Other Uses Even if Customer opts out of PEP, the Software monitors, records, and reports to Sage information about the installation and use of the Software, including, but not limited to, information about Customer’s devices and the frequency, type, and manner of use to which the Software is put. Customer acknowledges that Sage may collect, use, and disclose the information as described in the Sage Privacy Notice posted at ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/en-us/legal/privacy-and-cookies/ (if you are contracting with Sage Software, Inc.) or ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/en-ca/legal/privacy-and-cookies/ (if you are contracting with Sage Software Canada Ltd.), or such other URL as Sage may notify Customer of, and as may be described in the user interface associated with the applicable features.
Permitted Uses BA shall use Protected Information only for the purpose of performing BA’s obligations under the Contract and as permitted or required under the Contract and Addendum, or as required by law. Further, BA shall not use Protected Information in any manner that would constitute a violation of the Privacy Rule or the HITECH Act if so used by CE. However, BA may use Protected Information as necessary (i) for the proper management and administration of BA;
Authorized Uses The Participating Institutions and the Authorized Users may make all use of the Licensed Materials as is consistent with the applicable law and with this Agreement, including but not limited to the following licensing conditions ("Authorized Uses"). In addition, the Licensed Materials may be used for purposes of research, education or other non-commercial use as particularly follows:
License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not ▇▇▇, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.
Third Party Use You may allow your agents, contractors and outsourcing service providers (each a “Permitted Third Party”) to use the Product(s) licensed to you hereunder solely for your benefit in accordance with the terms of this ▇▇▇▇ and you are responsible for any such Permitted Third Party’s compliance with this ▇▇▇▇ in such use. Any breach by any Permitted Third Party of the terms of this ▇▇▇▇ will be considered your breach.