Use of Unauthorized Software Sample Clauses

Use of Unauthorized Software. During the Term, Executive shall not knowingly load any unauthorized software into Executive’s computer (whether personal or owned by Employer). Executive may request that Employer purchase, register and install certain software or other digital intellectual property, but Executive may not copy or install such software or intellectual property himself. Executive acknowledges that certain software and digital intellectual property is Confidential Information of Employer and Executive agrees, in accordance with Section 2.2, to keep such software and intellectual property confidential and not to use it except in furtherance of Employer’s Business or the operations of Employer or its Affiliates.
AutoNDA by SimpleDocs
Use of Unauthorized Software. Customer represents and warrants that it will only use SISW software that has been validly licensed to it by SISW or its authorized partner. Any SISW software not duly purchased from SISW or its authorized partner constitutes unauthorized software for purposes of this Agreement. If Customer downloads, installs and/or uses unauthorized software, then SISW has the right to terminate this Agreement in accordance with the terms of Section 4.3 of this Agreement. Furthermore, no refund or credit will be due to Customer as a result of termination of the Agreement, or termination of any Software licenses, Maintenance Services, Professional Services or other products or services provided under this Agreement. All amounts owed to SISW by Customer for services rendered up to the effective date of termination shall remain outstanding and shall be due and payable in accordance with the terms of this Agreement.
Use of Unauthorized Software. Licensee represents and warrants that it will only use Siemens software that has been validly licensed to it by Siemens or its authorized partner. Any Siemens software not duly licensed from Siemens or its authorized partner constitutes unauthorized software. If Licensee downloads, installs and/or uses unauthorized software, then Siemens has the right to terminate this Agreement in accordance with the terms of Article 6 below.
Use of Unauthorized Software. End User represents and warrants that it will only use Storecheck software that has been validly licensed to it by Storecheck or its authorized distributors. Any Storecheck software not duly licensed from Storecheck or its authorized distributors constitutes unauthorized software for purposes of this Agreement. If End User downloads, installs and/or uses unauthorized software, then Storecheck has the right to terminate this Agreement and the Master Agreement.
Use of Unauthorized Software. Customer represents and warrants that it will only use BCKS software that has been validly licensed to it by BCKS or its authorized partner. Any BCKS software not duly purchased from BCKS or its authorized partner constitutes unauthorized software for purposes of this Agreement. If Customer downloads, installs and/or uses unauthorized software, then BCKS has the right to terminate this Agreement in accordance with the terms of Section 4.3 of this Agreement. Furthermore, no refund or credit will be due to Customer as a result of termination of the Agreement, or termination of any Software licenses, Maintenance Services, Professional Services or other products or services provided under this Agreement. All amounts owed to BCKS by Customer for services rendered up to the effective date of termination shall remain outstanding and shall be due and payable in accordance with the terms of this Agreement.
Use of Unauthorized Software. Under the ERAP Prime Contract (at Part B of Section 26 of Appendix B- 1), all technology used by NMA and Guidehouse needed to meet contractually-specified standards or receive prior approval from OTDA. This did not occur with respect to Guidehouse’s use of certain software. Specifically, from November 10, 2021 through December 14, 2021, Guidehouse used a certain third-party data cloud software program to administer a program adjacent to the ERAP and store PII (the “Unauthorized Software”). Guidehouse did not seek or receive OTDA’s approval to use it until after NMA raised concerns to Guidehouse about its need to obtain State approval to use the program.

Related to Use of Unauthorized Software

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Use of Customer Data Verizon, Verizon Affiliates and their respective agents, may use, process and/or transfer Customer Data (including intra-group transfers and transfers to entities in countries that do not provide statutory protections for personal information) as set forth in the Privacy Policy and as necessary: (a) in connection with provisioning of Services; (b) to incorporate Customer Data into databases controlled by Verizon, Verizon Affiliates or their respective agents for the purpose of providing Services; administration; provisioning; invoicing and reconciliation; verification of Customer identity, solvency and creditworthiness; maintenance, support and product development; fraud detection and prevention; sales, revenue and customer analysis and reporting; market and customer use analysis including in the manner described in the Privacy Policy; and (c) to communicate to Customer regarding Services.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!