Other Use Restrictions and Prohibitions Sample Clauses

Other Use Restrictions and Prohibitions. You shall not, directly or indirectly: Decompile, disassemble or reverse engineer the Software or modify, unbundle, or create derivative works based on the Software, except as expressly permitted by applicable law without the possibility of contractual waiver. If the law requires Versa to provide interface information to You to adapt the Software, Versa, at its option, may either (A) provide the information to You subject to Your acceptance of non- disclosure and use limitation terms that Versa reasonably requires, or (B) perform that adaptation itself at a reasonable charge for services. Detach or separate any libraries, files, modules or other components embedded within a Software product or within a particular software image you have received even if any such library, file, module or other component is separately licensable, or use any such modules, files or other components separately from the Software product or software image in which it is embedded (except to the extent that a documented feature of the Software product is implemented by doing so); Furnish any copy of the Software or other means of access to the Software to any third party other than to Your contractor(s) solely for Your benefit in performing its contract services for You and in that case only if that contractor has agreed to adhere to the terms of this Agreement. If You do furnish Software or access to Software to Your contractor(s), You shall remain fully and primarily responsible to Versa for compliance with all provisions of this Agreement; Remove (or, if the license includes the right to make copies of the Software, fail to include in those copies) any readme files notices, disclaimers, marks and labels included in the Software as delivered by Versa; or Use or allow use of the Software in violation of any applicable law or regulation or to support or facilitate any illegal activity.
Other Use Restrictions and Prohibitions. Neither You nor Your Named Users shall, directly or indirectly: (i) Decompile, disassemble or reverse engineer the Software or modify, unbundle, or create derivative works based on the Software, except as expressly permitted by applicable law without the possibility of contractual waiver. If the law requires Pulse Secure to provide interface information to You to adapt the Software, Pulse Secure, at its option, may either (A) provide the information to You subject to Your acceptance of non-disclosure and use limitation terms that Pulse Secure reasonably requires, or (B) perform that adaptation itself at a reasonable charge for services; (ii) Copy the Software except for archival purposes or as necessary for You to install and make use of the Software as expressly licensed by Pulse Secure; (iii) Detach or separate any libraries, files, modules or other components embedded within a Software product or within a particular software image You have received even if any such library, file, module or other component is separately licensable, or use any such modules, files or other components separately from the Software product or software image in which it is embedded (except to the extent that a documented feature of the Software product is implemented by doing so); (iv) Furnish any copy of the Software or other means of access to the Software to any third party other than to Your contractor(s) solely for Your benefit in performing contract services for You and in that case only if that contractor has agreed to adhere to the terms of this Agreement. If You do furnish Software or access to Software to Your contractor(s), You shall remain fully and primarily responsible to Pulse Secure for compliance with all provisions of this Agreement; (v) Remove (or, if the license includes the right to make copies of the Software, fail to include in those copies) any readme files notices, disclaimers, marks and labels included in the Software as delivered by Pulse Secure; (vi) Use or allow use of the Software in violation of any applicable law or regulation or to support or facilitate any illegal activity; (vii) Use the Software or allow anyone else to use the Software for benchmarking or other testing not related to Your internal use; (viii) Attempt to gain unauthorized access to the Software or its related systems or networks; (ix) Copy any ideas, features or functions or graphics of the Software; or
Other Use Restrictions and Prohibitions. Versa uses the Versa Operating System™ (VOS™) software, Versa Client, and other components to its Platform. You must not, directly or indirectly: 1. Decompile, disassemble, or reverse engineer the Platform, or modify, unbundle, or create derivative works based on the Platform, except as expressly permitted by Versa. 2. If the applicable law requires Versa to provide interface information to You to adapt the Platform, Versa may, at its option: (A) Provide the information to You, subject to your acceptance of non-disclosure and use limitation terms that Versa reasonably requires, or o (B) Perform the adaptation itself at a reasonable charge for services. 3. Detach or separate any libraries, files, modules, or other components embedded within the Platform, even if they are separately licensable. You may only use these components separately if it is a documented feature of Your Subscription plan. 4. Provide copies or access to the Platform to any third party, except to Your authorized contractors who are performing services for You. These contractors must adhere to the terms of this Agreement. You remain fully (i) responsible for ensuring their compliance with this Agreement and (ii) liable for their act or omissions resulting any loss or damages to Versa or its licensors. 5. Remove or fail to include any readme files, notices, disclaimers, marks, or labels included in the Platform as delivered by Versa, especially if Your subscription allows you to make copies. 6. Use or allow the use of the Platform in violation of any applicable law or regulation, or to support or facilitate any illegal activity.
Other Use Restrictions and Prohibitions. You shall not, directly or indirectly: • Decompile, disassemble or reverse engineer the Software or modify, change, unbundle, or create derivative works based on the Software, except as expressly permitted by applicable law without the possibility of contractual waiver. If the law requires Juniper to provide interface information to You to adapt the Software, Juniper, at its option, may either (A) provide the information to You subject to Your acceptance of non-disclosure and use limitation terms that Juniper reasonably requires, or
Other Use Restrictions and Prohibitions. You shall not, directly or indirectly:  Decompile, disassemble or reverse engineer the Software or modify, unbundle, or create derivative works based on the Software, except as expressly permitted by applicable law without the possibility of contractual waiver.  Copy the Software except for archival purposes or as necessary for You to install and make use of the Software as expressly licensed by Pulse Secure.  Detach or separate any libraries, files, modules or other components embedded within a Software product or within a particular software image You have received even if that any such library, file, module or other component is separately licensable, or use any such modules, files or other components separately from the Software product or software image in which it is embedded (except to the extent that a documented feature of the Software product is implemented by doing so);  Furnish any copy of the Software or other means of access to the Software to any third party other than to Your contractor(s) solely for Your benefit in performing its contract services for You and in that case only if that contractor has agreed to adhere to the terms of this Agreement. If You do furnish Software or access to Software to Your contractor(s), You shall remain fully and primarily responsible to Pulse Secure for compliance with all provisions of this Agreement;  Remove (or, if the license includes the right to make copies of the Software, fail to include in those copies) any readme files notices, disclaimers, marks and labels included in the Software as delivered by Pulse Secure; or  Use or allow use of the Software in violation of any applicable law or regulation or to support or facilitate any illegal activity.
Other Use Restrictions and Prohibitions. Neither You nor Your Named Users shall, directly or indirectly: (i) Decompile, disassemble or reverse engineer the Software or modify, unbundle, or create derivative works based on the Software, except as expressly permitted by applicable law without the possibility of contractual waiver. If the law requires 3rd Eye to provide interface information to You to adapt the Software, 3rd Eye, at its option, may either (A) provide the information to You subject to Your acceptance of non- disclosure and use limitation terms that 3rd Eye reasonably requires, or (B) perform that adaptation itself at a reasonable charge for services; (i) Copy the Software except for archival purposes or as necessary for You to install and make use of the Software as expressly licensed by 3rd Eye;

Related to Other Use Restrictions and Prohibitions

  • Use Restrictions (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.

  • License Restrictions Licensor reserves all rights not expressly granted to You. The Software is licensed for Your internal use only. Except as this Agreement expressly allows, You may not (1) copy (except for back-up purposes), modify, alter, create derivative works, reverse engineer, decompile, or disassemble the Software except and only to the extent expressly permitted by applicable law; (2) transfer, assign, pledge, rent, timeshare, host or lease the Software, or sublicense any of Your license grants or rights under this Agreement; in whole or in part, without prior written permission of Licensor; (3) remove any patent, trademark, copyright, trade secret or other proprietary notices or labels on the Software or its documentation; or (4) disclose the results of any performance, functional or other evaluation or benchmarking of the Software to any third party without the prior written permission of Licensor. Hosting Restrictions. In the event that You desire to have a third party manage, host (either remotely or virtually) or use the Software on Your behalf, You shall (1) first enter into a valid and binding agreement with such third party that contains terms and conditions to protect Licensor’s rights in the Software that are no less prohibitive and/or restrictive than those contained in this Agreement, including, without limitation, the Verification section below; (2) prohibit use by such third party except for the sole benefit of You; and (3) be solely responsible to Licensor for any and all breaches of the above terms and conditions by such third party.

  • General Prohibitions Subject to and except as permitted by Sections 6.3(b) and 6.3(h), until the earlier of the termination of this Agreement pursuant to Article VIII hereof and the Effective Time, the Company shall not, nor shall it authorize or permit any of its Subsidiaries or any of its or their respective directors, officers or employees to, and the Company shall use its reasonable best efforts to cause its investment bankers, financial advisors, attorneys, accountants or other advisors, agents or representatives (collectively, “Representatives”) to, directly or indirectly, (i) solicit, initiate, or knowingly encourage or facilitate, any inquiries with respect to or the making of any proposal that constitutes or is reasonably likely to lead to a Takeover Proposal or any public announcement by any Third Party of any Takeover Proposal or of any intention to make the same, (ii) enter into or participate in any discussions or negotiations regarding any Takeover Proposal, furnish to any Third Party any non-public information (whether orally or in writing) in response to or in furtherance of any Takeover Proposal (for avoidance of doubt, it being hereby acknowledged and agreed that the foregoing shall not prohibit the Company or any of its Representatives from making any Third Party aware of the provisions of this Section 6.3 in response to any Takeover Proposal, nor shall the foregoing prohibit the Company from engaging in discussions with its Representatives to the extent necessary to assist the Company in determining how to comply with the provisions of this Section 6.3 and applicable Law), or afford any Third Party access to the business, properties, assets, books or records of the Company or any of its Subsidiaries, otherwise cooperate in any way with, or knowingly assist, participate in, facilitate or encourage any effort by, any Third Party that has made, or has informed the Company of any intention to make, or who has publicly announced an intention to make, a Takeover Proposal, (iii) recommend, adopt or approve, or publicly propose to recommend, adopt or approve, a Takeover Proposal, or fail to make in accordance with Section 6.1(a)(ii), withdraw or modify or resolve to take any action or make any public statement inconsistent with the Company Offer Recommendation or Company Merger Recommendation (any of the foregoing in this clause (iii), a “Company Adverse Recommendation Change”), (iv) take any action to make the provisions of any “fair price,” “moratorium,” “control share acquisition,” “business combination” or other similar anti-takeover statute or regulation (including approving any transaction for purposes of or approving a Third Party becoming an “interested stockholder” under Section 203 of the DGCL), or any restrictive provision of any applicable anti-takeover provision in the Company’s certificate of incorporation or bylaws, inapplicable to any transactions contemplated by a Takeover Proposal, (v) enter into any Takeover Proposal (other than a confidentiality agreement of the type referred to in Section 6.3(b)) or (vi) grant any Third Party any waiver or release under any standstill or similar agreement with respect to any class of equity securities of the Company or any of its Subsidiaries. Without limiting the foregoing, it is agreed that any violation of the restrictions on the Company set forth in the preceding sentence by any Representative of the Company or any of its Subsidiaries shall be a breach of this Section 6.3.

  • Use Restriction (a) If a natural disaster, incident or any other emergency situation occurs or is likely to occur, SORACOM may restrict the use of the SORACOM Air Global Service by the Subscriber in order to give priority to communications whose content are necessary for the prevention of or relief from calamities, for the securing of transportation, communications or electric power supply, the maintenance of public order or any other public interest. (b) If SORACOM detects any significant and/or continuous signal or transmission using a communication procedure or application which occupies the communication band used by SORACOM, SORACOM may control the transmission rate and traffic of such signal or transmission by controlling the communication band allocated to such signal or transmission. (c) SORACOM may suspend or limit the use of the SORACOM Air Global Service by the Subscriber, if: (i) the Subscriber delays in performing or fails to perform any payment obligation or any other obligation under the Agreement; (ii) the Subscriber gives a false information to SORACOM; (iii) SORACOM deems that the Subscriber violates Section 13.1 below; (iv) the Subscriber falls under any of the items of Section 3.2; (v) the credit card account designated by the Subscriber is invalid, unavailable or cannot be used or recognized; or

  • Usage Restrictions Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.