Pencom Use of Tivoli Sample Clauses

Pencom Use of Tivoli. Software Code and License Grant. Tivoli will deliver to Pencom Tivoli Object or Source Code and related documentation Software Products to the extent and as defined and required for in the Work Statement. Tivoli Software Products are provided to Pencom with the following limited license grant. Tivoli grants Pencom a non-exclusive, non-transferable, license to use the Software Products for internal use only for the purpose of development, enhancement, testing, and delivery of software product Deliverables as defined in the Work Statement and for Pencom maintenance support of the Pencom-supplied Tivoli Deliverable product or for subsequent work for Tivoli as the parties may agree by mutual written agreement and amendment hereto. Pencom may install and use Software Products on a Tivoli Server(s) and Licensed Computers only in the maximum number of copies of each Software Product as provided by Tivoli. The Tivoli Server host identification number and the number of licensed copies of each Software Product which are to be used are confirmed between Tivoli and Pencom in the License Key Certificate (License Key Request) Form which and which accompanies delivery of the Software Products. Pencom may also make a reasonable number of copies of the Software in machine-readable form solely for archive or backup purposes in accordance with Pencom's standard archive or backup policies and procedures. Except as provided in the Software documentation relating to Toolkits, Pencom is not authorized to modify, adapt trsnslate, or create derivative works based upon, in whole or in part any Software Products, or to reverse compile or disassemble the Software. Pencom may use Toolkits or Developed Program(s) only on Licensed Computers which are operating one or more suitably licensed Tivoli Software Products. The rights granted Pencom hereunder are restricted exclusively to Pencom and such license and use rights, Software Products, or Developed Programs may not be assigned, sub-leased, sub-licensed, sold or otherwise transferred.

Related to Pencom Use of Tivoli

  • Misuse of TINs If the requester discloses or uses TINs in violation of federal law, the requester may be subject to civil and criminal penalties. Specific Instructions Line 1

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at ▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/aupdetail.html • The UC Policy on Copyright Ownership: ▇▇▇▇://▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of School Equipment The Association shall have the right to use school facilities and equipment, including computer hardware, peripherals, software, duplicating equipment, calculating machines and all types of audiovisual equipment at reasonable times, when such equipment is not otherwise in use. Use of school equipment to be used without charge and within reason.