Subscription Restrictions. As a condition to the Subscription, and except as expressly permitted otherwise under this Agreement, Customer shall not do (or permit or encourage to be done) any of the following license restrictions (in whole or in part): (a) copy, "frame" or "mirror" the Service; (b) sell, assign, transfer, lease, rent, sublicense, or otherwise distribute or make available the Service to any third party (such as offering it as part of a time-sharing, outsourcing or service bureau environment); (c) publicly perform, display or communicate the Service; (d) modify, alter, adapt, arrange, or translate the Service; (e) decompile, disassemble, decrypt, reverse engineer, extract, or otherwise attempt to discover the source code or non-literal aspects (such as the underlying structure, sequence, organization, file formats, non-public APIs, ideas, or algorithms) of, the Service; (f) remove, alter, or conceal any proprietary rights notices displayed on or in the Service; (g) circumvent, disable or otherwise interfere with security-related or technical features or protocols of the Service; (h) make a derivative work of the Service, or use it to develop any service or product that is the same as (or substantially similar to) it; (i) store or transmit any robot, malware, Trojan horse, spyware, or similar malicious item intended (or that has the potential) to damage or disrupt the Service; (j) employ any hardware, software, device, or technique, or
Appears in 1 contract
Sources: Saas Agreement
Subscription Restrictions. As a condition to the Subscription, and except as expressly permitted otherwise under this Agreement, Customer shall not do (or permit or encourage to be done) any of the following license subscription restrictions (in whole or in part): (a) copy, "“frame" ” or "“mirror" ” the Service; (b) sell, assign, transfer, lease, rent, sublicense, or otherwise distribute or make available the Service to any third party (such as offering it as part of a time-sharing, outsourcing or service bureau environment); (c) publicly perform, display or communicate the Service; (d) modify, alter, adapt, arrange, or translate the Service; (e) decompile, disassemble, decrypt, reverse engineer, extract, or otherwise attempt to discover the source code or non-literal aspects (such as the underlying structure, sequence, organization, file formats, non-public APIs, ideas, or algorithms) of, the Service; (f) remove, alter, or conceal any proprietary rights notices displayed on or in the Service; (g) circumvent, disable or otherwise interfere with security-related or technical features or protocols of the Service; ;
(h) make a derivative work of the Service, or use it to develop any service or product that is the same as (or substantially similar to) it; (i) store or transmit any robot, malware, Trojan horse, spyware, or similar malicious item intended (or that has the potential) to damage or disrupt the Service; or (j) employ take any hardwareaction that imposes or may impose (as determined in Company’s reasonable discretion) an unreasonable or disproportionately large load on the servers, softwarenetwork, devicebandwidth, or techniqueother cloud infrastructure which operate or support the Service, oror otherwise systematically abuse or disrupt the integrity of such servers, network, bandwidth, or infrastructure.
Appears in 1 contract
Sources: End User Subscription Agreement