health & Safety Code §§ 85.112-114.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Methodology 1. The price at which the Assuming Institution sells or disposes of Qualified Financial Contracts will be deemed to be the fair market value of such contracts, if such sale or disposition occurs at prevailing market rates within a predefined timetable as agreed upon by the Assuming Institution and the Receiver. 2. In valuing all other Qualified Financial Contracts, the following principles will apply:

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Use of Customer Name Contractor may use County’s name without County’s prior written consent only in Contractor’s customer lists. Any other use of County’s name by Contractor must have the prior written consent of County.

  • PREVAILING WAGE RATES - PUBLIC WORKS AND BUILDING SERVICES CONTRACTS If any portion of work being Bid is subject to the prevailing wage rate provisions of the Labor Law, the following shall apply:

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!