Security Software Clause Samples
Security Software. Subject to these ELA Terms, Cisco and its suppliers grant You a non-exclusive, non-transferable license during the term specified in Section 3.4 to use unlimited Object Code copies of the Security Software for Your Internal Business Use. In the event of a conflict between these Terms and the ▇▇▇▇, these Terms shall govern.
Security Software. All computers that access the internet are potential targets for thieves to gain access to your personal information. Texas Exchange Bank recommends that online banking users install anti-virus and firewall software on your computer and that the software automatically updates.
Security Software. 5.1. Customer agrees to take all steps reasonable, necessary, and prudent to protect their Login ID and password.
5.2. Customer agrees not to attempt to undermine or cause harm to any server, software, system or customer of the Company.
5.3. Customer agrees to maintain Customers' computing equipment responsibly, including running virus software.
5.4. Uploading a virus to a Company server will result in account termination, service charges and/or prosecution.
5.5. Customer acknowledges that the Company cannot provide technical support for any software and/or script that the Customer installs, other than variable name changes. The Company supplies technical support for VPS hosting issues only. The Company shall be the sole arbiter as to what constitutes a "VPS hosting” issue.
Security Software. To the best of Seller’s knowledge, the Security Software will operate in accordance with the technical specifications associated therewith.
Security Software. In addition, in its sole discretion, ▇▇▇▇▇▇▇ may make available to Subscriber security software, such as anti-virus software, firewall software, “pop-up” advertising blocking software, parental control software, and anti-spyware or anti-adware software for Subscriber’s use on Subscriber’s computer system in conjunction with the Internet Service. Any such security software provided by ▇▇▇▇▇▇▇ to Subscriber is intended to provide only a minimal level of protection to Subscriber’s computer system(s). Subscriber understands and agrees that ▇▇▇▇▇▇▇ and its third-party suppliers of any such security software do not guarantee its accuracy, efficacy or performance. Subscriber understands and agrees that ▇▇▇▇▇▇▇ and its third-party suppliers are not
Security Software. The Lender has installed security software on the Handset (“Security Software”) that enables the Lender, at its sole discretion, in accordance with this Agreement (including after an Event of Default has occurred and is continuing):
(i) To suspend or disable certain features of the Handset, including (without
(v) To collect data from the Handset, including (without limitation) power usage, app usage, data usage and signal strength;
(vi) To customise certain apps installed on the Handset, such as those downloaded from an app store; and The Security Software is an integral part of the Service provided under this Agreement, and you shall not (and shall not attempt to):
(a) modify, create derivative works from, display, copy, mirror, publish, distribute, transmit, transfer, license, sublicense, sell, market, or lease copies of the Security Software in whole or in part (or attempt to do any of the foregoing);
(b) reverse engineer, decompile, disassemble or otherwise reduce the object code of the Security Software to source code form (or attempt to do any of the foregoing);
(c) interrupt or attempt to interrupt operation of the Security Software in any way;
(d) use the Security Software, or the content therein, or do any other thing that will infringe any Intellectual Property Rights or other rights of any third party;
(e) remove or obscure any trademark symbols, copyright notices, or other intellectual property rights notices in the Security Software (or attempt to do any of the foregoing);
(f) bypass the measures used to prevent or restrict access to the Security Software or enforce limitations on use thereof (or attempt to do any of the foregoing);
(g) do anything likely to impair, interfere with or damage or cause harm or distress to any persons using the Security Software; or
(h) use any information obtained using the Security Software otherwise than in The Lender shall not be required to remove the Security Software until all of your obligations to the Lender under this Agreement have been satisfied in full.
Security Software. In addition, in its sole discretion, Raptor Wireless may recommend to Subscriber a particular security software, such as anti-virus software, firewall software, "pop-up" advertising blocking software, parental control software, and anti- spyware or anti-adware software for Subscriber's use on Subscriber's computer system in conjunction with the Internet Service. Any such security software recommended by Raptor Wireless to Subscriber is intended to provide only a minimal level of protection to Subscriber's computer system(s). Subscriber understands and agrees that Raptor Wireless and its third party suppliers of any such security software do not guarantee its accuracy, efficacy or performance. Subscriber understands and agrees that Raptor Wireless and its third party suppliers are not responsible for any damage to Subscriber's computer system(s) or the information stored on it that may result from the security software or its non-performance.
Security Software. In addition, in its sole discretion, Madison may make available to Subscriber security software, such as anti-virus software, firewall software, "pop-up" advertising blocking software, parental control software, and anti-spyware or anti-adware software for Subscriber's use on Subscriber's computer system in conjunction with the Internet Service. Any such security software provided by Madison to Subscriber is intended to provide only a minimal level of protection to Subscriber's computer system(s). Subscriber understands and agrees that Madison and its third-party suppliers of any such security software do not guarantee its accuracy, efficacy or performance. Subscriber understands and agrees that Madison and its third-party suppliers are not responsible for any damage to Subscriber's computer system(s) or the information stored on it that may result from the security software or its non-performance.
Security Software. 8.1 Where the Managed Security Products requires the installation and use of specific software, the Service Provider hereby grants to the Customer a licence, in accordance with Clause 8.2.1 and Clause 8.2.2. of the Framework Agreement, to use the Software in order to access the Services as specified in the Order Form.
8.2 The Service Provider shall use reasonable endeavours to ensure that any changes, updates or repairs to the network or software which it uses as a platform to provide the Services which require interruption to the provision of the Services (“Maintenance Events”) shall not be performed during Normal Business Hours.
8.3 The Customer acknowledges that the Services are provided from the Data Centre or as the Cloud, as specified in the Order Form, and that the Service Provider retains the right to provide the Services from any other premises without providing any prior notice to the Customer.
8.4 The Service Provider may interrupt the provision of the Services at any time to carry out Maintenance Events so long as it gives the Customer at least five [5] days’ notice via the Customer’s client portal (“Scheduled Maintenance”), or as otherwise agreed in writing within the Order Form or at any time thereafter.
8.5 Where requested in the Order Form, the Service Provider shall provide, throughout the Term, connectivity to the Managed Security service. Where, the Customer make its own arrangements for connectivity or Internet access in order to access the Managed Security service, it must do so in accordance with the specifications suggested by the Service Provider from time to time.
Security Software. As part of our layered approach to online security, we employ software to monitor and analyze login and banking behavior. Such programs may be updated or replaced from time to time. In addition, free of charge, we offer business customers Trusteer Rapport, which protects login and transaction information. You may accept this security procedure by downloading the software online. You acknowledge that use of Trusteer Rapport is a commercially reasonable security practice and that, by refusing to accept this Account feature, you face increased exposure to potential loss due to fraud. You will be bound by any payment order, whether or not authorized, issued in your name and accepted by us if you do not choose to download Trusteer Rapport. YOU EXPRESSLY AGREE TO BE BOUND TO ANY PAYMENT ORDER, WHETHER OR NOT AUTHORIZED, ISSUED IN YOUR NAME AND ACCEPTED IN GOOD FAITH BY US IN COMPLIANCE WITH THE FOREGOING COMMERCIALLY REASONABLE, MUTUALLY AGREED UPON SECURITY PROCEDURES.