Common use of Usage Restrictions Clause in Contracts

Usage Restrictions. You will not (a) modify, decompile, disassemble or reverse engineer, or cause or permit any other party to modify, decompile, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rent, sublicense or lease the Services or any Software to third parties; (c) attempt to gain unauthorized access to any Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; (e) interfere with or disrupt the integrity or performance of the Services or third-party data contained therein; (f) attempt to gain unauthorized access to the Services or their related systems or networks; (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services in a way that circumvents a contractual usage limit, or use any Services to access or use any of Our or our licensor’s intellectual property, except as permitted under this Agreement, an Order Form, or the Documentation; or (j) misappropriate any Services or Software, or use the Services or Software, to create competing products or services, or modify Our or our licensor’s intellectual property or use any of Our or our licensor’s intellectual property unless otherwise permitted herein or otherwise agreed to by Us in a signed writing. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the Services, may result in Our immediate suspension of the Services.

Appears in 2 contracts

Samples: Terms of Service, Terms of Service

AutoNDA by SimpleDocs

Usage Restrictions. You will not (a) modify, decompile, disassemble make any Service or reverse engineerContent available to, or cause use any Service or permit any Content for the benefit of, anyone other party to modifythan You or Users, decompileunless expressly stated otherwise in your service Contract, disassemble an Order Form or reverse engineerthe Documentation, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the Services any Service or Content, or include any Software to third parties; Service or Content in any type of outsourcing offering, (c) attempt to gain unauthorized access to any use a Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services Non-UDPaaS Application to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (d) use a Service or Non-UDPaaS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the Services any Service or third-party data contained therein; , (f) attempt to gain unauthorized access to the Services any Service or their Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, an Order Form, or the Documentation; , (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Non-UDPaaS product or service, or use (l) reverse engineer any Service (to the Services or Software, to create competing products or services, or modify Our or our licensor’s intellectual property or use any of Our or our licensor’s intellectual property unless otherwise extent such restriction is permitted herein or otherwise agreed to by Us in a signed writinglaw). Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of the ServicesOur services, may result in Our immediate suspension or termination of the Services. However, we may use reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or termination.

Appears in 2 contracts

Samples: Master Subscription Agreement, Master Subscription Agreement

Usage Restrictions. You will not (a) modify, decompile, disassemble make any Service or reverse engineerContent available to, or cause use any Service or permit any Content for the benefit of, anyone other party to modifythan You or Users, decompileunless expressly stated otherwise in an Order Form or the Documentation, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the Services any Service or any Software to third parties; Content, (c) attempt to gain unauthorized access to any use a Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services Non-RevenueWell Application to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (d) use a Service or Non-RevenueWell Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the Services any Service or third-party data contained therein; , (f) attempt to gain unauthorized access to the Services any Service or their Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, an Order Form, or the Documentation; , (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on Your own intranets or use otherwise for Your own internal business purposes or as permitted in the Services Documentation, (k) access any Service or SoftwareContent in order to build a competitive product or service or to benchmark with a Non- RevenueWell product or service, to create competing products or services, or modify Our or our licensor’s intellectual property or (l) use any of Our Confidential Information to dispute or our licensor’s context the validity of Our intellectual property unless otherwise rights, or (m) reverse engineer any Service (to the extent such restriction is permitted herein or otherwise agreed to by Us in a signed writinglaw). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the ServicesOur services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 2 contracts

Samples: Master Subscription Agreement, Master Subscription Agreement

Usage Restrictions. You will not (a) modify, decompile, disassemble or reverse engineermake any Service available to, or cause use any Service for the benefit of, anyone other than You or permit any other party to modifyUsers, decompileunless expressly stated otherwise in an Order Form or the Documentation, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the Services any Service, or include any Software to third parties; Service in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, obscene, or otherwise unlawful, objectionable or tortious material, or to store or transmit material in violation of a third-party’s rights, including but not limited to privacy rights or intellectual property rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service, (f) attempt to gain unauthorized access to any Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; (e) interfere with or disrupt the integrity or performance of the Services or third-party data contained therein; (f) attempt to gain unauthorized access to the Services or their related systems or networks; (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services Service in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, an Order Form, or the Documentation; , (h) copy a Service or any part, feature, function or user interface thereof, (i) frame or mirror any part of any Service, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (j) misappropriate access any Services Service in order to build a competitive product or Softwareservice or to benchmark with a competitive product or service, or use (k) reverse engineer any Service (to the Services extent such restriction is permitted by law). Neither We nor Our suppliers or Softwarelicensors has any responsibility for preventing or identifying Your compliance with this Section 3.4 or any liability, to create competing products directly or servicesindirectly, for any loss or modify Our or our licensor’s intellectual property or use any of Our or our licensor’s intellectual property unless otherwise permitted herein or otherwise agreed to damage caused by Us in a signed writingYour Data. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the ServicesOur services, may result in Our immediate suspension of the ServicesServices and/or removal of the offending Data, however, We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Master Subscription Agreement

Usage Restrictions. You Licensee will not (a) modify, decompile, disassemble make any Services or reverse engineerLicensor Content available to, or cause use any Services or permit any Licensor Content for the benefit of, anyone other party to modifythan Licensee or Authorized Persons, decompileunless expressly stated otherwise in an Order Form(s), disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the any Services or Licensor Content, or include any Software to third parties; Services or Licensor Content in a service bureau or outsourcing offering, (c) attempt to gain unauthorized access to use any Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (d) use any Services to store or transmit codes, files, scripts, agents or programs intended to do harm, (e) interfere with or disrupt the integrity or performance of the any Services or third-party data contained therein; , (f) attempt to gain unauthorized access to the any Services or their Licensor Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services or Licensor Content in a way that circumvents a contractual usage limit, or use any of the Services to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, Agreement or an Order FormForm(s), (h) copy any Services or the Documentation; any part, feature, function or user interface thereof, (i) copy Licensor Content except as permitted herein or in an Order Form(s), (j) misappropriate frame or mirror any part of any Services or SoftwareLicensor Content, other than framing on Licensee’s own intranets or otherwise for Licensee’s own internal business purposes or as permitted in an Order Form(s), (k) access any Services or Licensor Content in order to build a competitive product or service or to benchmark with a product or service, or use (l) reverse engineer any Services (to the Services or Software, to create competing products or services, or modify Our or our licensor’s intellectual property or use any of Our or our licensor’s intellectual property unless otherwise extent such restriction is permitted herein or otherwise agreed to by Us in a signed writinglaw). Any use of the Services in breach of this Agreement, Documentation Agreement or Order Forms, Form(s) by You or Users Licensee that in Our Licensor’s judgment threatens the security, integrity or availability of the Licensor Services, may result in Our Licensor’s immediate suspension of the Services., however Licensor will use commercially reasonable efforts under the circumstances to provide Licensee with notice and an opportunity to remedy such violation or threat prior to such suspension. DELIVERY; ACCEPTANCE

Appears in 1 contract

Samples: Services Agreement

Usage Restrictions. You Customer will not (a) modify, decompile, disassemble make any Service or reverse engineerContent available to anyone other than Customer, or cause use any Service or permit any Content for the benefit of anyone other party to modifythan Customer and legal entities of the same group of companies as the Customer, decompileunless expressly stated otherwise in an Order Form or written consent by TGNDATA, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, rent or lease the Services any Service or Content, or include any Software to third parties; Service or Content in a service bureau or outsourcing offering, (c) attempt to gain unauthorized access to any use a TGNDATA Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (d) use a TGNDATA Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the Services any Service or third-party data contained therein; , (f) attempt to gain unauthorized access to the Services any Service or their Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of Our or our licensor’s TGNDATA intellectual property, property except as permitted under this Agreement, Agreement or an Order Form, (h) modify, copy, or the Documentation; create derivative works of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form, (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on Customer's own intranets or otherwise for its own internal business purposes, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or use access to build a competitive product or service, build a product or service using similar features, functions or graphics of the Service, copy any features, functions or graphics of the Service, or determine whether the Services are within the scope of any patent. If Customer receives notice, that Content may no longer be used or Softwaremust be removed, modified and/or disabled to create competing products or servicesavoid violating the Acceptable Use Customer will promptly do so. If Customer does not take required action, or modify Our or our licensor’s intellectual property or use including deleting any of Our or our licensor’s intellectual property unless otherwise permitted herein or otherwise agreed to by Us in a signed writing. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Content Customer may have downloaded from the Services, may result in Our immediate suspension of accordance with the Services.above, or if in TGNDATA’s judgment continued violation is likely to reoccur,

Appears in 1 contract

Samples: Master Subscription Agreement

Usage Restrictions. You will not (a) modify, decompile, disassemble make any Service or reverse engineerContent available to, or cause use any Service or permit any Content for the benefit of, anyone other party to modifythan You or Users, decompileunless expressly stated otherwise in an Order Form or the Documentation, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the Services any Service or any Software to third parties; Content, (c) attempt to gain unauthorized access to any use a Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services Non- RevenueWell Application to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (d) use a Service or Non-RevenueWell Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the Services any Service or third-party data contained therein; , (f) attempt to gain unauthorized access to the Services any Service or their Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, an Order Form, or the Documentation; , (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on Your own intranets or use otherwise for Your own internal business purposes or as permitted in the Services Documentation, (k) access any Service or SoftwareContent in order to build a competitive product or service or to benchmark with a Non- RevenueWell product or service, to create competing products or services, or modify Our or our licensor’s intellectual property or (l) use any of Our Confidential Information to dispute or our licensor’s context the validity of Our intellectual property unless otherwise rights, or (m) reverse engineer any Service (to the extent such restriction is permitted herein or otherwise agreed to by Us in a signed writinglaw). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the ServicesOur services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Master Subscription Agreement

Usage Restrictions. You will not (a) modify, decompile, disassemble make any cFive Services or reverse engineerContent available to, or cause use any cFive Services or permit any Content for the benefit of, anyone other party to modifythan You or Users, decompileunless expressly stated otherwise in an Order Form or the Documentation, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the any cFive Services or Content, or include any Software to third parties; cFive Services or Content in a service bureau or online or other offering or product, (c) attempt to gain unauthorized access to any Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the cFive Services to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (d) use cFive Services to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the any cFive Services or third-party data contained therein; , (f) attempt to gain unauthorized access to the any cFive Services or their related Content or systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any cFive Services in a way or Content that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our or our licensor’s intellectual property, property except as expressly permitted under this Agreement, an Order Form, or the Documentation; , (h) copy cFive Services or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) misappropriate frame or mirror any cFive Services or SoftwareContent, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access cFive Services or Content to build a competitive product or service or to benchmark with a third party product or service, or use the Services or Software, to create competing products or services, or modify Our or our licensor’s intellectual property or use any of Our or our licensor’s intellectual property unless otherwise permitted herein or otherwise agreed to by Us in a signed writing(l) reverse engineer cFive Services. Any use of the cFive Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the ServicesOur services, may result in Our immediate suspension of the cFive Services.

Appears in 1 contract

Samples: Master Subscription Agreement

Usage Restrictions. You At all times, you will comply, and ensure each User complies, with all applicable Privacy laws while using the Service. Without limiting the generality of Section 4.2, you agree that you will not, and will not permit any person, including without limitation any Users, to: (a) modify, decompile, disassemble make any Service or reverse engineerContent available to anyone other than Users, or cause use any Service or permit any Content for the benefit of, anyone other party to modifythan you, decompileunless expressly stated otherwise in an Order Form or the Documentation, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the Services any Service or Content, or include any Software to third parties; Service or Content in a service bureau or outsourcing offering, (c) attempt to gain unauthorized access to any use a Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services Third-Party Application to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , publicity rights, defamation rights, intellectual property rights, proprietary rights, contractual rights or any other legal right (d) use a Service or Third-Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the Services any Service or third-party data contained therein; , (f) attempt to gain unauthorized access to the Services any Service or their Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use of any of our Services in a manner that is in violation of Applicable Laws, or to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, an Order Form, or the Documentation; , (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on your own intranets or otherwise for your own internal business purposes or as permitted in the Documentation, (k) access or use a Service for benchmarking purposes, including without limitation monitoring its availability, performance or functionality, or use the Services or Software(l) disassemble, to create competing products or servicesreverse engineer, or modify Our decompile a Service or our licensor’s intellectual property Content, or access or use it for any of Our purpose competitive with iComply’s business, including without limitation to (1) build a competitive product or our licensor’s intellectual property unless otherwise permitted herein service, (2) build a product or otherwise agreed to by Us in a signed writing. Any use service using similar ideas, features, functions or graphics of the Services in breach of this AgreementService, Documentation (3) copy any ideas, features, functions or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability graphics of the Services, may result in Our immediate suspension of the Services.Service or

Appears in 1 contract

Samples: Master Terms and Conditions

AutoNDA by SimpleDocs

Usage Restrictions. You Chroma may suspect or terminate access to Chroma Services if Customer has violated usage restrictions. Customer will not (a) modify, decompile, disassemble make any Service or reverse engineerContent available to, or cause use any Service or permit any Content for the benefit of, anyone other party to modifythan Customer or Your Users, decompile, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, rent or lease the Services any Service or Content, or include any Software Service or Content in a service bureau or outsourcing offering, unless you have been specifically allowed to third parties; do so in a separate agreement with Chroma, (c) attempt to gain unauthorized access to any use a Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services Content to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party third\party privacy rights; , (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the Services any Service or third-party third\party data contained therein; , (f) attempt to gain unauthorized access to the Services any Service or their Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or use any Services to access part, feature, function or use any of Our or our licensor’s intellectual propertyuser interface thereof, (i) copy Content except as permitted under this Agreement, herein or in an Order Form, Form or the Documentation; or , (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on Customer’s own intranets or otherwise for Customer’s own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or for the purpose of bringing an intellectual property infringement claim again Chroma, or use the Services or Software, to create competing products or services(l) reverse engineer any Chroma Service unless this is permitted by law, or modify Our unless you have been specifically told that you may do so by Chroma, in writing (e.g., through an open source software license). Customer may not develop multiple Applications to simulate or our licensor’s intellectual property or use any of Our or our licensor’s intellectual property unless otherwise permitted herein act as a single Application or otherwise agreed to by Us access the Chroma Services in a signed writing. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the Services, may result in Our immediate suspension of the Servicesmanner intended to avoid incurring fees.

Appears in 1 contract

Samples: Terms of Service

Usage Restrictions. You will not (a) modify, decompile, disassemble make any Service or reverse engineerContent available to anyone other than Users, or cause use any Service or permit any Content for the benefit of, anyone other party to modifythan You, decompileunless expressly stated otherwise in an Order Form or the Documentation, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the Services any Service or Content, or include any Software to third parties; Service or Content in a service bureau or outsourcing offering, (c) attempt to gain unauthorized access to any use a Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services ProduQtive Application to store or transmit Malicious Code or infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (d) use a Service or 3rd Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the Services any Service or third-party data contained therein; , (f) attempt to gain unauthorized unauthorised access to the Services any Service or their Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, an Order Form, or the Documentation; , (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or use (k) disassemble, reverse engineer, or decompile a Service or Content, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services or Software, to create competing products or services, or modify Our or our licensor’s intellectual property or use are within the scope of any of Our or our licensor’s intellectual property unless otherwise permitted herein or otherwise agreed to by Us in a signed writingpatent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the ServicesOur services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Master Subscription Agreement

Usage Restrictions. You will not (a) modify, decompile, disassemble make any Service or reverse engineerContent available to anyone other than Users, or cause use any Service or permit any Content for the benefit of, anyone other party to modifythan You, decompileunless expressly stated otherwise in an Order Form or the Documentation, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the Services any Service or Content, or include any Software to third parties; Service or Content in a service bureau or outsourcing offering, (c) attempt to gain unauthorized access to any use a Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services Non-CSA Application to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (ed) use a Service or Non-CSA Application to store or transmit Malicious Code, (1) interfere with or disrupt the integrity or performance of the Services any Service or third-party data contained therein; , (f) attempt to gain unauthorized access to the Services or their related systems or networks; (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (itogainunauthorizedaccess toany ServiceorContent oritsrelatedsystemsornetworks,(g) permit direct or indirect directorindirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, an Order Form, or the Documentation; , (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or use (k) disassemble, reverse engineer, or decompile a Service or Content, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services or Software, to create competing products or services, or modify Our or our licensor’s intellectual property or use are within the scope of any of Our or our licensor’s intellectual property unless otherwise permitted herein or otherwise agreed to by Us in a signed writingpatent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the ServicesOur services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Master Subscription Agreement

Usage Restrictions. You will not (a) modify, decompile, disassemble make any Service or reverse engineerContent available to, or cause use any Service or permit any Content for the benefit of, anyone other party to modifythan You or Users, decompileunless expressly stated otherwise in an Order Form or the Documentation, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the Services any Service or Content, or include any Software to third parties; Service or Content in a service bureau or outsourcing offering, (c) attempt to gain unauthorized access to any use a Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services Xxx-XxxxxXxxxxxx.xxx Application to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (d) use a Service or Non- XxxxxXxxxxxx.xxx Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the Services any Service or third-party data contained therein; , (f) attempt to gain unauthorized access to the Services any Service or their Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, an Order Form, or the Documentation; , (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Non- XxxxxXxxxxxx.xxx product or service, or use (l) reverse engineer any Service (to the Services or Software, to create competing products or services, or modify Our or our licensor’s intellectual property or use any of Our or our licensor’s intellectual property unless otherwise extent such restriction is permitted herein or otherwise agreed to by Us in a signed writinglaw). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the ServicesOur services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Service Agreement

Usage Restrictions. You will not (a) modify, decompile, disassemble make any Service or reverse engineerContent available to anyone other than Users, or cause use any Service or permit any Content for the benefit of, anyone other party to modifythan You, decompileunless expressly stated otherwise in an Order Form or the Documentation, disassemble or reverse engineer, Software, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, rentlicense, sublicense sublicense, distribute, make available, rent or lease the Services any Service or Content, or include any Software to third parties; Service or Content in a service bureau or outsourcing offering, (c) attempt to gain unauthorized access to any use a Service or its related systems or networks, or otherwise violate the license grant or restrictions set forth in Section 7 above; (d) use the Services Non-SFDC Application to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; , (d) use a Service or Non-SFDC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of the Services any Service or third-party data contained therein; , (f) attempt to gain unauthorized access to the Services any Service or their Content or its related systems or networks; , (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy, or to access or use any of Our or our licensor’s intellectual property, property except as permitted under this Agreement, an Order Form, or the Documentation; , (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) misappropriate frame or mirror any Services part of any Service or SoftwareContent, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, o r (k) disassemble, reverse engineer, or use decompile a Service or Content, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services or Software, to create competing products or services, or modify Our or our licensor’s intellectual property or use are within the scope of any of Our or our licensor’s intellectual property unless otherwise permitted herein or otherwise agreed to by Us in a signed writingpatent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of the ServicesOur services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Master Subscription Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!