Use of Proprietary Service Tools Sample Clauses

Use of Proprietary Service Tools. HPE may require you to use certain hardware and/or software system and network diagnostic and maintenance programs (“Proprietary Service Tools”), as well as certain diagnostic tools that may be included as part of the your system. Proprietary Service Tools are and remain the sole and exclusive property of HPE, and are provided “as is.” Proprietary Service Tools may reside on your systems or sites. You may only use the Proprietary Service Tools during the applicable Support coverage period and only as allowed by HPE and you may not sell, transfer, assign, pledge, or in any way encumber or convey the Proprietary Service Tools. Upon termination of Support, you will return the Proprietary Service Tools or allow HPE to remove these Proprietary Service Tools. You will also be required to: o Allows HPE to keep the Proprietary Service Tools resident on your systems or sites, and assist HPE in running them; o Install Proprietary Service Tools, including installation of any required updates and patches; o Use the electronic data transfer capability to inform HPE of events identified by the software; o If required, purchase HPE-specified remote connection hardware for systems with remote diagnosis service; and o Provide remote connectivity through an approved communications line. o You may not modify, reverse engineer, disassemble, decrypt, decompile or make derivative works of the Proprietary Service Tools. If you have a mandatory right to do so under statute, you must inform HPE in writing prior to making such modifications.
AutoNDA by SimpleDocs
Use of Proprietary Service Tools. HP may require you to use certain hardware and/or software system and network diagnostic and maintenance programs (“Proprietary Service Tools”), as well as certain diagnostic tools that may be included as part of the your system. Proprietary Service Tools are and remain the sole and exclusive property of HP, and are provided “as is.” Proprietary Service Tools may reside on your systems or sites. You may only use the Proprietary Service Tools during the applicable Support coverage period and only as allowed by HP and you may not sell, transfer, assign, pledge, or in any way encumber or convey the Proprietary Service Tools. Upon termination of Support, you will return the Proprietary Service Tools or allow HP to remove these Proprietary Service Tools. You will also be required to: o Allows HP to keep the Proprietary Service Tools resident on your systems or sites, and assist HP in running them; o Install Proprietary Service Tools, including installation of any required updates and patches; o Use the electronic data transfer capability to inform HP of events identified by the software; o If required, purchase HP-specified remote connection hardware for systems with remote diagnosis service; and o Provide remote connectivity through an approved communications line.
Use of Proprietary Service Tools. HP may require you to use certain Hardware and/or Software system and network diagnostic and maintenance programs (“Proprietary Service Tools”), as well as certain diagnostic tools that may be included as part of the your system. Proprietary Service Tools are and remain the sole and exclusive property of HP, and are provided “as is”. Proprietary Service Tools may reside on your systems or sites. You may only use the Proprietary Service Tools during the applicable Support coverage period and only as allowed by HP and you may not sell, transfer, assign, pledge, or in any way encumber or convey the Proprietary Service Tools. Upon termination of Support, you will return the Proprietary Service Tools or allow HP to remove these Proprietary Service Tools. You will also be required to: (i) Allow HP to keep the Proprietary Service Tools resident on your systems or sites, and assist HP in running them; (ii) Install Proprietary Service Tools, including installation of any required updates and patches; (iii) Use the electronic data transfer capability to inform HP of events identified by the Software; (iv) If required, purchase HP-specified remote connection Hardware for systems with remote diagnosis service; and (v) Provide remote connectivity through an approved communications line in accordance with Customer Security requirements, which Customer will provide to HP upon request.
Use of Proprietary Service Tools. HPE may require you to use certain hardware and/or software system and network diagnostic and maintenance programs (“Proprietary Service Tools”), as well as certain diagnostic tools that may be included as part of the your system. Proprietary Service Tools are and remain the sole and exclusive property of HPE, and are provided “as is.” Proprietary Service Tools may reside on your systems or sites. You may only use the Proprietary Service Tools during the applicable Support coverage period and only as allowed by HPE and you may not sell, transfer, assign, pledge, or in any way encumber or convey the Proprietary Service Tools. Upon termination of Support, you will return the Proprietary Service Tools or allow HPE to remove these Proprietary Service Tools. You will also be required to:
Use of Proprietary Service Tools. HPE may require you to use certain hardware and/or software system and network diagnostic and maintenance programs (“Proprietary Service Tools”), as well as certain diagnostic tools that may be included as part of the your system. Proprietary Service Tools are and remain the sole and exclusive property of HPE, and are provided “as is.” Proprietary Service Tools may reside on your systems or sites. You may only use the Proprietary Service Tools during the applicable Support coverage period and only as allowed by HPE and you may not sell, transfer, assign, pledge, or in any way encumber or convey the Proprietary Service Tools. Upon termination of Support, you will return the Proprietary Service Tools or allow HPE to remove these Proprietary Service Tools. You will also be required to: o Allows HPE to keep the Proprietary Service Tools resident on your systems or sites, and assist HPE in running them; o Install Proprietary Service Tools, including installation of any required updates and patches; o Use the electronic data transfer capability to inform HPE of events identified by the software; o If required, purchase HPE-specified remote connection hardware for systems with remote diagnosis service; and o Provide remote connectivity through an approved communications line.
Use of Proprietary Service Tools. HPE may require you to use certain Hardware and/or Software system and network diagnostic and maintenance programs (“Proprietary Service Tools”), as well as certain diagnostic tools that may be included as part of the Customers’ system. Proprietary Service Tools are and remain the sole and exclusive property of HPE, and are provided “as is”. Proprietary Service Tools may reside on Customer systems or sites. Customer may only use the Proprietary Service Tools during the applicable Support coverage period and only as allowed by HPE and Customer may not sell, transfer, assign, pledge, or in any way encumber or convey the Proprietary Service Tools. Upon termination of Support, Customer will return the Proprietary Service Tools or allow HPE to remove these Proprietary Service Tools. Customer may also be required to: (i) Allow HPE to keep the Proprietary Service Tools resident on Customer systems or sites, and assist HPE in running them; (ii) Install Proprietary Service Tools, including installation of any required updates and patches; (iii) Use the electronic data transfer capability to inform HPE of events identified by the Software; (iv) If required, purchase Hewlett Packard Enterprise-specified remote connection Hardware for systems with remote diagnosis service; and (v) Provide remote connectivity through an approved communications line in accordance with Customer Security requirements, which Customer will provide to HPE upon request.

Related to Use of Proprietary Service Tools

  • Use of Proprietary Information Officer recognizes that Corporation possesses a proprietary interest in all of the information described in Section 6 and has the exclusive right and privilege to use, protect by copyright, patent or trademark, manufacture or otherwise exploit the processes, ideas and concepts described therein to the exclusion of Officer, except as otherwise agreed between Corporation and Officer in writing. Officer expressly agrees that any products, inventions, discoveries or improvements made by Officer, his agents or affiliates based on or arising out of the information described in Section 6 shall be (i) deemed a work made for hire under the terms of United States Copyright Act, 17 U.S.C. § 101 et seq., and Corporation shall be the owner of all such rights with respect thereto and (ii) the property of and inure to the exclusive benefit of Corporation.

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

  • Protection of Proprietary Information The Seller has taken all reasonable steps to maintain the confidentiality of and otherwise protect and enforce their rights in all proprietary information pertaining to the Seller or any Seller Product. Without limiting the generality of the foregoing, no portion of the source code for any software ever owned or developed by the Seller has been disclosed or licensed to any escrow agent or other Person.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Definition of Proprietary Information The Executive acknowledges that he may be furnished or may otherwise receive or have access to confidential information which relates to the Company’s past, present or future business activities, strategies, services or products, research and development; financial analysis and data; improvements, inventions, processes, techniques, designs or other technical data; profit margins and other financial information; fee arrangements; compilations for marketing or development; confidential personnel and payroll information; or other information regarding administrative, management, or financial activities of the Company, or of a third party which provided proprietary information to the Company on a confidential basis. All such information, including in any electronic form, and including any materials or documents containing such information, shall be considered by the Company and the Executive as proprietary and confidential (the “Proprietary Information”).

  • Use of Products 3.28.1 In the performance of this contract, Consultant shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired (i) competitively within a timeframe providing for compliance with the contract performance schedule; (ii) meeting contract performance requirements; or (iii) at a reasonable price. 3.28.2 Consultant shall abide by the list of EPA-designated items available on EPA’s Comprehensive Procurement Guidelines web site: xxxxx://xxx.xxx.xxx/smm/comprehensive-procurement-guideline-cpg-program.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Protection of Customer Data The Supplier shall not delete or remove any proprietary notices contained within or relating to the Customer Data. The Supplier shall not store, copy, disclose, or use the Customer Data except as necessary for the performance by the Supplier of its obligations under this Call Off Contract or as otherwise Approved by the Customer. To the extent that the Customer Data is held and/or Processed by the Supplier, the Supplier shall supply that Customer Data to the Customer as requested by the Customer and in the format (if any) specified by the Customer in the Call Off Order Form and, in any event, as specified by the Customer from time to time in writing. The Supplier shall take responsibility for preserving the integrity of Customer Data and preventing the corruption or loss of Customer Data. The Supplier shall perform secure back-ups of all Customer Data and shall ensure that up-to-date back-ups are stored off-site at an Approved location in accordance with any BCDR Plan or otherwise. The Supplier shall ensure that such back-ups are available to the Customer (or to such other person as the Customer may direct) at all times upon request and are delivered to the Customer at no less than six (6) Monthly intervals (or such other intervals as may be agreed in writing between the Parties). The Supplier shall ensure that any system on which the Supplier holds any Customer Data, including back-up data, is a secure system that complies with the Security Policy and the Security Management Plan (if any). If at any time the Supplier suspects or has reason to believe that the Customer Data is corrupted, lost or sufficiently degraded in any way for any reason, then the Supplier shall notify the Customer immediately and inform the Customer of the remedial action the Supplier proposes to take. If the Customer Data is corrupted, lost or sufficiently degraded as a result of a Default so as to be unusable, the Supplier may: require the Supplier (at the Supplier's expense) to restore or procure the restoration of Customer Data to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer, and the Supplier shall do so as soon as practicable but not later than five (5) Working Days from the date of receipt of the Customer’s notice; and/or itself restore or procure the restoration of Customer Data, and shall be repaid by the Supplier any reasonable expenses incurred in doing so to the extent and in accordance with the requirements specified in Call Off Schedule 8 (Business Continuity and Disaster Recovery) or as otherwise required by the Customer.

  • Return of Proprietary Information 20.6.1 All Proprietary Information, other than Derivative Information, shall remain the property of the Disclosing Party, and all documents or other tangible media delivered to the Receiving Party that embody such Proprietary Information shall be, at the option of the Disclosing Party, either promptly returned to Disclosing Party or destroyed, except as otherwise may be required from time to time by Applicable Law (in which case the use and disclosure of such Proprietary Information will continue to be subject to this Agreement), upon the earlier of (i) the date on which the Receiving Party’s need for it has expired and (ii) the expiration or termination of this Agreement. 20.6.2 At the request of the Disclosing Party, any Derivative Information shall be, at the option of the Receiving Party, either promptly returned to the Disclosing Party or destroyed, except as otherwise may be required from time to time by Applicable Law (in which case the use and disclosure of such Derivative Information will continue to be subject to this Agreement), upon the earlier of (i) the date on which the Receiving Party’s need for it has expired and (ii) the expiration or termination of this Agreement. 20.6.3 The Receiving Party may at any time either return the Proprietary Information to the Disclosing Party or destroy such Proprietary Information. If the Receiving Party elects to destroy Proprietary Information, all copies of such information shall be destroyed and upon the written request of the Disclosing Party, the Receiving Party shall provide to the Disclosing Party written certification of such destruction. The destruction or return of Proprietary information shall not relieve any Receiving Party of its obligation to continue to treat such Proprietary Information in the manner required by this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!