Common use of USE OF ACCESS PRODUCTS Clause in Contracts

USE OF ACCESS PRODUCTS. 4.1. You acknowledge that any Access Products are provided on an “as is” basis and have not been prepared to meet Your individual requirements. It is Your responsibility to ensure the Access Products meet Your requirements. 4.2. The right to use (whether by Licence or otherwise) Access Products is granted to You, as identified by Your relevant company registration number, or other unique identifier, where applicable, and the right to use will transfer with You should Your ownership change, provided that the company registration number does not change. 4.3. The Access Products may be used by the Permitted Users. 4.4. You acknowledge that the use of Access Products may be restricted by Thresholds. In the event of the excess usage above a Threshold, We will invoice You for the excess usage from the time the excess usage commenced for the then current Subscription Term and increase the relevant Threshold and associated Fees for the Following Subscription Term in accordance with the prevailing rates. 4.5. You shall ensure the security and confidentiality of all log-on identifiers, including usernames, passwords or any other credentials, assigned to, or created by, You or any Authorised User in order to access or use any Access Product (an ID). You acknowledge and agree that You will be solely responsible for all activities that occur under such ID. You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use. Your ID is for Your internal use only and You may not sell, transfer or sublicense any ID to any other entity or person, except that You may disclose ID to Authorised Users in accordance with this Agreement. 4.6. You shall designate one contact and one alternate as the responsible party for communication with Us during any term of this Agreement (Your System Administrator). You may amend Your System Administrator by Notice to Us from time totime. 4.7. You shall ensure that each Authorised User shall, as a condition of being granted access to an Access Product, be required by Your System Administrator to acknowledge the obligations on You under this Agreement respecting authorised use (and restrictions on use) of and agree to comply with the same. You shall immediately notify Us if You become aware of any breach of the terms of this Agreement or Our Acceptable Use Policy by any Authorised User. 4.8. You will ensure that all Authorised Users comply with Your obligations under this Agreement, including Our Acceptable Use Policy, and that the terms of any agreement entered into between You and an Authorised User for the use of the SaaS are consistent with this Agreement. If You become aware of any violation of Your obligations under this Agreement by an Authorised User, You will immediately terminate such Authorised User’s access to the SaaS. 4.9. Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product. Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You. 4.10. You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind. You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) in any way remove or circumvent any security devices present within an Access Product. 4.11. You have no right to perform penetration testing on any Access Product without Our prior written consent which will be subject to a specific penetration test access agreement.

Appears in 5 contracts

Samples: Framework Agreement, Framework Agreement, Framework Agreement

AutoNDA by SimpleDocs

USE OF ACCESS PRODUCTS. 4.13.1. You acknowledge that any Access Products are provided on an “as is” basis and have not been prepared to meet Your individual requirements. It is Your responsibility to ensure the Access Products meet Your requirements. 4.23.2. The right to use (whether by Licence or otherwise) Access Products is granted to You, as identified by Your relevant company Companies House registration number, or other unique identifier, where applicable, and the right to use will transfer with You should Your ownership change, provided that the company Company registration number does not change. 4.33.3. The Access Products may be used by the Permitted Users. 4.43.4. You acknowledge that the use of Access Products may be restricted by Thresholds. In the event of the excess usage above a Threshold, We will invoice You for the excess usage from the time the excess usage commenced for the then current any prior Subscription Term Period and increase the relevant Threshold and associated Fees for the Following following Subscription Term Period in accordance with the prevailing rates. 4.53.5. You shall ensure the security and confidentiality of all log-on identifiers, including usernames, passwords or any other credentials, assigned to, or created by, You or any Authorised User in order to access or use any Access Product (an ID). You acknowledge and agree that You will be solely responsible for all activities that occur under such ID. You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use. Your ID is for Your internal use only and You may not sell, transfer or sublicense any ID to any other entity or person, except that You you may disclose ID to Authorised Users in accordance with this Agreement. 4.63.6. You shall designate one contact and one alternate as the responsible party for communication with Us during any term of this Agreement (Your System Administrator). You may amend Your System Administrator by Notice to Us from time totime. 4.73.7. You shall ensure that each Authorised User shall, as a condition of being granted access to an Access Product, be required by Your System Administrator to acknowledge the obligations on You under this Agreement respecting authorised use (and restrictions on use) of and agree to comply with the same. You shall immediately notify Us if You become aware of any breach of the terms of this Agreement or Our Acceptable Use Policy by any Authorised User. 4.83.8. You will ensure that all Authorised Users comply with Your obligations under this Agreement, including Our our Acceptable Use Policy, and that the terms of any agreement entered into between You and an Authorised User for the use of the SaaS are consistent with this Agreement. If You you become aware of any violation of Your your obligations under this Agreement by an Authorised User, You you will immediately terminate such Authorised User’s access to the SaaS. 4.9. SaaS. Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product. Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You. 4.103.9. You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind. You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) intended to in any way remove or circumvent any security devices present within an Access Product. 4.113.10. You have no right to perform penetration testing on any Access Product without Our prior written consent which will be subject to a specific penetration test access agreement.

Appears in 3 contracts

Samples: Framework Agreement, Framework Agreement, Framework Agreement

USE OF ACCESS PRODUCTS. 4.13.1. You acknowledge that any Access Products are provided on an “as is” basis and have not been prepared to meet Your individual requirements. It is Your responsibility to ensure the Access Products meet Your requirements. 4.23.2. The right to use (whether by Licence or otherwise) Access Products is granted to YouYou and any applicable Permitted Users, each as identified by Your the relevant company Companies House registration number, or other unique identifier, identifier (where applicable, and the right to use will transfer with You should Your ownership change, provided that the company registration number does not change). 4.33.3. The Access Products may be used by the Permitted Users, however, You shall be fully liable for the Permitted User’s compliance with the relevant terms of this Agreement, including but not limited to this clause 3 of Schedule 1. Any acts and or omissions of the Permitted User shall be treated as an act and or omission of Yours. 4.43.4. You acknowledge that the use of Access Products may be restricted by Thresholds. In the event of the excess usage above a Threshold, We will invoice You for the excess usage from the time the excess usage commenced for the then current any prior Subscription Term Period and increase the relevant Threshold and associated Fees for the Following following Subscription Term Period in accordance with the prevailing rates. 4.53.5. You shall ensure the security and confidentiality of all log-on identifiers, including usernames, passwords or any other credentials, assigned to, or created by, You or any Authorised User in order to access or use any Access Product (an ID). You acknowledge and agree that You will be solely responsible for all activities that occur under such ID. You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use. Your ID is for Your internal use only and You may not sell, transfer or sublicense any ID to any other entity or person, except that You you may disclose ID to Authorised Users in accordance with this Agreement. 4.63.6. You shall designate one contact and one alternate as the responsible party for communication with Us during any term of this Agreement (Your System Administrator). You may amend Your System Administrator by Notice to Us from time totimeto time. 4.73.7. You shall ensure that each Authorised User shall, as a condition of being granted access to an Access Product, be required by Your System Administrator to acknowledge the obligations on You under this Agreement respecting authorised use (and restrictions on use) of and agree to comply with the same. You shall immediately notify Us if You become aware of any breach of the terms of this Agreement or Our Acceptable Use Policy by any Authorised User. 4.83.8. You will ensure that all Authorised Users comply with Your obligations under this Agreement, including Our our Acceptable Use Policy, and that the terms of any agreement entered into between You and an Authorised User for the use of the SaaS are consistent with this Agreement. If You you become aware of any violation of Your your obligations under this Agreement by an Authorised User, You you will immediately terminate such Authorised User’s access to the SaaS. 4.9. SaaS. Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product. Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You. 4.103.9. You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind. You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) intended to in any way remove or circumvent any security devices present within an Access Product. 4.113.10. You have no right to shall not perform penetration testing on any Access Product without Our prior written consent which will be subject to a specific penetration test access agreementProduct.

Appears in 3 contracts

Samples: Framework Agreement, Framework Agreement, Framework Agreement

USE OF ACCESS PRODUCTS. 4.1. You acknowledge that any Access Products are provided on an “as is” basis and have not been prepared to meet Your individual requirements. It is Your responsibility to ensure the Access Products meet Your requirements. 4.2. The right to use (whether by Licence or otherwise) Access Products is granted to You, as identified by Your relevant company Companies House registration number, or other unique identifier, where applicable, and the right to use will transfer with You should Your ownership change, provided that the company Company registration number does not change. 4.3. The Access Products may be used by the Permitted Users. 4.4. You acknowledge that the use of Access Products may be restricted by Thresholds. In the event of the excess usage above a Threshold, We will invoice You for the excess usage from the time the excess usage commenced for the then current any prior Subscription Term Period and increase the relevant Threshold and associated Fees for the Following following Subscription Term Period in accordance with the prevailing rates. 4.5. You shall ensure the security and confidentiality of all log-on identifiers, including usernames, passwords or any other credentials, assigned to, or created by, You or any Authorised User in order to access or use any Access Product (an ID). You acknowledge and agree that You will be solely responsible for all activities that occur under such ID. You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use. Your ID is for Your internal use only and You may not sell, transfer or sublicense any ID to any other entity or person, except that You you may disclose ID to Authorised Users in accordance with this Agreement. 4.6. You shall designate one contact and one alternate as the responsible party for communication with Us during any term of this Agreement (Your System Administrator). You may amend Your System Administrator by Notice to Us from time totimeto time. 4.7. You shall ensure that each Authorised User shall, as a condition of being granted access to an Access Product, be required by Your System Administrator to acknowledge the obligations on You under this Agreement respecting authorised use (and restrictions on use) of and agree to comply with the same. You shall immediately notify Us if You become aware of any breach of the terms of this Agreement or Our our Acceptable Use Policy by any Authorised User. 4.8. You will ensure that all Authorised Users comply with Your obligations under this Agreement, including Our our Acceptable Use Policy, and that the terms of any agreement entered into between You and an Authorised User for the use of the SaaS are consistent with this Agreement. If You you become aware of any violation of Your your obligations under this Agreement by an Authorised User, You you will immediately terminate such Authorised User’s access to the SaaS. 4.9. SaaS. Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product. Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You. 4.104.9. You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind. You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) intended to in any way remove or circumvent any security devices present within an Access Product. 4.114.10. You have no right to perform penetration testing on any Access Product without Our our prior written consent which will be subject to a specific penetration test access agreement.

Appears in 2 contracts

Samples: Framework Agreement, Framework Agreement

USE OF ACCESS PRODUCTS. 4.1. You acknowledge that any Access Products are provided on an “as is” basis and have not been prepared to meet Your individual requirements. It is Your responsibility to ensure the Access Products meet Your requirements. 4.2. The right to use (whether by Licence or otherwise) Access Products is granted to You, as identified by Your relevant company Companies House registration number, or other unique identifier, where applicable, and the right to use will transfer with You should Your ownership change, provided that the company Company registration number does not change. 4.3. The Access Products may be used by the Permitted Users. 4.4. You acknowledge that the use of Access Products may be restricted by Thresholds. In the event of the excess usage above a Threshold, We will invoice You for the excess usage from the time the excess usage commenced for the then current Subscription Term and increase the relevant Threshold and associated Fees for the Following Subscription Term in accordance with the prevailing rates. 4.5. You shall ensure the security and confidentiality of all log-on identifiers, including usernames, passwords or any other credentials, assigned to, or created by, You or any Authorised User in order to access or use any Access Product (an ID). You acknowledge and agree that You will be solely responsible for all activities that occur under such ID. You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use. Your ID is for Your internal use only and You may not sell, transfer or sublicense any ID to any other entity or person, except that You you may disclose ID to Authorised Users in accordance with this Agreement. 4.6. You shall designate one contact and one alternate as the responsible party for communication with Us during any term of this Agreement (Your System Administrator). You may amend Your System Administrator by Notice notice to Us from time totime. 4.7. You shall ensure that each Authorised User shall, as a condition of being granted access to an Access Product, be required by Your System Administrator to acknowledge the obligations on You under this Agreement respecting authorised use (and restrictions on use) of and agree to comply with the same. You shall immediately notify Us if You become aware of any breach of the terms of this Agreement or Our our Acceptable Use Policy by any Authorised User. 4.8. You will ensure that all Authorised Users comply with Your obligations under this Agreement, including Our our Acceptable Use Policy, and that the terms of any agreement entered into between You and an Authorised User for the use of the SaaS are consistent with this Agreement. If You you become aware of any violation of Your your obligations under this Agreement by an Authorised User, You you will immediately terminate such Authorised User’s access to the SaaS. 4.9. Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product. Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You. 4.10. You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind. You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) intended to in any way remove or circumvent any security devices present within an Access Product. 4.11. You have no right to perform penetration testing on any Access Product without Our our prior written consent which will be subject to a specific penetration test access agreement.

Appears in 2 contracts

Samples: Framework Agreement, Framework Agreement

USE OF ACCESS PRODUCTS. 4.1. You acknowledge that any Access Products are provided on an “as is” basis and have not been prepared to meet Your individual requirements. It is Your responsibility to ensure the Access Products meet Your requirements. 4.2. The right to use (whether by Licence or otherwise) Access Products is granted to You, as identified by Your relevant company Companies House registration number, or other unique identifier, where applicable, and the right to use will transfer with You should Your ownership change, provided that the company Company registration number does not change. 4.3. The Access Products may be used by the Permitted Users. 4.4. You acknowledge that the use of Access Products may be restricted by Thresholds. In the event of the excess usage above a Threshold, We will invoice You for the excess usage from the time the excess usage commenced for the then current Subscription Term and increase the relevant Threshold and associated Fees for the Following Subscription Term in accordance with the prevailing rates. 4.5. You shall ensure the security and confidentiality of all log-on identifiers, including usernames, passwords or any other credentials, assigned to, or created by, You or any Authorised User in order to access or use any Access Product (an ID). You acknowledge and agree that You will be solely responsible for all activities that occur under such ID. You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use. Your ID is for Your internal use only and You may not sell, transfer or sublicense any ID to any other entity or person, except that You you may disclose ID to Authorised Users in accordance with this Agreement. 4.6. You shall designate one contact and one alternate as the responsible party for communication with Us during any term of this Agreement (Your System Administrator). You may amend Your System Administrator by Notice notice to Us from time totimeto time. 4.7. You shall ensure that each Authorised User shall, as a condition of being granted access to an Access Product, be required by Your System Administrator to acknowledge the obligations on You under this Agreement respecting authorised use (and restrictions on use) of and agree to comply with the same. You shall immediately notify Us if You become aware of any breach of the terms of this Agreement or Our our Acceptable Use Policy by any Authorised User. 4.8. You will ensure that all Authorised Users comply with Your obligations under this Agreement, including Our our Acceptable Use Policy, and that the terms of any agreement entered into between You and an Authorised User for the use of the SaaS are consistent with this Agreement. If You you become aware of any violation of Your your obligations under this Agreement by an Authorised User, You you will immediately terminate such Authorised User’s access to the SaaS. 4.9. Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product. Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You. 4.10. You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind. You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) intended to in any way remove or circumvent any security devices present within an Access Product. 4.11. You have no right to perform penetration testing on any Access Product without Our our prior written consent which will be subject to a specific penetration test access agreement.

Appears in 1 contract

Samples: Framework Agreement

AutoNDA by SimpleDocs

USE OF ACCESS PRODUCTS. 4.1. You acknowledge that any Access Products are provided on an “as is” basis and have not been prepared to meet Your individual requirements. It is Your responsibility to ensure the Access Products meet Your requirements. 4.2. The right to use (whether by Licence or otherwise) Access Products is granted to You, as identified by Your relevant company registration number, or other unique identifier, where applicable, and the right to use will transfer with You should Your ownership change, provided that the company registration number does not change. 4.3. The Access Products may be used by the Permitted Users. 4.4. You acknowledge that the use of Access Products may be restricted by Thresholds. In the event of the excess usage above a Threshold, We will invoice You for the excess usage from the time the excess usage commenced for the then current Subscription Term and increase the relevant Threshold and associated Fees for the Following Subscription Term in accordance with the prevailing rates. 4.5. You shall ensure the security and confidentiality of all log-on identifiers, including usernames, passwords or any other credentials, assigned to, or created by, You or any Authorised User in order to access or use any Access Product (an ID). You acknowledge and agree that You will be solely responsible for all activities that occur under such ID. You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use. Your ID is for Your internal use only and You may not sell, transfer or sublicense any ID to any other entity or person, except that You you may disclose ID to Authorised Users in accordance with this Agreement. 4.6. You shall designate one contact and one alternate as the responsible party for communication with Us during any term of this Agreement (Your System Administrator). You may amend Your System Administrator by Notice to Us from time totime. 4.7. You shall ensure that each Authorised User shall, as a condition of being granted access to an Access Product, be required by Your System Administrator to acknowledge the obligations on You under this Agreement respecting authorised use (and restrictions on use) of and agree to comply with the same. You shall immediately notify Us if You become aware of any breach of the terms of this Agreement or Our Acceptable Use Policy by any Authorised User. 4.8. You will ensure that all Authorised Users comply with Your obligations under this Agreement, including Our our Acceptable Use Policy, and that the terms of any agreement entered into between You and an Authorised User for the use of the SaaS are consistent with this Agreement. If You become aware of any violation of Your obligations under this Agreement by an Authorised User, You will immediately terminate such Authorised User’s access to the SaaS. 4.9. Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product. Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You. 4.10. You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind. You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) intended to in any way remove or circumvent any security devices present within an Access Product. 4.11. You have no right to perform penetration testing on any Access Product without Our prior written consent which will be subject to a specific penetration test access agreement.

Appears in 1 contract

Samples: Framework Agreement

USE OF ACCESS PRODUCTS. 4.11.1. You acknowledge that any Access Products are provided on an “as is” basis and have not been prepared to meet Your individual requirements. It is Your responsibility to ensure the Access Products meet Your requirements. 4.21.2. The right to use (whether by Licence or otherwise) Access Products is granted to You, as identified by Your relevant company Companies House registration number, or other unique identifier, where applicable, and the right to use will transfer with You should Your ownership change, provided that the company Company registration number does not change. 4.31.3. The Access Products may be used by the Permitted Users. 4.41.4. You acknowledge that the use of Access Products may be restricted by Thresholds. In the event of the excess usage above a Threshold, We will invoice You for the excess usage from the time the excess usage commenced for the then current Subscription Term and increase the relevant Threshold and associated Fees for the Following Subscription Term in accordance with the prevailing rates. 4.51.5. You shall ensure the security and confidentiality of all log-on identifiers, including usernames, passwords or any other credentials, assigned to, or created by, You or any Authorised User in order to access or use any Access Product (an ID). You acknowledge and agree that You will be solely responsible for all activities that occur under such ID. You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use. Your ID is for Your internal use only and You may not sell, transfer or sublicense any ID to any other entity or person, except that You you may disclose ID to Authorised Users in accordance with this Agreement. 4.61.6. Unless specified otherwise in the Statement of Work, You shall designate one contact and one alternate as the responsible party for communication with Us during any term of this Agreement (Your System Administrator). You may amend Your System Administrator by Notice notice to Us from time totimeto time. 4.71.7. You shall ensure that each Authorised User shall, as a condition of being granted access to an Access Product, be required by Your System Administrator to acknowledge the obligations on You under this Agreement respecting authorised use (and restrictions on use) of and agree to comply with the same. You shall immediately notify Us if You become aware of any breach of the terms of this Agreement or Our our Acceptable Use Policy by any Authorised User. 4.81.8. You will ensure that all Authorised Users comply with Your obligations under this Agreement, including Our our Acceptable Use Policy, and that the terms of any agreement entered into between You and an Authorised User for the use of the SaaS are consistent with this Agreement. If You you become aware of any violation of Your your obligations under this Agreement by an Authorised User, You you will immediately terminate such Authorised User’s access to the SaaS. 4.9. SaaS. Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product. Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You. 4.101.9. You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind. You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) intended to in any way remove or circumvent any security devices present within an Access Product. 4.111.10. You have no right to perform penetration testing on any Access Product without Our our prior written consent which will be subject to a specific penetration test access agreement.

Appears in 1 contract

Samples: G Cloud Call Off Contract

USE OF ACCESS PRODUCTS. 4.1. You acknowledge that any Access Products are provided on an “as is” basis and have not been prepared to meet Your individual requirements. It is Your responsibility to ensure the Access Products meet Your requirements. 4.2. The right to use (whether by Licence or otherwise) Access Products is granted to You, as identified by Your relevant company registration number, or other unique identifier, where applicable, and the right to use will transfer with You should Your ownership change, provided that the company registration number does not change. 4.3. The Access Products may be used by the Permitted Users. 4.4. You acknowledge that the use of Access Products may be restricted by Thresholds. In the event of the excess usage above a Threshold, We will invoice You for the excess usage from the time the excess usage commenced for the then current Subscription Term and increase the relevant Threshold and associated Fees for the Following Subscription Term in accordance with the prevailing rates. 4.5. You shall ensure the security and confidentiality of all log-on identifiers, including usernames, passwords or any other credentials, assigned to, or created by, You or any Authorised User in order to access or use any Access Product (an ID). You acknowledge and agree that You will be solely responsible for all activities that occur under such ID. You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use. Your ID is for Your internal use only and You may not sell, transfer or sublicense any ID to any other entity or person, except that You may disclose ID to Authorised Users in accordance with this Agreement. 4.6. You shall designate one contact and one alternate as the responsible party for communication with Us during any term of this Agreement (Your System Administrator). You may amend Your System Administrator by Notice to Us from time totimeto time. 4.7. You shall ensure that each Authorised User shall, as a condition of being granted access to an Access Product, be required by Your System Administrator to acknowledge the obligations on You under this Agreement respecting authorised use (and restrictions on use) of and agree to comply with the same. You shall immediately notify Us if You become aware of any breach of the terms of this Agreement or Our Acceptable Use Policy by any Authorised User. 4.8. You will ensure that all Authorised Users comply with Your obligations under this Agreement, including Our Acceptable Use Policy, and that the terms of any agreement entered into between You and an Authorised User for the use of the SaaS are consistent with this Agreement. If You become aware of any violation of Your obligations under this Agreement by an Authorised User, You will immediately terminate such Authorised User’s access to the SaaS. 4.9. Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product. Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You. 4.10. You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind. You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) in any way remove or circumvent any security devices present within an Access Product. 4.11. You have no right to perform penetration testing on any Access Product without Our prior written consent which will be subject to a specific penetration test access agreement.

Appears in 1 contract

Samples: Framework Agreement

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!