Common use of Prohibited Use Clause in Contracts

Prohibited Use. Custodian may monitor use of the Services and the resulting information may be used, reviewed, retained, and disclosed by Custodian in aggregated and non-identifiable forms for its legitimate business purposes or in accordance with Applicable Law. Client will not, directly or indirectly: (a) use the Services to upload, store or transmit any content that is infringing, libelous, unlawful, tortious, violate privacy rights, or that includes any viruses, software routines, or other code designed to permit unauthorized access, disable, erase, or otherwise harm software, hardware, or data; (b) engage in any activity that interferes with, disrupts, damages, or accesses in an unauthorized manner the Services, servers, networks, data, or other properties of Custodian or of its suppliers or licensors; (c) develop, distribute, or make available a Developer Application in any way in furtherance of criminal, fraudulent, or other unlawful activity; (d) use the Services, for the benefit of anyone other than Client or end customer of any Developer Application; (e) sell, resell, license, sublicense, distribute, rent, or lease any Services, or include any Services in a services bureau or outsourcing offering; (f) circumvents a contractual usage limit; (g) obscure, remove, or destroy any copyright notices, proprietary markings or confidential legends provided with the Services; (h) use the Services to build a competitive product or service; (i) distribute a Developer Application in source code form in a manner that would disclose the source code of the Services; (j) reverse engineer, decrypt, decompile, decode, disassemble, or otherwise attempt to obtain the human readable form of the Services, to the extent such restriction is permitted by Applicable Law; or (k) engage in any of the prohibited practices set forth at h▇▇▇▇://▇▇▇.▇▇▇▇▇.▇▇▇/▇▇▇▇▇-prohibited-uses-and-businesses-terms/, as may be amended by Custodian from time to time in Custodian’s sole discretion (collectively, the “Prohibited Practices”).

Appears in 6 contracts

Sources: Custodial Services Agreement (Canary Marinade Solana ETF), Custodial Services Agreement (Canary HBAR ETF), Custodial Services Agreement (Canary Litecoin ETF)

Prohibited Use. Client acknowledges and agrees that Custodian may monitor use of the Services and the resulting information may be usedutilized, reviewed, retained, retained and or disclosed by Custodian in aggregated and non-identifiable forms for its legitimate business purposes or in accordance with Applicable Law. Client will notnot use the Services, directly or indirectlyindirectly via the Developer Application, to: (ai) use the Services to upload, store or transmit any content that is infringing, libelous, unlawful, tortious, violate privacy rights, or that includes any viruses, software routines, routines or other code designed to permit unauthorized access, disable, erase, or otherwise harm software, hardware, or data; (bii) engage in any activity that interferes with, disrupts, damages, or accesses in an unauthorized manner the Services, servers, networks, data, or other properties of Custodian or of its suppliers or licensors; (ciii) develop, distribute, or make available a the Developer Application in any way in furtherance of criminal, fraudulent, or other unlawful activity; (div) make the Services available to, or use the Services, any Services for the benefit of of, anyone other than Client or end customer users of any the Developer Application; (ev) sell, resell, license, sublicense, distribute, rent, rent or lease any Services, or include any Services in a services Services bureau or outsourcing offering; (fvi) permit direct or indirect access to or use of any Services in a way that circumvents a contractual usage limit; (gvii) obscure, remove, or destroy any copyright notices, proprietary markings or confidential legends provided with the Serviceslegends; (hviii) use the Services to build a competitive product or service; (iix) distribute a the Developer Application in source code form in a manner that would disclose the source code of the Services; or (jx) reverse engineer, decrypt, decompile, decode, disassemble, or otherwise attempt to obtain the human readable form of the Services, to the extent such restriction is permitted by Applicable Law; or (k) engage in any of applicable law. Client will comply with the prohibited practices restrictions set forth at h▇▇▇▇://▇▇▇in Appendix 1.▇▇▇▇▇.▇▇▇/▇▇▇▇▇-prohibited-uses-and-businesses-terms/, as may be amended by Custodian from time to time in Custodian’s sole discretion (collectively, the “Prohibited Practices”).

Appears in 5 contracts

Sources: Custodial Services Agreement (SUI Group Holdings Ltd.), Custodial Services Agreement (Robert Ventures Holdings LLC), Custodial Services Agreement (Valkyrie Bitcoin Fund)

Prohibited Use. Client acknowledges and agrees that Custodian may monitor use of the Services and the resulting information may be usedutilized, reviewed, retained, retained and or disclosed by Custodian in aggregated and non-identifiable forms for its legitimate business purposes or in accordance with Applicable Law. Client will notnot use the Services, directly or indirectlyindirectly via the Developer Application, to: (ai) use the Services to upload, store or transmit any content that is infringing, libelous, unlawful, tortious, violate privacy rights, or that includes any viruses, software routines, routines or other code designed to permit unauthorized access, disable, erase, or otherwise harm software, hardware, or data; (bii) engage in any activity that materially interferes with, disrupts, damages, or accesses in an unauthorized manner the Services, servers, networks, data, or other properties of Custodian or of its suppliers or licensors; (ciii) develop, distribute, or make available a the Developer Application in any way in furtherance of criminal, fraudulent, or other unlawful activity; (div) use make the Services, for the benefit of Services available to anyone other than Client or end customer users of any the Developer Application; (ev) sell, resell, license, sublicense, distribute, rent, rent or lease any Services, or include any Services in a services Services bureau or outsourcing offering; (fvi) permit direct or indirect access to or use of any Services in a way that circumvents a contractual usage limitlimit in this Agreement; (gvii) obscure, remove, or destroy any copyright notices, proprietary markings or confidential legends provided with the Serviceslegends; (hviii) use the Services to build a competitive product or service; (iix) distribute a the Developer Application in source code form in a manner that would disclose the source code of the Services; or (jx) reverse engineer, decrypt, decompile, decode, disassemble, or otherwise attempt to obtain the human readable form of the Services, to the extent such restriction is permitted by Applicable Law; or (k) engage in any of applicable law. Client will comply with the prohibited practices restrictions set forth at h▇▇▇▇://▇▇▇in Appendix 1.▇▇▇▇▇.▇▇▇/▇▇▇▇▇-prohibited-uses-and-businesses-terms/, as may be amended by Custodian from time to time in Custodian’s sole discretion (collectively, the “Prohibited Practices”).

Appears in 2 contracts

Sources: Custodial Services Agreement (21Shares Solana ETF), Custodial Services Agreement (21Shares Core Ethereum ETF)

Prohibited Use. Custodian may monitor use Other than the rights explicitly granted in this Agreement, Licensee shall have no other rights, express or implied, in the Software Product,Cloud Services and/or any Feature. Without limiting the generality of the foregoing, with respect to each of the Software Product, Cloud Services and the resulting information may be usedFeature (collectively, reviewedincluding any part thereof, retained“Products”), Licensee agrees and disclosed by Custodian in aggregated and non-identifiable forms for its legitimate business purposes or in accordance with Applicable Law. Client will notundertakes not to, directly or indirectly: : (ai) sell, lease, sublicense or distribute the Products, or any part thereof, or otherwise transfer or allow any third party to use the Products in any manner; (ii) reverse engineer, decompile, disassemble or otherwise reduce to human-perceivable form the Products’ source code; (iii) modify, revise, enhance or alter the Products; (iv) copy or allow copies of the Products to be made except as provided under this Agreement; (v) use any backup or archival copies of the Services Products or any part thereof, or allow any third party to uploaduse such copies, for any purpose other than to replace an original copy in the event of the destruction of any Product components, if a Productbecomes defective; (vi) place any Product onto a server other than the designated server or otherwise make suchProduct accessible to other users or the public; (vii) use aProduct to provide third parties with managed services or any other services whether or not in return for remuneration of any kind; (viii) disclose the results of any testing or benchmarking of a Product to any third party; (ix) remove or alter any trademarks or other proprietary right notices displayed on or in a Product, ; (x) circumvent, disable or otherwise interfere with security-related features of a Product or features that enforce use limitations; (xi) export, make available or use a Product in any manner prohibited by applicable laws; and/or (xii) store or transmit any content that is infringingmalicious code (i.e., libeloussoftware viruses, unlawfulTrojan horses, tortiousworms, violate privacy rightsrobots, malware, spyware or other computer instructions, devices, or techniques that includes any viruseserase data or programming, software routinesinfect, or other code designed to permit unauthorized accessdisrupt, damage, disable, erase, or otherwise harm software, hardware, shut down a computer system or data; (bany component of such computer system) engage in any activity that interferes with, disrupts, damages, or accesses in an unauthorized manner the Services, servers, networks, data, or other properties of Custodian or of its suppliers or licensors; (c) develop, distribute, or make available a Developer Application in any way in furtherance of criminal, fraudulent, or other unlawful activity; (d) material in connection with a Product. For the avoidance of doubt, use of any third-party applications provided by Incredibuild with the Software Product and/or the Cloud Services is expressly limited to use in conjunction with the Software Product and/or the Cloud Services, for and may not be used independently, unless agreed otherwise between Licensee and the benefit provider of anyone other than Client or end customer the applicable third party application. In addition to the restrictions above, the use of any Developer Application; Product is subject to usage limits as defined in an applicable Quote or the Partner Order Form (e) sell, resell, license, sublicense, distribute, rent, as the case may be). Licensee will prevent unauthorized access to or lease any Services, or include any Services in a services bureau or outsourcing offering; (f) circumvents a contractual usage limit; (g) obscure, remove, or destroy any copyright notices, proprietary markings or confidential legends provided with the Services; (h) use the Services to build a competitive product or service; (i) distribute a Developer Application in source code form in a manner that would disclose the source code of the Services; (j) reverse engineer, decrypt, decompile, decode, disassemble, Products and notify Incredibuild promptly of any such unauthorized access or otherwise attempt to obtain the human readable form of the Services, to the extent such restriction is permitted by Applicable Law; or (k) engage in any of the prohibited practices set forth at h▇▇▇▇://▇▇▇use.▇▇▇▇▇.▇▇▇/▇▇▇▇▇-prohibited-uses-and-businesses-terms/, as may be amended by Custodian from time to time in Custodian’s sole discretion (collectively, the “Prohibited Practices”).

Appears in 1 contract

Sources: Incredibuild License Agreement

Prohibited Use. Custodian may monitor use of the Services and the resulting information may be used, reviewed, retained, and disclosed by Custodian in aggregated and non-identifiable forms for its legitimate business purposes or in accordance with Applicable Law. Client will not, directly or indirectly: (a) use the Services to upload, store or transmit any content that is infringing, libelous, unlawful, tortious, violate privacy rights, or that includes any viruses, software routines, or other code designed to permit unauthorized access, disable, erase, or otherwise harm software, hardware, or data; (b) engage in any activity that interferes with, disrupts, damages, or accesses in an unauthorized manner the Services, servers, networks, data, or other properties of Custodian or of its suppliers or licensors; (c) develop, distribute, or make available a Developer Application in any way in furtherance of criminal, fraudulent, or other unlawful activity; (d) use the Services, for the benefit of anyone other than Client or end customer of any Developer Application; (e) sell, resell, license, sublicense, distribute, rent, or lease any Services, or include any Services in a services bureau or outsourcing offering; (f) circumvents a contractual usage limit; (g) obscure, remove, or destroy any copyright notices, proprietary markings or confidential legends provided with the Services; (h) use the Services to build a competitive product or service; (i) distribute a Developer Application in source code form in a manner that would disclose the source code of the Services; (j) reverse engineer, decrypt, decompile, decode, disassemble, or otherwise attempt to obtain the human readable form of the Services, to the extent such restriction is permitted by Applicable Law; or (k) engage in any of the prohibited practices set forth at h▇▇▇▇://▇://▇▇▇.▇▇▇▇▇.▇▇▇/▇▇▇▇▇-prohibited/bitgo-prohibited-uses-and-businesses-terms/, as may be amended by Custodian from time to time in Custodian’s sole discretion (collectively, the “Prohibited Practices”).

Appears in 1 contract

Sources: Custodial Services Agreement (Upexi, Inc.)

Prohibited Use. Client acknowledges and agrees that Custodian may monitor use of the Services and the resulting information may be usedutilized, reviewed, retained, retained and or disclosed by Custodian in aggregated and non-identifiable forms for its legitimate business purposes or in accordance with Applicable Law. Client will notnot use the Services, directly or indirectlyindirectly via the Developer Application, to: (ai) use the Services to upload, store or transmit any content that is infringing, libelous, unlawful, tortious, violate privacy rights, or that includes any viruses, software routines, routines or other code designed to permit unauthorized access, disable, erase, or otherwise harm software, hardware, or data; (bii) engage in any activity that interferes with, disrupts, damages, or accesses in an unauthorized manner the Services, servers, networks, data, or other properties of Custodian or of its suppliers or licensors; (ciii) develop, distribute, or make available a the Developer Application in any way in furtherance of criminal, fraudulent, or other unlawful activity; (div) make the Services available to, or use the Services, any Services for the benefit of of, anyone other than Client Client, or end customer users of any the Developer Application; (ev) sell, resell, license, sublicense, distribute, rent, rent or lease any Services, or include any Services in a services Services bureau or outsourcing offering; (fvi) permit direct or indirect access to or use of any Services in a way that circumvents a contractual usage limit; (gvii) obscure, remove, or destroy any copyright notices, proprietary markings or confidential legends provided with the Serviceslegends; (hviii) use the Services to build a competitive product or service; (iix) distribute a the Developer Application in source code form in a manner that would disclose the source code of the Services; or (jx) reverse engineer, decrypt, decompile, decode, disassemble, or otherwise attempt to obtain the human readable form of the Services, to the extent such restriction is permitted by Applicable Law; or (k) engage in any of applicable law. Client will comply with the prohibited practices restrictions set forth at h▇▇▇▇://▇▇▇in Appendix 1.▇▇▇▇▇.▇▇▇/▇▇▇▇▇-prohibited-uses-and-businesses-terms/, as may be amended by Custodian from time to time in Custodian’s sole discretion (collectively, the “Prohibited Practices”).

Appears in 1 contract

Sources: Custodial Services Agreement (Hashdex Nasdaq Crypto Index US ETF)

Prohibited Use. Custodian may monitor use of the Services and the resulting information may be used, reviewed, retained, and disclosed by Custodian in aggregated and non-identifiable forms for its legitimate business purposes or in accordance with Applicable Law. Client will not, directly or indirectly: (a) use the Services to upload, store or transmit any content that is infringing, libelous, unlawful, tortious, violate privacy rights, or that includes any viruses, software routines, or other code designed to permit unauthorized access, disable, erase, or otherwise harm software, hardware, or data; (b) engage in any activity that interferes with, disrupts, damages, or accesses in an unauthorized manner the Services, servers, networks, data, or other properties of Custodian or of its suppliers or licensors; (c) develop, distribute, or make available a Developer Application in any way in furtherance of criminal, fraudulent, or other unlawful activity; (d) use the Services, for the benefit of anyone other than Client or end customer of any Developer Application; (e) sell, resell, license, sublicense, distribute, rent, or lease any Services, or include any Services in a services bureau or outsourcing offering; (f) circumvents a contractual usage limit; (g) obscure, remove, or destroy any copyright notices, proprietary markings or confidential legends provided with the Services; (h) use the Services to build a competitive product or service; (i) distribute a Developer Application in source code form in a manner that would disclose the source code of the Services; (j) reverse engineer, decrypt, decompile, decode, disassemble, or otherwise attempt to obtain the human readable form of the Services, to the extent such restriction is permitted by Applicable Law; or (k) engage in any of the prohibited practices set forth at h▇▇▇▇://▇://▇▇▇.▇▇▇▇▇.▇▇▇/▇▇▇▇▇-prohibited/bitgo-prohibited-uses-and-businesses-terms/, as may be amended by Custodian from time to time in Custodian’s 's sole discretion (collectively, the "Prohibited Practices").

Appears in 1 contract

Sources: Custodial Services Agreement (DevvStream Corp.)