Your Use of the Software Sample Clauses

Your Use of the Software. 3.1 You agree to use the Software only for purposes that are permitted by the Terms and as permitted by applicable law, regulation and generally accepted practice or guideline in the relevant jurisdictions (including any laws regarding the export of data and/or software). 3.2 You agree not to reproduce, duplicate, copy (except for one back-up copy), sell, sublicense the Software licenses or documentation to any third party for use in that third party’s business operations, trade or resell the Software for any purpose or to access (or to attempt to access) any of the Software by any means other than through the interface that is provided by SDL, unless you have been specifically allowed to do so in a separate agreement with SDL or reverse engineer, decompile or disassemble any software disclosed to you by SDL, except as expressly permitted by and for the purposes of this Agreement.. 3.3 You agree that you are responsible for maintaining the confidentiality of any password associated with any account that you use to access the Software and you agree that you will be solely responsible to SDL for all activities that occur under your account. 3.4 Copyright and other intellectual property laws protect the Software provided to you, and you agree to abide by and maintain all notices, license information, and restrictions contained therein. 3.5 disclose or make available to, or permit use of the Software by persons other than Licensee; exceed the licensed use of the Software as specified in Clause 1.3; or use the software for any other purpose than investigation and knowledge sharing. 3.6 You may not decompile, reverse engineer, dissemble, attempt to derive the source code of any software or security components of the Software (except as and only to the extent any foregoing restriction is prohibited by applicable law or to the extent as may be permitted by any licensing terms accompanying the foregoing). 3.7 You may not use the Software to violate, tamper with, or circumvent the security of any computer network, software, passwords, encryption codes, technological protection measures, or to otherwise engage in any kind of illegal activity, or to enable others to do so.
AutoNDA by SimpleDocs
Your Use of the Software. A. You acknowledge and agree that: i. All Notification Content is Your sole responsibility. You are solely responsible for the integrity and quality of the Notification Content. ii. You will not send Notifications to phone numbers that are emergency numbers and other numbers that may not be called using an automated system under applicable law. iii. You will not knowingly send any Notification Content which infringes the intellectual property rights of any party, is invasive of another's right to privacy, or violates any privacy laws, violates Your privacy policies or applicable rules or laws (including without limitation anything that would justify a complaint to the Federal Communications Commission). iv. You will not use or permit the use of the Software: (i) to engage in any illegal, unethical, deceptive or misleading practices in connection with the use of the Software to send Notifications, including but not limited to, creating a false identity or forged contact information or otherwise attempt to mislead others as to the identity of the sender or the origin of the message; (ii) in connection with any telemarketing, commercial messages, advertisements or solicitations, junk email, junk phone messages, spamming or any unsolicited messages (commercial or otherwise); or (iii) in any manner which violates or facilitates the violation of any law, statute, ordinance, rule or regulation, (including without limitation the CAN-SPAM Act, the Telephone Consumer Protection Act, the Do-Not Call Implementation Act, the Health Insurance Portability and Accountability Act, laws governing export control, and any related rules or regulations). B. Under no circumstances will SINGLEWIRE or any of its licensors or suppliers be responsible for any loss, damage or liability arising out of any Notification Content, including any mistakes or other errors contained in the Notification Content, the use or transmission of any Notification or Notification Content, or the failure of any Notification or Notification Content to reach its intended recipients. C. You agree to maintain all security regarding Your Software account ID, password, and connectivity with the Software. You are responsible for all Notifications transmitted through the Software. If Your account ID or password is stolen or otherwise compromised, and used for malicious purposes, You are responsible for all Notifications sent using the stolen account information. D. You acknowledge and agree that the Software is...
Your Use of the Software. To the extent of a conflict between the provisions of this End User License Agreement and a separate signed agreement, the separate signed agreement shall control and have precedence.
Your Use of the Software. KO Wellness’s
Your Use of the Software. We grant you a limited right to use our Software only for business and professional purposes. Your Affiliates, third party agents, contractors or service providers may use the Software as Users under your account, provided that you shall take full responsibility for such third partiescompliance with this Agreement.
Your Use of the Software. 6.1 When you use our Software, you must: (a) comply with all applicable laws and our reasonable directions from time to time; (b) keep all of your Account registration information up to date and current; (c) ensure all information you submit to us or upload to our Software or on your Account is true and correct and does not infringe the rights (including intellectual property rights) of any other person; (d) not use our Software for any unlawful purpose or do any act that we deem in our absolute discretion to be inappropriate; (e) not do any act that would constitute a breach of either the privacy, proprietary or other rights of any other person; (f) not introduce any computer code or routine that is harmful, destructive, disabling or which assists in or enables theft, alteration, denial of service, unauthorised use, disclosure or destruction or corruption of data, including viruses, worms, spyware, adware, key loggers, Trojans or any types of programmed threats that may be harmful, or other elements of software used to prevent unauthorised access and use; (g) comply with any of our policies or procedures regarding use of our Software and our Website as notified to you by us from time to time; (h) maintain and safeguard the privacy and security of all Personal Information or confidential information that you obtain access to through using to our Software; (i) be responsible for, and bear all costs of, installing and maintaining your own systems and equipment necessary to access and use our Software; (j) not access information or perform services relating to any other person in connection with our Software; (k) not reproduce the software, unless the XXXX permits it; (l) not modify, adapt or create new works from the Software; (m) notify us immediately in writing of any unauthorised use of your account or any other breach of security you become aware of in relation to your account by sending an email to: xxxxxxx@xxxxxxxx.xxx; and (n) not use our Software to send or post any unsolicited messages or any offensive, inflammatory, defamatory, sexually explicit, threatening, abusive, hateful, racist, obscene, fraudulent, deceptive or otherwise unlawful information.
Your Use of the Software. 2.1 We grant you the right to access an existing implementation or use your custom-built version of the Software via the Site/Website for the agreed license period. This right is non‐exclusive and non- transferable and limited by these Terms. 2.2 In order to use the Software, you must first agree to these Terms. You may not use the Software if you do not accept the Terms. 2.2.1 You accept these Terms upon execution and signature of this agreement by both parties. 2.3 The Software which you use may be automatically update from time to time by us. These updates are designed to improve, enhance and further develop the Software and may take the form of bug fixes, enhanced functions, new software modules and completely new versions. You agree to receive such updates (and permit us to deliver these to you) as part of your use of the Software/Site.
AutoNDA by SimpleDocs

Related to Your Use of the Software

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • The Software The End User shall be granted to receive one copy of the Software and the Documentation and to load, install and properly use the Software for the maximum number of servers and users or workflows determined in the Form of Agreement and under the terms and conditions of this XXXX and the ELP. The Form of Agreement contains specific conditions valid for the agreement between the Licensor and the End User for the specific license. References to this XXXX within the present document include the reference to the Form of Agreement concluded with the End User. The Software Licenses defined, described in this document give the rights solely for the Eventus software and no other software or hardware or any other kind of components, unless otherwise stated.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • Malicious Software The Contractor or subcontractors that discover and isolate malicious software in connection with a reported cyber incident shall submit the malicious software in accordance with instructions provided by the Contracting Officer.

  • Software Warranty We warrant that the Tyler Software will perform without Defects during the term of this Agreement. If the Tyler Software does not perform as warranted, we will use all reasonable efforts, consistent with industry standards, to cure the Defect in accordance with the maintenance and support process set forth in Section C(9), below, the SLA and our then current Support Call Process.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!