Viruses The Fund agrees to use reasonable efforts to prevent the transmission through the Electronic Services of any software or file which contains any viruses, worms, harmful component or corrupted data and agrees not to use any device, software, or routine to interfere or attempt to interfere with the proper working of the Electronic Services.
Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.
Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.
Latent Defects Notwithstanding anything to the contrary set forth herein, no acceptance, or deemed acceptance, by City pursuant to this Section shall be applicable with respect to any Latent Defects. An acceptance, or deemed acceptance, by City pursuant to this Section shall not mean that City has accepted, or the other party has been relieved of, responsibility for: (i) compliance with the Laws; (ii) the proper application of construction means or methods; or (iii) correcting any portion of the Project if it later is determined that any portion of the Project is inconsistent with the Final Documents and Drawings.
Malicious Code You understand and agree that you will be responsible for the introduction (by you, your employees, agents, or representatives) into the Services, whether intentional or unintentional, of (i) any virus or other code, program, or sub-program that damages or interferes with the operation of the computer system containing the code, program or sub-program, or halts, disables, or interferes with the operation of the Services themselves; or (ii) any device, method, or token whose knowing or intended purpose is to permit any person to circumvent the normal security of the Services or the system containing the software code for the Services (Malicious Code). You agree to take all necessary actions and precautions to prevent the introduction and proliferation of any Malicious Code into those systems that interact with the Services.
Computer Systems (a) The Computer Systems adequately meet the data processing and other computing needs of the Business as presently conducted. The Computer Systems function, operate, process and compute in accordance with all Applicable Laws, industry standards and trade practices. The Computer Systems operate and perform in all material respects in accordance with their documentation and functional specifications. The Computer Systems have not materially malfunctioned or failed within the past three years.
Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.
Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).
Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.
Customer Data 5.1 The Customer shall own all right, title and interest in and to all of the Customer Data and shall have sole responsibility for the legality, reliability, integrity, accuracy and quality of the Customer Data.