Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
License Restrictions Licensor reserves all rights not expressly granted to You. The Software is licensed for Your internal use only. Except as this Agreement expressly allows, You may not (1) copy (except for back-up purposes), modify, alter, create derivative works, reverse engineer, decompile, or disassemble the Software except and only to the extent expressly permitted by applicable law; (2) transfer, assign, pledge, rent, timeshare, host or lease the Software, or sublicense any of Your license grants or rights under this Agreement; in whole or in part, without prior written permission of Licensor; (3) remove any patent, trademark, copyright, trade secret or other proprietary notices or labels on the Software or its documentation; or (4) disclose the results of any performance, functional or other evaluation or benchmarking of the Software to any third party without the prior written permission of Licensor. Hosting Restrictions. In the event that You desire to have a third party manage, host (either remotely or virtually) or use the Software on Your behalf, You shall (1) first enter into a valid and binding agreement with such third party that contains terms and conditions to protect Licensor’s rights in the Software that are no less prohibitive and/or restrictive than those contained in this Agreement, including, without limitation, the Verification section below; (2) prohibit use by such third party except for the sole benefit of You; and (3) be solely responsible to Licensor for any and all breaches of the above terms and conditions by such third party.
General Prohibitions Subject to and except as permitted by Sections 6.3(b) and 6.3(h), until the earlier of the termination of this Agreement pursuant to Article VIII hereof and the Effective Time, the Company shall not, nor shall it authorize or permit any of its Subsidiaries or any of its or their respective directors, officers or employees to, and the Company shall use its reasonable best efforts to cause its investment bankers, financial advisors, attorneys, accountants or other advisors, agents or representatives (collectively, “Representatives”) to, directly or indirectly, (i) solicit, initiate, or knowingly encourage or facilitate, any inquiries with respect to or the making of any proposal that constitutes or is reasonably likely to lead to a Takeover Proposal or any public announcement by any Third Party of any Takeover Proposal or of any intention to make the same, (ii) enter into or participate in any discussions or negotiations regarding any Takeover Proposal, furnish to any Third Party any non-public information (whether orally or in writing) in response to or in furtherance of any Takeover Proposal (for avoidance of doubt, it being hereby acknowledged and agreed that the foregoing shall not prohibit the Company or any of its Representatives from making any Third Party aware of the provisions of this Section 6.3 in response to any Takeover Proposal, nor shall the foregoing prohibit the Company from engaging in discussions with its Representatives to the extent necessary to assist the Company in determining how to comply with the provisions of this Section 6.3 and applicable Law), or afford any Third Party access to the business, properties, assets, books or records of the Company or any of its Subsidiaries, otherwise cooperate in any way with, or knowingly assist, participate in, facilitate or encourage any effort by, any Third Party that has made, or has informed the Company of any intention to make, or who has publicly announced an intention to make, a Takeover Proposal, (iii) recommend, adopt or approve, or publicly propose to recommend, adopt or approve, a Takeover Proposal, or fail to make in accordance with Section 6.1(a)(ii), withdraw or modify or resolve to take any action or make any public statement inconsistent with the Company Offer Recommendation or Company Merger Recommendation (any of the foregoing in this clause (iii), a “Company Adverse Recommendation Change”), (iv) take any action to make the provisions of any “fair price,” “moratorium,” “control share acquisition,” “business combination” or other similar anti-takeover statute or regulation (including approving any transaction for purposes of or approving a Third Party becoming an “interested stockholder” under Section 203 of the DGCL), or any restrictive provision of any applicable anti-takeover provision in the Company’s certificate of incorporation or bylaws, inapplicable to any transactions contemplated by a Takeover Proposal, (v) enter into any Takeover Proposal (other than a confidentiality agreement of the type referred to in Section 6.3(b)) or (vi) grant any Third Party any waiver or release under any standstill or similar agreement with respect to any class of equity securities of the Company or any of its Subsidiaries. Without limiting the foregoing, it is agreed that any violation of the restrictions on the Company set forth in the preceding sentence by any Representative of the Company or any of its Subsidiaries shall be a breach of this Section 6.3.
Use Restriction (a) If a natural disaster, incident or any other emergency situation occurs or is likely to occur, SORACOM may restrict the use of the SORACOM Air Global Service by the Subscriber in order to give priority to communications whose content are necessary for the prevention of or relief from calamities, for the securing of transportation, communications or electric power supply, the maintenance of public order or any other public interest. (b) If SORACOM detects any significant and/or continuous signal or transmission using a communication procedure or application which occupies the communication band used by SORACOM, SORACOM may control the transmission rate and traffic of such signal or transmission by controlling the communication band allocated to such signal or transmission. (c) SORACOM may suspend or limit the use of the SORACOM Air Global Service by the Subscriber, if: (i) the Subscriber delays in performing or fails to perform any payment obligation or any other obligation under the Agreement; (ii) the Subscriber gives a false information to SORACOM; (iii) SORACOM deems that the Subscriber violates Section 13.1 below; (iv) the Subscriber falls under any of the items of Section 3.2; (v) the credit card account designated by the Subscriber is invalid, unavailable or cannot be used or recognized; or
Usage Restrictions Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.