Examples of Access Product in a sentence
You shall promptly notify Us upon becoming aware of any unauthorised access to or use of any Access Product and provide all reasonable assistance to Us to bring an end to such unauthorised access or use.
Nothing in this clause shall prevent You from configuring interfaces and other elements in an Access Product which are intended by the parties to be configured by You.
Core Terms at Schedule 1: these govern the relationship between Us and You across any Access Product.
You agree that You must not attempt to (nor permit any third party, or agree to use any systems, process or software) intended to in any way remove or circumvent any security devices present within an Access Product.
If the material breach is not remedied the party may, without prejudice to its other rights and remedies and at its option, terminate the Agreement or any affected element of the Access Product by a further Notice to the other party.
You have no right to perform penetration testing on any Access Product without Our prior written consent which will be subject to a specific penetration test access agreement.
You acknowledge that You have no right to have any Access Product in source code form or in unlocked coding of any kind.
For the avoidance of doubt, the parties’ respective obligations to each other with respect to any Third Party Actions arising out of, in connection with or relating to either party’s sale or use of any Product or Preferred Access Product shall be as set forth in the Preferred Partnership Agreement for such Product or the supply agreement for such Preferred Access Product, respectively.
If the material breach is not remedied the party affected by the breach may, without prejudice to its other rights and remedies and at its option, terminate the Agreement or any affected element of the Access Product by a further Notice to the other party.
Except to the extent such actions cannot be prevented, You, any Authorised User and any Permitted User, shall not (nor permit any third party to) disassemble, decompile, modify, support, maintain, adapt, reverse engineer, merge or make error corrections to any Access Product, in whole or in part, or in any way expose the source code, instruction sequences, internal logic, protocols, or algorithms of any Access Product.