Ancillary Software License Sample Clauses

An Ancillary Software License clause defines the terms under which additional or supporting software, provided alongside a primary product or service, may be used by the licensee. This clause typically specifies the scope of permitted use, any restrictions, and the rights retained by the software provider, such as prohibiting reverse engineering or redistribution. Its core function is to ensure that both parties clearly understand the limitations and permissions regarding the use of supplementary software, thereby reducing the risk of unauthorized use or intellectual property disputes.
Ancillary Software License. In the event the services purchased include any ancillary software products for exclusive use with RICOH Supervisor (for example, Upload Agent) (“Ancillary Software”), then Ricoh grants you a limited, non-exclusive, non-assignable, non- sublicensable, non-transferable license to use the Ancillary Software. Such Ancillary Software license shall be on the terms and conditions of this Agreement and any license agreement provided with such Ancillary Software and only for the duration of the Service Period, as that may be extended from time to time. Your acceptance of this Subscription Agreement shall also be deemed to constitute acceptance of such Ancillary Software license. This Ancillary Software license will automatically terminate upon the expiration or termination of this Agreement. In the event of a conflict between the terms of any license provided with the Ancillary Software or this Agreement, in connection with the rights and obligations associated with the Ancillary Software, the terms of the license provided with the Ancillary Software shall prevail.
Ancillary Software License. Any firmware for the Products or ancillary embedded software provided by Calix as part of the Products, including updates or modifications to such software (collectively, “Ancillary Software”) that Calix has not made subject to separate license terms is authorized for Customer’s limited end use with the Products under the following license grant, terms and restrictions. For clarity, Calix operating systems, platforms and application software are subject to separate license grants by Calix and not included in the license grant in this Section 9. (a) Calix hereby grants Customer a limited, non-exclusive, non-transferable, non-sublicensable, revocable license to use the Ancillary Software solely for Customer’s internal business end use in conjunction with the Products for so long as the Products are deployed by Customer. Customer shall not, and shall not authorize any third party to, (i) transfer, copy, modify or distribute the Ancillary Software, (ii) decompile, reverse engineer or otherwise gain access to Ancillary Software source code, or unbundle embedded Ancillary Software from any Product, (iii) permit any third party to access or use the Ancillary Software, or (iv) remove or alter any copyright or trademark notice. Customer shall not modify or copy any Product Documentation. Any reference in this Agreement to purchase or sale of Ancillary Software means the acquiring or granting of this license. Customer acknowledges that except for the above license, Calix retains all right, title and interest in and to the Ancillary Software. If any derivative work is created by Customer from the Ancillary Software, Calix or its licensors shall own all right, title and interest in such derivative work(s). Customer acknowledges that the Ancillary Software and documentation constitute Calix Confidential Information and Customer agrees to abide by the confidentiality provisions of this Agreement in the use and handling of the Ancillary Software and documentation. Customer’s use of the Ancillary Software in accordance with the terms and restrictions are subject to Calix’s audit rights under this Agreement. (b) THE ANCILLARY SOFTWARE IS PROVIDED “AS IS” TO THE FULLEST EXTENT PERMITTED BY LAW. CALIX EXPRESSLY DISCLAIMS ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WARRANTIES OF QUALITY, PERFORMANCE, MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, CONFORMITY TO ANY REPRESENTATION OR DESCRIPTION, NON-INFRINGEMENT, TITLE, AND OWNERSHIP. CALIX DOES NOT WARRANT THAT ...

Related to Ancillary Software License

  • Software License The SOFTWARE is protected by copyright laws and international copyright treaties, as well as other intellectual property laws and treaties. The SOFTWARE is licensed, not sold.

  • Software Licence The following licence terms apply whether HP provides software to Customer as part of a managed service or as a separate software transaction.

  • Software Licenses Seller has all necessary licenses to use all material third-party software used in Seller's business, and Seller's use of third-party software does not infringe the rights of any Person.

  • Third Party Software The Software may contain third party software which requires notices and/or additional terms and conditions. Such required Third Party Software notices and/or additional terms and conditions are located at ▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇-third-party/ (or a successor website thereto) and are made a part of and incorporated by reference into this Agreement.

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.