UNAUTHORIZED DISTRIBUTION OR ACCESS Clause Samples

UNAUTHORIZED DISTRIBUTION OR ACCESS. You agree to use commercially reasonable efforts, using industry standard technical protections and security practices to secure the physical or virtual computing environment upon which the Licensed Software resides, in order to prevent the unauthorized use, access or distribution of the Licensed Software by any third party. GLB ENT ▇▇▇▇ TEMPLATE v.1.0_ Symantec eDiscovery Platform 8.1_20January2015 Microsoft Office Professional Plus 2013 Professional Edition End User License Agreement Thank you for choosing a software application that includes Microsoft Office 2013. This is a license agreement between the licensor of the software application or suite of applications with which you acquired the Microsoft software (“licensor”) and you. For your convenience, we’ve organized this agreement into two parts. The first part includes introductory terms; the Additional Terms follow and contain greater detail. You should review the entire agreement, including any linked terms, because all of the terms are important and together create this contract that applies to you. You can review linked terms by pasting the forward link into your browser window. THE ADDITIONAL TERMS CONTAIN A BINDING ARBITRATION CLAUSE AND CLASS ACTION WAIVER. IF YOU LIVE IN THE UNITED STATES, THESE AFFECT YOUR RIGHTS TO RESOLVE A DISPUTE WITH THE LICENSOR OR MICROSOFT, AND YOU SHOULD READ THEM CAREFULLY. How does Internet activation work? Activation associates the use of the software with a specific computer or device. During activation, the software will automatically contact Microsoft or its affiliate to confirm the license is associated with the licensed computer. This process is called “activation.” Because activation is meant to identify unauthorized changes to the licensing or activation functions of the software, and to otherwise prevent unlicensed use of the software, you have no right to use the software after the time permitted for activation and you may not bypass or circumvent activation. If you have not entered a product key during the time permitted for activation, most features of the software will stop running. account or network, in an unauthorized manner. What about upgrading or converting the software? If you install the software covered by this agreement as an upgrade or conversion to your existing software, then the upgrade or conversion replaces the original software that you are upgrading or converting from. You do not retain any rights to the original software after you ...
UNAUTHORIZED DISTRIBUTION OR ACCESS. You agree to use commercially reasonable efforts, using industry standard technical protections and security practices to secure the physical or virtual computing environment upon which the Licensed Software resides, in order to prevent the unauthorized use, access or distribution of the Licensed Software by any third party. GLB ENT ▇▇▇▇ TEMPLATE v.1.0_Symantec Clearwell_2OCT2013 Below are three separate sets of license terms. Only one set applies to you. To determine which license terms apply to you check the license designation printed either on your product key, near the product name on your Certificate of Authenticity, or on the download page if you obtained your product key online. If your designation is FPP, then the Retail License Terms below apply to you. If your designation is OEM, then the OEM License Terms below apply to you. If your designation is Product Key Card or PKC, then the Product Key Card License Terms below apply to you. If you need assistance finding your license type, please go to: ▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/▇▇▇▇ to determine which license you have.

Related to UNAUTHORIZED DISTRIBUTION OR ACCESS

  • Unauthorized Access Using service to access, or to attempt to access without authority, the accounts of others, or to penetrate, or attempt to penetrate, security measures of Company’s or a third party’s computer software or hardware, electronic communications system, or telecommunications system, whether or not the intrusion results in disruption of service or the corruption or loss of data.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • UNAUTHORIZED TRANSFERS To report a lost or stolen Card, PIN, Access Code or any combination thereof, You will call Us at the telephone number shown in this Agreement. You may also report the loss of a Card, PIN, Access Code or any combination thereof, by writing to Us at the address shown in this Agreement. You should also call the number or write to the address listed above if You believe a transfer has been made using the information from Your check without Your permission.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.