Common use of SECURITY MECHANISMS Clause in Contracts

SECURITY MECHANISMS. LICENSEE UNDERSTANDS AND AGREES THAT THE SOFTWARE MAY CONTAIN THIRD-PARTY SOFTWARE THAT MONITORS USAGE AND COMMUNICATES WITH LICENSOR'S SERVERS TO ENSURE THAT THE SOFTWARE IS LEGITIMATELY ACQUIRED AND USED UNDER LEGITMATE LICENSES. LICENSEE HEREBY EXPLICITLY CONSENTS TO THE COLLECTION AND TRANSFER OF DATA REGARDING LICENSEE'S SYSTEMS, NETWORKS, LOCATION, SOFTWARE USAGE, AND OTHER DATA USED TO DETERMINE THE LEGITIMACY OF THE SOFTWARE TO LICENSOR'S SERVERS, WHICH MAY BE LOCATED IN THE UNITED STATES, SWITZERLAND, OR OTHER JURISDICTIONS. NO DATA WILL BE TRANSFERRED AFTER LICENSOR DETERMINES THAT LICENSEE'S COPY OF THE SOFTWARE IS LEGITIMATELY OBTAINED FROM LICENSOR OR AN AUTHORIZED DISTRIBUTOR, SUBJECT TO PERIODIC RE- VERIFICATION. IF YOU ARE USING AN ILLEGAL COPY OF THE SOFTWARE, YOU MUST CEASE ALL USE OF THE SOFTWARE IMMEDIATELY AND CONTACT LICENSOR FOR A LEGALLY LICENSED COPY.

Appears in 1 contract

Sources: Licensing Agreement

SECURITY MECHANISMS. LICENSEE UNDERSTANDS AND AGREES THAT THE SOFTWARE MAY CONTAIN THIRD-PARTY SOFTWARE THAT MONITORS USAGE AND COMMUNICATES WITH LICENSOR'S SERVERS TO ENSURE THAT THE SOFTWARE IS LEGITIMATELY ACQUIRED AND USED UNDER LEGITMATE LICENSES. LICENSEE HEREBY EXPLICITLY CONSENTS TO THE COLLECTION AND TRANSFER OF DATA REGARDING LICENSEE'S SYSTEMS, NETWORKS, LOCATION, SOFTWARE USAGE, AND OTHER DATA USED TO DETERMINE THE LEGITIMACY OF THE SOFTWARE TO LICENSOR'S SERVERS, WHICH MAY BE LOCATED IN THE UNITED STATES, SWITZERLAND, OR OTHER JURISDICTIONS. NO DATA WILL BE TRANSFERRED AFTER LICENSOR DETERMINES THAT LICENSEE'S COPY OF THE SOFTWARE IS LEGITIMATELY OBTAINED FROM LICENSOR OR AN AUTHORIZED DISTRIBUTOR, SUBJECT TO PERIODIC RE- VERIFICATIONREVERIFICATION. IF YOU ARE USING AN ILLEGAL COPY OF THE SOFTWARE, YOU MUST CEASE ALL USE OF THE SOFTWARE IMMEDIATELY AND CONTACT LICENSOR FOR A LEGALLY LICENSED COPY.

Appears in 1 contract

Sources: Software License Agreement