Common use of Usage Restrictions Clause in Contracts

Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Users, or use any Service or Content for the benefit of, anyone other than You, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Third Party Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Third Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a Service or Content, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 2 contracts

Samples: Master Subscription Agreement, Master Subscription Agreement

AutoNDA by SimpleDocs

Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Third Party Non-RevenueWell Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Third Party Non-RevenueWell Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non- RevenueWell product or service, (2l) build a product use any of Our Confidential Information to dispute or service using similar ideascontext the validity of Our intellectual property rights, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4m) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 2 contracts

Samples: Master Subscription Agreement, Master Subscription Agreement

Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Third Party Non- RevenueWell Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Third Party Non-RevenueWell Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non- RevenueWell product or service, (2l) build a product use any of Our Confidential Information to dispute or service using similar ideascontext the validity of Our intellectual property rights, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4m) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Revenuewell Master Subscription Agreement

Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Third Party Xxx-XxxxxXxxxxxx.xxx Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Third Party Non- XxxxxXxxxxxx.xxx Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non- XxxxxXxxxxxx.xxx product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Agreement

Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Users, or use any Service or Content for the benefit of, anyone other than You, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Third Party ProduQtive Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Third 3rd Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized unauthorised access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a Service or Content, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Master Subscription Agreement

Usage Restrictions. You At all times, you will comply, and ensure each User complies, with all applicable Privacy laws while using the Service. Without limiting the generality of Section 4.2, you agree that you will not, and will not permit any person, including without limitation any Users, to: (a) make any Service or Content available to anyone other than Users, or use any Service or Content for the benefit of, anyone other than Youyou, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Third Third-Party Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, publicity rights, defamation rights, intellectual property rights, proprietary rights, contractual rights or any other legal right (d) use a Service or Third Third-Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of our Services in a manner that is in violation of Applicable Laws, or to access or use any of Our our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your your own intranets or otherwise for Your your own internal business purposes or as permitted in the Documentation, (k) access or use a Service for benchmarking purposes, including without limitation monitoring its availability, performance or functionality, or (kl) disassemble, reverse engineer, or decompile a Service or Content, or access or use it for any purpose competitive with iComply’s business, including without limitation to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.or

Appears in 1 contract

Samples: Master Terms and Conditions

Usage Restrictions. You Licensee will not (a) make any Service Services or Licensor Content available to anyone other than Usersto, or use any Service Services or Licensor Content for the benefit of, anyone other than YouLicensee or Authorized Persons, unless expressly stated otherwise in an Order Form or the DocumentationForm(s), (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service Services or Licensor Content, or include any Service Services or Licensor Content in a service bureau or outsourcing offering, (c) use a Service or Third Party Application any Services to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Third Party Application any Services to store or transmit Malicious Codecodes, files, scripts, agents or programs intended to do harm, (e) interfere with or disrupt the integrity or performance of any Service Services or third-party data contained therein, (f) attempt to gain unauthorized access to any Service Services or Licensor Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Services or Licensor Content in a way that circumvents a contractual usage limit, or use any of the Services to access or use any of Our intellectual property except as permitted under this Agreement, Agreement or an Order Form, or the DocumentationForm(s), (h) modify, copy, or create derivative works based on a Service copy any Services or any part, feature, function or user interface thereof, (i) copy Licensor Content except as permitted herein or in an Order Form or the DocumentationForm(s), (j) frame or mirror any part of any Service Services or Licensor Content, other than framing on Your Licensee’s own intranets or otherwise for Your Licensee’s own internal business purposes or as permitted in the Documentationan Order Form(s), or (k) disassemble, reverse engineer, access any Services or decompile a Service or Content, or access it Licensor Content in order to (1) build a competitive product or service, (2) build service or to benchmark with a product or service using similar ideasservice, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer any Services (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation Agreement or Order Forms, Form(s) by You or Users Licensee that in Our Licensor’s judgment threatens the security, integrity or availability of Our servicesLicensor Services, may result in Our Licensor’s immediate suspension of the Services, however We Licensor will use commercially reasonable efforts under the circumstances to provide You Licensee with notice and an opportunity to remedy such violation or threat prior to such suspension.. DELIVERY; ACCEPTANCE

Appears in 1 contract

Samples: Litify Inc. Services Agreement

AutoNDA by SimpleDocs

Usage Restrictions. You Subscriber will not (a) make any Service or Content available to anyone other than Subscriber or Users, or use any Service or Content for the benefit of, of anyone other than YouSubscriber or its Affiliates, unless expressly stated otherwise in an Service Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offeringoffering (including offering the Platform to third parties on an applications service provider or time-sharing basis), (c) use a Service or Third Party Non-HSPL Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Third Party Non-HSPL Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to anyone or use of any Service Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of Our HSPL intellectual property except as permitted under this Agreement, an Order FormService Order, or the Documentation, (h) modify, copyalter, adapt, translate, copy or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Service Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your Subscriber's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, or (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content, Content or apply any other method to derive the source code of any software included in the services or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service Service, or (4) determine whether the Services are within the scope of any patent. Any use Further, you shall not (i) systematically access the platform using “bots” or “spiders”, or any automated system that calls to the platform more frequently than may reasonably be performed by a human user using a standard web browser, or attempt to gain unauthorized access to the platform or their related systems or networks, or (ii) remove, alter or obscure any confidentiality or proprietary rights notices (including copyright notices) of HSPL on or within the Platform or any copies of the Services Platform, or (iii) access or use the services in breach of this Agreement, Documentation a way intended to avoid incurring fees or Order Forms, by You exceeding usage limits or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspensionquotas.

Appears in 1 contract

Samples: Master Agreement

Usage Restrictions. You will not (a) make any Service cFive Services or Content available to anyone other than Usersto, or use any Service cFive Services or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service cFive Services or Content, or include any Service cFive Services or Content in a service bureau or outsourcing offeringonline or other offering or product, (c) use a Service or Third Party Application cFive Services to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Third Party Application cFive Services to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service cFive Services or third-party data contained therein, (f) attempt to gain unauthorized access to any Service cFive Services or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service cFive Services or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as expressly permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service copy cFive Services or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service cFive Services or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, access cFive Services or decompile a Service or Content, or access it Content to (1) build a competitive product or service or to benchmark with a third party product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether the Services are within the scope of any patentreverse engineer cFive Services. Any use of the cFive Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the cFive Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.

Appears in 1 contract

Samples: Master Subscription Agreement

Usage Restrictions. You Customer will not (a) make any Service or Content available to anyone other than UsersCustomer, or use any Service or Content for the benefit of, of anyone other than YouCustomer and legal entities of the same group of companies as the Customer, unless expressly stated otherwise in an Order Form or the Documentationwritten consent by TGNDATA, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a TGNDATA Service or Third Party Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a TGNDATA Service or Third Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of Our TGNDATA intellectual property except as permitted under this Agreement, Agreement or an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the DocumentationForm, (j) frame or mirror any part of any Service or Content, other than framing on Your Customer's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentationpurposes, or (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content, Content or use access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service Service, or (4) determine whether the Services are within the scope of any patent. Any use of If Customer receives notice, that Content may no longer be used or must be removed, modified and/or disabled to avoid violating the Services in breach of this AgreementAcceptable Use Customer will promptly do so. If Customer does not take required action, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, including deleting any Content Customer may result in Our immediate suspension of have downloaded from the Services, however We will use commercially reasonable efforts under in accordance with the circumstances above, or if in TGNDATA’s judgment continued violation is likely to provide You with notice and an opportunity to remedy such violation or threat prior to such suspensionreoccur, TGNDATA may disable the applicable Content, Service.

Appears in 1 contract

Samples: Tgndata Master Subscription Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.