Runtime-Restricted Use Software Sample Clauses

POPULAR SAMPLE Copied 1 times
Runtime-Restricted Use Software. The software is “Runtime-Restricted Use” software; as such, it may only be used to run the integrated software turnkey application or suite of applications delivered to you by or on behalf of the Licensor (the “Unified Solution”) solely as part of the Unified Solution. The software may not be used either (i) to develop any new software applications, (ii) in conjunction with any software applications, databases or tables other than those contained in the Unified Solution, and/or (iii) as a standalone software application. The foregoing provision, however, does not prohibit you from using a tool to run queries or reports from existing tables.
Runtime-Restricted Use Software. The software is “Runtime-Restricted Use” software; as such, it may only be used to run the Unified Solution solely as part of the Unified Solution. The software may not be used either (i) to develop any new software applications, (ii) in conjunction with any software applications, databases or tables other than those contained in the Unified Solution, and/or (iii) as a standalone software application. The foregoing provision, however, does not prohibit you from using a tool to run queries or reports from existing tables.
Runtime-Restricted Use Software. The software is “Runtime-Restricted Use” software; as such, it may only be used in conjunction with the Unified Solution. The software may not be used either (i) to develop any new software applications, (ii) in conjunction with any software applications, databases or tables other than those contained in the Unified Solution, and/or (iii) as a standalone software application. The foregoing provision, however, does not prohibit you from using a tool to run queries or reports from existing tables. A CAL permits you to access instances of only the Runtime-Restricted User version of the server software licensed and delivered to you as part of the Unified Solution, in accordance with the other terms of the agreement.
Runtime-Restricted Use Software. If you acquired a “Runtime-Restricted Use” edition license, then the software may only be used in conjunction with the integrated software turnkey application delivered by or on behalf of the Licensor (such application referred to as the “Unified Solution”) solely as part of the Unified Solution. As part of the Unified Solution, an end user may further use the software to interoperate Unified Solution with (a) an additional application delivered by or on behalf of Licensor and (b) an application delivered by or on behalf of a third party.
Runtime-Restricted Use Software. For selected Aspect Product Solutions, the software is “Runtime- Restricted Use” software; as such, it may only be used to run the Aspect Product Solution solely as part of the Aspect Product Solution. The software may not be used either (i) to develop any new software applications, (ii) in conjunction with any software applications, databases or tables other than those contained in the Aspect Product Solution, and/or (iii) as a standalone software application. The foregoing provision, however, does not prohibit you from using a tool to run queries or reports from existing tables.
Runtime-Restricted Use Software. The Product is “Runtime-Restricted Use” software; as such, the Product may only be used to run the Integrated Application. The Integrated Application is designed solely to capture or send information about a device (e.g., operation status of device—on/off). The Product may not be used for any purpose other than as expressly stated above (e.g., monitoring of a device). In particular, the Product may not be used to (i) capture business transaction data from a device (e.g., information regarding goods and/or receivables); (ii) to develop and/or (iii) in conjunction with, new applications, databases or tables other than those contained in the Integrated Application. The foregoing provision, however, does not prohibit you from using a tool to run queries or reports from existing tables, and/or from using a development environment or workbench which is part of the Integrated Application to configure or extend such Integrated Application. Notwithstanding any provision of this ▇▇▇▇, you may only transfer the “Runtime- Restricted Use” Product as part of the Integrated Application, subject to the terms and conditions specified in Section 6 below.
Runtime-Restricted Use Software. The Product is "Runtime-Restricted Use" software; as such, the Product may only be used to run the Integrated Application as part of the Integrated Application. The Product may not be used either (i) to develop and/or (ii) in conjunction with, new applications, databases or tables other than those contained in the Integrated Application. The foregoing provision, however, does not prohibit you from using a tool to run queries or reports from existing tables, and/or from using a development environment or workbench which is part of the Integrated Application to configure or extend such Integrated Application. Notwithstanding any provision of this ▇▇▇▇, you may only transfer the "Runtime-Restricted Use" Product as part of the Integrated Application, subject to the terms and conditions specified in Section 5 below.
Runtime-Restricted Use Software. The software is “Runtime-Restricted Use” software; as such, it may only be used in conjunction with the integrated software turnkey application delivered by or on behalf of the licensor (such application referred to as the “Unified Solution”) solely as part of the Unified Solution. As part of the Unified Solution, an end user may further use the software to interoperate Unified Solution with (a) an additional application delivered by or on behalf of licensor and (b) an application delivered by or on behalf of a third party.
Runtime-Restricted Use Software. The software is “Runtime-Restricted Use” software; as such, it may only be used to run the Unified Solution solely as part of the Unified Solution. The software may not be used either (i) to develop any new software applications, (ii) in conjunction with any software applications, databases or tables other than those contained in the Unified Solution, (iii) with a different Microsoft Dynamics product than the specific Microsoft Dynamics product with which the software was obtained, and/or (iv) as a standalone software application. The foregoing provision, however, does not prohibit you from using a tool to run queries or reports from existing tables. A CAL permits you to access instances of only the Runtime-Restricted User version of the server software licensed and delivered to you as part of the Unified Solution, in accordance with the other terms of the agreement.

Related to Runtime-Restricted Use Software

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • SOFTWARE LICENSE GRANT Where Product is acquired on a licensed basis the following shall constitute the license grant: