Limited Use Proprietary Programs Sample Clauses

POPULAR SAMPLE Copied 4 times
Limited Use Proprietary Programs. If the Deployment Programs listed in section A are used for internet hosting purposes as specified in section F.2, they are limited use proprietary programs and may only be used with your proprietary application(s) as defined on Exhibit D, Proprietary Application Hosting Registration Form.
Limited Use Proprietary Programs. The programs listed in section A are limited use proprietary programs. These programs may only be used with your proprietary application(s) as defined on the attached Proprietary Application Hosting Registration Form
Limited Use Proprietary Programs. The following programs listed in section A above and marked with an asterisk (*) are limited use proprietary programs: Oracle Database Enterprise Edition—Processor Perpetual—Limited Use Proprietary* and Internet Application Server Java Edition—Processor Perpetual -Limited Use Proprietary*. These programs may only be used with your proprietary application, NetSuite, as defined on Exhibit A, Proprietary Application Hosting Registration Form. [**].
Limited Use Proprietary Programs. If the Deployment Programs listed in section A are used for internet hosting purposes as specified in section F.2, they are limited use proprietary programs and may only be used with your proprietary application(s) as defined on Exhibit D, Proprietary Application Hosting Registration Form. Technical Contact ▇▇▇▇ ▇▇▇▇▇▇▇▇ Contract Administrator ▇▇▇▇ ▇▇▇▇▇▇▇▇ Location ▇▇▇▇ ▇▇▇▇▇▇ ▇▇▇▇▇ ▇▇▇▇▇ ▇▇▇ ▇▇▇ ▇▇▇▇▇, ▇▇ ▇▇▇▇▇ Location ▇▇▇▇ ▇▇▇▇▇▇ ▇▇▇▇▇ ▇▇▇▇▇ ▇▇▇ ▇▇▇ ▇▇▇▇▇, ▇▇ ▇▇▇▇▇ Phone ▇▇▇.▇▇▇.▇▇▇▇ Phone ▇▇▇.▇▇▇.▇▇▇▇ Email Address ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇.▇▇▇ Email Address ▇▇▇▇▇▇▇▇@▇▇▇▇▇▇▇▇.▇▇▇ This quote is valid through October 31, 2007, and shall become binding upon execution by you and acceptance by Oracle. Signature /s/ ▇▇▇▇▇ ▇▇▇▇▇▇▇▇ Signature /s/ ▇▇▇▇▇▇ ▇. ▇▇▇▇▇ Name ▇▇▇▇▇ ▇▇▇▇▇▇▇▇ Name ▇▇▇▇▇▇ ▇. ▇▇▇▇▇ Title CFO Title Manager, License Contracts Signature Date 31-Oct-07 Signature Date October 31, 2007 Effective Date 31-Oct-07 (to be completed by Oracle) Oracle Database Enterprise Edition – Processor 1 [**] [**] Oracle Real Application Clusters – Processor 1 [**] [**] Oracle Partitioning – Processor 1 [**] [**] Oracle Diagnostic Management Pack – Processor 1 [**] [**] Oracle Tuning Management Pack – Processor 1 [**] [**] Internet Application Server Java Edition – Processor 1 [**] [**] Coherence Grid Edition – Processor 1 [**] [**] Coherence Real Time Client – Processor 1 [**] [**] Data Mining – Processor 1 [**] [**] Oracle Database Enterprise Edition [**] Processor 14437688 Internet Application Server Java Edition [**] Processor 14437688 Oracle Database Enterprise Edition [**] Processor 14437688 Oracle Database Enterprise Edition [**] Processor 14437688 Oracle Database Enterprise Edition [**] Processor 15487628 Internet Application Server Java Edition [**] Processor 15487628 Internet Application Server Java Edition [**] Processor 13489791 [**] – Confidential treatment has been requested for the bracketed portions. The confidential redacted portion has been omitted and filed separately with the Securities and Exchange Commission. USA Oracle Database Enterprise Edition [**] Processor Oracle Real Application Clusters [**] Processor Oracle Partitioning [**] Processor Oracle Diagnostic Management Pack [**] Processor Oracle Tuning Management Pack [**] Processor Internet Application Server Java Edition [**] Processor Coherence Grid Edition [**] Processor Coherence Real Time Client [**] Processor Data Mining [**] Processor [**] – Confidential treatment has been requested for t...

Related to Limited Use Proprietary Programs

  • Proprietary Property All modeling algorithms, tools, computer programs, know-how, methodologies, processes, technologies, ideas, concepts, skills, routines, subroutines, operating instructions and other materials and aides used in performing the duties set forth in Section 2.02 that relate to advice regarding current and potential Assets, and all modifications, enhancements and derivative works of the foregoing.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

  • Contract Database Metadata Elements Title: Sayville Union Free School District and Sayville Union Free School Custodial and Maintenance Employees Unit, United Public Service Employees Union (UPSEU), Local 424 (2011) Employer Name: Sayville Union Free School District Union: Sayville Union Free School Custodial and Maintenance Employees Unit, United Public Service Employees Union (UPSEU) Local: 424 Effective Date: 07/01/2011 Expiration Date: 06/30/2015 PERB ID Number: 6131 Unit Size: 55 Number of Pages: 24 For additional research information and assistance, please visit the Research page of the Catherwood website - ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇▇▇▇.▇▇▇/library/research/ For additional information on the ILR School - ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇▇▇▇.▇▇▇/ 55 People TABLE OF CONTENTS ARTICLE Page XXII ANNUAL LEAVE DAYS 14 XXV BREAKS 18 XXVI CIVIL SERVICE LAW ARTICLE SECTION 75 18 XXVIII DURATION 19 XIV EMERGENCY WORK 11 XXI FOUL WEATHER CLOTHING 14 XI GRIEVANCE PROCEDURE 9 XVI HIGHER JOB CLASSIFICATION 12 XVIII HOLIDAYS 13 XV HOLIDAY AND WEEKEND BUILDING CHECKS 12 V INSURANCE 4 X LAYOFF, DISPLACEMENT AND RECALL ORDER 8 VII MANAGEMENT RIGHTS 7 XXVII MISCELLANEOUS 19 XVII NOTICES OF PROMOTIONS 13 XIII OVERTIME 10 II PAYROLL DEDUCTIONS 1 III PERSONNEL FILES 2 XXIV PHYSICAL EXAMINATIONS 18 XXIII RETIREMENT 16 IX STRIKES AND LOCKOUTS 7 XIX VACATIONS 13 XX VISITATION 14 IV WAGES 3 VI WORKERS' COMPENSATION 6 XII WORKWEEK 10 VIII WRITTEN BOARD POLICY 8 APPENDIX A 20 4/20/2016 AGREEMENT made and entered into this day of November 2013 between the SAYVILLE UNION FREE SCHOOL DISTRICT (hereinafter referred to as the “District”) and United Public Service Employees Union, ▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇, ▇▇▇▇▇▇▇▇▇▇, N.Y. 11779 (hereinafter referred to as the “Union”).

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by ▇▇▇▇▇▇▇, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, ▇▇▇▇▇▇▇ will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section.