Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 5 contracts
Sources: Master Services Agreement, Master Services Agreement, Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-Copado Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Copado Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ Copado intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 4 contracts
Sources: Master Services Agreement, Master Services Agreement, Master Services Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ SFDC intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 3 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. Customer You will not (a) make any Service or Content available to anyone other than Customer You or Users, or use any Service or Content for the benefit of of, anyone other than Customer You or its Your Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-SmartSimple Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non- SmartSimple Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of ▇▇▇▇▇▇ Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, ,
(i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's Your own intranets or otherwise for its Your own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) 30 copy any ideas, features, functions functions, or graphics of the Service, or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation, External Facing Services Policy, or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 3 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-SecurityStudio Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-SecurityStudio Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ SecurityStudio intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 2 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. Customer You will not (a) make any Service or Content available to anyone other than Customer or Usersto, or use any Service or Content for the benefit of of, anyone other than Customer You or its AffiliatesUsers, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or any type of outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-UDPaaS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-UDPaaS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of ▇▇▇▇▇▇ Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's Your own intranets or otherwise for its Your own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a access any Service or Content or access it in order to (1) build a competitive product or service, (2) build service or to benchmark with a Non-UDPaaS product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Serviceservice, or (4l) determine whether reverse engineer any Service (to the extent such restriction is permitted by law). Any use of the Services are within in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the scope security, confidentiality, integrity or availability of any patentOur services, may result in Our immediate suspension or termination of the Services. However, we may use reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or termination.
Appears in 2 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. Customer will not not: (a) make any Service or Content available to anyone other than Customer or Users, or (b) use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the DocumentationCustomer, (bc) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (cd) use a Service or Non-▇▇▇▇▇▇ Non-PTC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (de) use a Service or Non-▇▇▇▇▇▇ Non- PTC Application to store or transmit Malicious Codecode, files, scripts, agents or programs intended to do harm, including, for example, viruses, worms, time bombs and Trojan horses, (ef) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (fg) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (gh) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ PTC intellectual property except as permitted under this Agreement, an Order Form, or the DocumentationService Description, (hi) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (ij) copy Content except as permitted herein use any robot, spider, scraper or other automated means to access the Service, or engage in an Order Form any scraping, data-mining, harvesting, screen-scraping, data aggregating or indexing of the DocumentationService, (jk) frame or mirror any part of any Service or ContentService, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the DocumentationService Description, (kl) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service, or (m) access a Service or Content or access it to (1i) build a competitive product or service, (2ii) build a product or service using similar ideas, features, functions or graphics of the Service, (3iii) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 2 contracts
Sources: Master Software as a Service Agreement, Master Software as a Service Agreement
Usage Restrictions. Customer will not except as may be allowed by any applicable law (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, licenselicence, sublicense, distribute, make availablerent, rent lease, display disclose, or lease otherwise commercially exploit any Service or Content, or include any Service or Content in a service bureau or outsourcing offeringoffering or to provide services to third parties on or in connection with the internet or any time-sharing, software as a service, cloud or other technology or service, (c) use a Service or Non-▇▇▇▇▇▇ Non-T-PRO Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-T-PRO Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized unauthorised access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ T-PRO intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, duplicate or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (( j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) republish, download, display, transmit, or distribute all or any portion of the Services and/or Documentation (as applicable) in any form or media or by any means, (l) except to the extent permitted by applicable lawlaw (which is incapable of exclusion by agreement), disassemble, reverse engineer, or decompile a Service or Content or otherwise reduce to human-perceivable form all or any part of the Services or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent. Customer shall use all reasonable endeavours to prevent any unauthorised access to, or use of, Services and/or the Documentation and, in the event of any such unauthorised access or use, promptly notify T-PRO in writing.
Appears in 2 contracts
Sources: G Cloud Terms and Conditions, G Cloud 14 Terms and Conditions
Usage Restrictions. Customer will not (a) make any Service or Content the Services available to anyone other than Customer or Users, or use any Service or Content the Services for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, licenselicence, sublicensesublicence, distribute, make available, rent or lease any Service or Contentthe Services, or include any Service or Content the Services in a service bureau or outsourcing offering, (c) use a Service the Services, or Non-▇▇▇▇▇▇ Non-PCS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ the Services, Non-PCS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service the Services or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content the Services, or its related systems or networks, (g) permit direct or indirect access to or use of any the Services or Content in a way that circumvents a contractual usage limit, or use any the Services to access access, copy or use any of ▇▇▇▇▇▇ PCS intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service of the Services or any part, feature, function or user interface thereof, ,
(i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Contentthe Services, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (kj) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content the Services or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the ServiceServices, (3) copy any ideas, features, functions or graphics of the ServiceServices, or (4) determine whether the Services are within the scope of any patent.or
Appears in 2 contracts
Sources: Master Services Agreement, Master Services Agreement
Usage Restrictions. Customer will You shall not (a) make any Service or Content available to anyone other than Customer or Usersto, or use any Service or Content for the benefit of of, anyone other than Customer You or its AffiliatesUsers, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use any of the Services in a manner that violates SFDC’s Acceptable Use and External Facing Service Policy, or to access or use any of SFDC’s or ▇▇▇▇▇▇ ▇▇▇▇▇.▇▇▇’s intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a access any Service or Content or access it in order to (1) build a competitive product or service, (2) build service or to benchmark with a non-SFDC product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Serviceservice, or (4l) determine whether reverse engineer any Service (to the extent such restriction is permitted by law). Customer’s or a User’s intentional violation of the foregoing, or any use of the Services are within in breach of this Agreement, Documentation or Order Forms, by Customer or Users that in ▇▇▇▇▇▇▇▇▇▇.▇▇▇’s or as applicable, SFDC’s, judgment imminently threatens the scope security, integrity or availability of SFDC’s services, may result in ▇▇▇▇▇▇▇▇▇▇.▇▇▇’s or as applicable, SFDC’s, immediate suspension of the Services. ▇▇▇▇▇▇▇▇▇▇.▇▇▇ will use commercially reasonable efforts under the circumstances to provide Customer with an opportunity to remedy such violation or threat prior to any patentsuch suspension.
Appears in 2 contracts
Sources: Master Subscription Agreement, Main Services Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Usersto, or use any Service or Content for the benefit of of, anyone other than Customer or its AffiliatesUsers, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ Aforza intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a access any Service or Content or access it in order to (1) build a competitive product or service, (2) build service or to benchmark with a non-Aforza product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Serviceservice, or (4l) determine whether reverse engineer any Service (to the extent such restriction is permitted by law). Customer’s or a User’s intentional violation of the foregoing, or any use of the Services are within in breach of this Agreement, Documentation or Order Forms, by Customer or Users that in Aforza’s judgment imminently threatens the scope security, integrity or availability of Aforza’s services, may result in Aforza’s immediate suspension of the Services. Aforza will use commercially reasonable efforts under the circumstances to provide Customer with an opportunity to remedy such violation or threat prior to any patentsuch suspension.
Appears in 2 contracts
Sources: Subscription Agreement, Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ SFDC intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 2 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. Customer The Partner firm will not (a) make any Service or Content available to anyone other than its Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its AffiliatesCustomer, unless expressly stated otherwise in an Order Form or the Documentationengagement letter, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-RETL Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-RETL Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ RETL intellectual property except as permitted under this Agreement, an Order Formengagement letter, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form as per engagement letter or the any other Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 2 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. The Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized unauthorised access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ Tableau or Field Dynamics intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on the Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent. In addition to the Usage Restrictions in this Agreement, and as a condition of the Customer’s License, the Customer shall not (and shall not allow any third party) to: (a) utilise any equipment, device, software, or other means designed to circumvent or remove any Software Authorisation or copy protection used by Tableau or Field Dynamics in connection with the Software, or use the Software together with any authorisation code, product key, credential, serial number, or other copy protection device not supplied by Tableau or Field Dynamics; (b) use the Software to develop a product that converts any Tableau file format to an alternative report file format used by any general-purpose report writing, data analysis or report delivery product that is not the property of Tableau; (c) remove any product identification, proprietary, copyright, trademark, service mark, or other notices contained in the Software; or (d) use the Software in a way that could lead to death or bodily injury of any person, or to severe physical or environmental damage. The limitations of liability in this Agreement shall not apply to breaches of this clause.
Appears in 1 contract
Sources: Subscription Agreement
Usage Restrictions. Customer You will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of of, anyone other than Customer or its AffiliatesYou, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-CSA Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-CSA Application to store or transmit Malicious Code, ,
(e1) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (gtogainunauthorizedaccess toany ServiceorContent oritsrelatedsystemsornetworks,(g) permit direct or indirect directorindirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner to access or use any of ▇▇▇▇▇▇ Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's Your own intranets or otherwise for its Your own internal business purposes or as permitted in the Documentation, or (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content Content, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-KAAS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-KAAS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ KAAS intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-DMARCSAAS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non- DMARCSAAS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ DMARCSAAS intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's ’s own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.or
Appears in 1 contract
Sources: Subscription Services Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-AUGINTEL Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-AUGINTEL Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ AUGINTEL intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Sales Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party third -party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (ff ) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ Cardonex’s intellectual property except as permitted under this Agreement, an Order FormSales Order, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame f rame or mirror any part of any Service or ContentService, other than framing f raming on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, or (kj) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent. The Services may not be accessed for purposes of monitoring their availability, performance or functionality, or for any other benchmarking or competitive purposes. Cardonex’s direct competitors are prohibited f rom accessing the Services, except with Cardonex’s prior written consent.
Appears in 1 contract
Sources: Terms of Service
Usage Restrictions. Customer Subscriber will not (a) make any Service or Content available to anyone other than Customer Subscriber or Users, or use any Service or Content for the benefit of anyone other than Customer Subscriber or its Affiliates, unless expressly stated otherwise in an Service Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offeringoffering (including offering the Platform to third parties on an applications service provider or time-sharing basis), (c) use a Service or Non-▇▇▇▇▇▇ Non-HSPL Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-HSPL Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to anyone or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ HSPL intellectual property except as permitted under this Agreement, an Order FormService Order, or the Documentation, (h) modify, copyalter, adapt, translate, copy or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Service Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on CustomerSubscriber's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or apply any other method to derive the source code of any software included in the services or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent. Further, you shall not (i) systematically access the platform using “bots” or “spiders”, or any automated system that calls to the platform more frequently than may reasonably be performed by a human user using a standard web browser, or attempt to gain unauthorized access to the platform or their related systems or networks, or (ii) remove, alter or obscure any confidentiality or proprietary rights notices (including copyright notices) of HSPL on or within the Platform or any copies of the Platform, or (iii) access or use the services in a way intended to avoid incurring fees or exceeding usage limits or quotas.
Appears in 1 contract
Sources: Master Agreement
Usage Restrictions. Customer will undertakes not (to, and not to allow any User or third party to:
a) make any Service available to, or Content available to use any Service for the benefit of, anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (User Manual;
b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (;
c) use a Service (or Non-▇▇▇▇▇▇ Application connected Third Party Application) to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-third- party privacy rights, (;
d) use a Service (or Non-▇▇▇▇▇▇ Application connected Third Party Application) to store or transmit Malicious Code, (;
e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (;
f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (;
g) permit direct or indirect access to or use of any Services or Content Service in a way that circumvents a contractual usage limit, or use any of Barco’s Services to access or use any of ▇▇▇▇▇▇ Barco’s intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (User Manual;
h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (;
i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentService, other than framing on Customer's ’s own intranets or otherwise for its Customer’s own internal business purposes or as permitted in the Documentation, (kUser Manual;
j) except access any Service in order to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or serviceservice or for purposes of monitoring the availability, (2) build a product performance or service using similar ideas, features, functions or graphics functionality of the Service, (3) copy any ideas, features, functions or graphics of the such Service, or for any other benchmarking or competitive purposes;
k) reverse engineer any Service (4to the extent such restriction is permitted by law), create derivative works based upon any Service, or permit third parties to do the same;
l) determine whether modify, adapt or unbundle the component parts of ▇▇▇▇▇▇▇ for use on different computer devices;
m) use the Services are within for any other unauthorized purpose (off-label use); and
n) use the scope of any patentServices outside the territory or region where Customer obtained the Services from Barco or as otherwise stated in the User Manual.
Appears in 1 contract
Sources: Master Services Agreement
Usage Restrictions. Customer You will not, and will not permit Your Users to (a) make any Service or Content Offering available to anyone other than Customer You or Your Users, or use any Service or Content Offering for the benefit of anyone other than Customer You or its AffiliatesYour Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent rent, or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offeringthe Offerings, (c) use a Service any Offering or Non-▇▇▇▇▇▇ Non-G2 Application to store disseminate, store, or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store disseminate, store, or transmit material in violation of third-party privacy rights, (d) use a Service an Offering or Non-▇▇▇▇▇▇ Non-G2 Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service Offering or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content Offering or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content Offering in a way that circumvents a contractual or technical usage limit, or use any Services Offering to access or use any of ▇▇▇▇▇▇ G2's intellectual property except as permitted under this Agreement, an the applicable Order Form, or and the Documentation, (h) modify, copy, or create derivative works based on a Service an Offering or any part, feature, function function, or user interface dashboard thereof, (i) copy G2 Content except as expressly permitted herein or herein, in an Order Form or Form, and the Documentation, (j) frame or mirror any part of any Service or Contentthe Application(s), other than framing on Customer's Your own intranets or otherwise for its Your own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Chroma may suspect or terminate access to Chroma Services if Customer has violated usage restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Usersto, or use any Service or Content for the benefit of of, anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the DocumentationYour Users, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, unless you have been specifically allowed to do so in a separate agreement with Chroma, (c) use a Service or Non-▇▇▇▇▇▇ Application Content to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party third\party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party third\party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's ’s own intranets or otherwise for its Customer’s own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a access any Service or Content or access it in order to (1) build a competitive product or service, (2) build a product service or service using similar ideas, features, functions or graphics for the purpose of the Service, (3) copy any ideas, features, functions or graphics of the Servicebringing an intellectual property infringement claim again Chroma, or (4l) determine whether reverse engineer any Chroma Service unless this is permitted by law, or unless you have been specifically told that you may do so by Chroma, in writing (e.g., through an open source software license). Customer may not develop multiple Applications to simulate or act as a single Application or otherwise access the Chroma Services are within the scope of any patentin a manner intended to avoid incurring fees.
Appears in 1 contract
Sources: Terms of Service
Usage Restrictions. The Services contain proprietary and confidential information that is protected by applicable Intellectual Property and other laws and treaties. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the DocumentationForm, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service any service or Non-▇▇▇▇▇▇ Application application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service any service or Non-▇▇▇▇▇▇ Application application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ WOOQER intellectual property except as permitted under this Agreement, Agreement or an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the DocumentationForm, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the DocumentationOrder Form, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.)
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, ,
(c) use a Service or Non-▇▇▇▇▇▇ NON-DELIVERAIN Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ NON-DELIVERAIN Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ DELIVERAIN intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (ai) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the DocumentationForm, (bii) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (ciii) use a Service or Non-▇▇▇▇▇▇ Non-Networcx Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-third party privacy rights, (div) use a Service or Non-▇▇▇▇▇▇ Non-Networcx Application to store or transmit Malicious Code, (ev) interfere with or disrupt the integrity or performance of any Service or third-third party data contained therein, (fvi) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (gvii) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ Networcx intellectual property except as permitted under this Agreement, an Agreement and Order Form, or the Documentation, (hviii) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (iix) copy Content except as permitted herein or in an Order Form or the Documentationor, (jx) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (kxi) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1a) build a competitive product or service, (2b) build a product or service using similar ideas, features, functions or graphics of the Service, (3c) copy any ideas, features, functions or graphics of the Service, or or
(4d) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer You will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of of, anyone other than Customer or its AffiliatesYou, unless expressly stated otherwise in an Order Form or the DocumentationForm, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-WS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-WS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Serviceor Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Privacy Policy, or to access or use any of ▇▇▇▇▇▇ Our intellectual property except propertyexcept as permitted under this permittedunderthis Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the DocumentationForm, (j) frame or mirror any part of any Service or Content, other than framing on Customer's Your own intranets or otherwise for its Your own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineerreverseengineer, or decompile a Service or Content decompileaServiceor Content, or access it to to
(1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, Service or (4) determine whether the Services are within thescopeof anypatent. Anyuse of the scope Services in breach of any patentthis Agreement, or Order Forms, by Youor Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will shall not (a) make any Service or Content available to anyone other than Customer or Authorized Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-Flashtract Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-third party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Flashtract Application to store or transmit Malicious Code, ,
(e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ Flashtract intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's ’s own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Service Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-REVTWO Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-REVTWO Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ REVTWO intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-PROVIDER Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-PROVIDER Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ PROVIDER intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, ,
(c) use a Service or Non-▇▇▇▇▇▇ Non-Dreamline Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Dreamline Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ Dreamline intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's ’s own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, or (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer You will not, and will not permit Your Users to (a) make any Service or Content Offering available to anyone other than Customer You or Your Users, or use any Service or Content Offering for the benefit of anyone other than Customer You or its AffiliatesYour Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent rent, or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offeringthe Offerings, (c) use a Service or Non-▇▇▇▇▇▇ Application any Offering to store disseminate, store, or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store disseminate, store, or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application an Offering to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service Offering or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content Offering or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content Offering in a way that circumvents a contractual or technical usage limit, or use any Services Offering to access or use any of ▇▇▇▇▇▇ G2's intellectual property except as permitted under this Agreement, an the applicable Order Form, or and the Documentation, (h) modify, copy, or create derivative works based on a Service an Offering or any part, feature, function function, or user interface dashboard thereof, (i) copy G2 Content except as expressly permitted herein or herein, in an Order Form or Form, and the Documentation, (j) frame or mirror any part of any Service or Contentthe Platform(s), other than framing on Customer's Your own intranets or otherwise for its Your own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content an Offering or access it to (1i) build a competitive product or service, (2ii) build a product or service using similar ideas, features, functions or graphics of the ServiceOfferings, (3iii) copy any ideas, features, functions or graphics of the ServiceOfferings, or (4iv) determine whether the Services Offerings are within the scope of any patent. Any use of the Offerings in breach of this “Use of Offerings” Section, that in G2's reasonable judgment threatens the security, integrity, or availability of the Offerings, may result in immediate suspension of the Offerings, provided that G2 will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such breach or threat prior to any such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer You will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of of, anyone other than Customer or its AffiliatesYou, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-SavvyDox Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-SavvyDox Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of ▇▇▇▇▇▇ Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's Your own intranets or otherwise for its Your own internal business purposes or as permitted in the Documentation, or (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content Content, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not not: (a) make any Hosted Service or Content available to anyone other than Customer or Users, or use any Hosted Service or Content for the benefit of anyone other than Customer or its AffiliatesCustomer, unless expressly stated otherwise in an Order Form a Quote or the Documentation, Product Guide; (b) sell, resell, license, sublicense, distribute, make availablerent, rent or lease any Service or ContentHosted Service, or include any Hosted Service or Content in a service bureau or outsourcing offering, ; (c) use a Hosted Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, ; (d) use a Hosted Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Codemalicious code (meaning code, files, scripts, agents, or programs intended to do harm, including, for example, viruses, worms, time bombs, and Trojan horses); (e) interfere with or disrupt the integrity or performance of any Hosted Service or third-party data contained therein, ; (f) attempt to gain unauthorized access to any Hosted Service or Content or its related systems or networks, ; (g) permit direct or indirect access to or use of any Hosted Services or Content in a way that circumvents a contractual usage limit, or use any Hosted Services to access access, copy or use any of ▇▇▇▇▇▇ intellectual property Barracuda Intellectual Property Rights except as permitted under this Agreement, an Order Forma Quote, or the Documentation, Product Guide; (h) modify, copy, or create derivative works based on of a Hosted Service or any part, feature, function function, or user interface thereof, ; (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentHosted Service, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, Product Guide; (kj) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content decompile, or access it a Hosted Service to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions functions, or graphics of the Hosted Service, or (3) copy any ideas, features, functions functions, or graphics of the Hosted Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Legal Terms and Conditions
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-Chrome DM Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Chrome DM Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ Chrome DM intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not not: (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-Thrivaca™ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Thrivaca™ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ ARX NIMBUS, LLC intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's Customer‘s own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer You will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of of, anyone other than Customer or its AffiliatesYou, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy, or to access or use any of ▇▇▇▇▇▇ Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's Your own intranets or otherwise for its Your own internal business purposes or as permitted in the Documentation, o r (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content Content, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer You will not (a) make any Service Service, Content or Content Software available to anyone other than Customer or Usersto, or use any Service Service, Content or Content Software for the benefit of of, anyone other than Customer You or its Affiliates, unless expressly stated otherwise in an Order Form or the DocumentationUsers, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service Service, or ContentContent or Software, or include any Service Service, or Content or Software in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service Service, or Content or Software or its related systems or networks, (g) permit direct or indirect access to or use of any Services Service, or Content or Software in a way that circumvents a contractual usage limit, limit or use any Services to access or use any of ▇▇▇▇▇▇ intellectual property except as permitted under this Agreement, an Order Form, or the Documentationsecurity measures, (h) modifyuse Pilixo API services other than as specified in Documentation, copy(i) run or use any automated processes that “crawl”, “scrape”, or create derivative works based on “spider” the Services (j) copy a Service or any part, feature, function or user interface thereof, (ik) copy Content except as permitted herein or in an Order Form or the Documentation, (jl) frame or mirror any part of any Service Service, or ContentContent or Software, other than framing on Customer's Your own intranets or otherwise for its Your own internal business purposes or as permitted in the Documentation, (km) except to the extent permitted by applicable lawaccess any Service, disassemble, reverse engineer, or decompile a Service or Content or access it Software in order to (1) build a competitive product or service, (2n) build a product or service using similar ideas, features, functions or graphics of reverse engineer any Service (to the Service, (3) copy any ideas, features, functions or graphics of the Serviceextent such restriction is permitted by law), or (4o) determine whether access the Services are within or Content for purposes of monitoring their availability, performance or functionality, or for any other benchmarking or competitive purposes. We may temporarily suspend Purchased Services due to violations of this Section 4.4, if, in Our sole judgment, such suspension is needed to protect either the scope security or integrity of any patentServices. In the event of such suspension, We will notify You as soon as practically possible.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in this Agreement or an Order Form or the DocumentationForm, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ ZNest intellectual property except as permitted under this Agreement, Agreement or an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the DocumentationForm, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentationpurposes, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to to
(1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Business Services Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, licenselicence, sublicensesublicence, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service Service, or Non-▇▇▇▇▇▇ Non-PCS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Service, Non- PCS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content Service, or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ PCS intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, ,
(i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentService, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (kj) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.or
Appears in 1 contract
Sources: Master Services Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ SFDC intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal i7internal business purposes purp ses or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-Supplier Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Supplier Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ Supplier intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Main Services Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-FIGJAM Inc Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-FIGJAM Inc Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ FIGJAM Inc intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-Glantus Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Glantus Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ Glantus intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (ji) frame or mirror any part of any Service or ContentService, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (kj) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Main Services Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, licenselicence, sublicensesublicence, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service Service, or Non-▇▇▇▇▇▇ Non-WhirrCrew Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Service, Non-WhirrCrew Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content Service, or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ WhirrCrew intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentService, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (kj) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services Services, are within the scope of any patent.
Appears in 1 contract
Sources: Master Services Agreement
Usage Restrictions. Customer will not (a) make any Service the Services or Content available to anyone other than Customer or Users, or use any Service Services or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service the Services or Content, or include any Service Services or Content in a service bureau or outsourcing offering, (c) use a Service the Services or Non-▇▇▇▇▇▇ Non-SFDC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service the Services or Non-▇▇▇▇▇▇ Application Non-SFDC Applications to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service the Services or third-party data contained therein, (f) attempt to gain unauthorized access to any Service the Services or Content or its their related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any the Services to access or use any of ▇▇▇▇▇▇ SFDC’s intellectual property except as permitted under this Agreementthese TOU, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, and (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service Services or Content Content, or access it to to
(1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, ,
(3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: End User License Agreement (Eula)
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-SavingLife Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-SavingLife Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ SavingLife intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or UsersCustomer, or use any Service or Content for the benefit of anyone other than Customer or its Affiliatesand legal entities of the same group of companies as the Customer, unless expressly stated otherwise in an Order Form or the Documentationwritten consent by TGNDATA, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a TGNDATA Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a TGNDATA Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ TGNDATA intellectual property except as permitted under this Agreement, Agreement or an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the DocumentationForm, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentationpurposes, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or use access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.. If Customer receives notice, that Content may no longer be used or must be removed, modified and/or disabled to avoid violating the Acceptable Use Customer will promptly do so. If Customer does not take required action, including deleting any Content Customer may have downloaded from the Services, in accordance with the above, or if in TGNDATA’s judgment continued violation is likely to reoccur,
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of of, anyone other than Customer or its Affiliatesand authorized Users, unless expressly stated otherwise in an Order Form or the DocumentationOrder, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or an outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services Service or Content Documentation in a way that circumvents a contractual usage limit, or use of any of Solodev Services in a manner that violates Solodev Acceptable Use Policy, or to access or use any of ▇▇▇▇▇▇ Solodev's intellectual property except as permitted under this Agreement, or an Order Form, or the DocumentationOrder, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user use interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentService, other than framing on Customer's own intranets or otherwise for its Customer's own internal business purposes purposes, or as permitted in the Documentation, (kj) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content Service, or access it to to
(1) build a competitive product or service, and as it specifically relates to Solodev software platform (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any original ideas, features, functions or graphics of the Service, Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement or Order, by Customer or Users that in Solodev's judgment threatens the security, integrity or availability of Solodev Services, may result in Solodev’s suspension of the Services.
Appears in 1 contract
Sources: Master Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, licenselicence, sublicensesublicence, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service Service, or Non-▇▇▇▇▇▇ Non-PCS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Service, Non-PCS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-third- party data contained therein, (f) attempt to gain unauthorized access to any Service or Content Service, or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ PCS intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentService, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (kj) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent. Customers may not use a Service to, nor allow its Users or any third party to use a Service to perform load or security testing without first obtaining PCS’s written consent.
Appears in 1 contract
Sources: Master Services Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit Malicious Codecode, files, scripts, agents or programs intended to do harm, including, for example, viruses, worms, time bombs and Trojan horses, (e) deliberately interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ Vocantas intellectual property except as permitted under this Agreement, Agreement or an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentService, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentationpurposes, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent. Customer’s breach of its obligations may result in breaking of software or rendering it not usable. Any repair works to make good the Software for intended purpose shall have additional fee.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will Any user of the Services shall not (a) make allow any Service to be made available to, or Content available permit any Service to be used for the benefit of, anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise an authorized user designated in an Order Form or the Documentationaccordance with these terms, (b) permit any user to sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (c) use allow a Service (or Non-▇▇▇▇▇▇ Application connected Third Party Application) is being used to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-third- party privacy rights, (d) use allow a Service (or Non-▇▇▇▇▇▇ Application connected Third Party Application) is being used to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained thereintherein or allow the same, (f) allow any attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit allow any direct or indirect access to or use of any Services or Content Service in a way that circumvents a contractual usage limit, or use any of Barco’s Services to access or use any of ▇▇▇▇▇▇ Barco’s intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on allow a Service or any part, feature, function or user interface thereofthereof to be copied, (i) copy Content except as permitted herein allow the framing or in an Order Form or the Documentation, (j) frame or mirror mirroring any part of any Service or ContentService, other than framing on Customer's user’s own intranets or otherwise for its user’s own internal business purposes or as permitted in the Documentation, (kj) except allow access to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a any Service or Content or access it in order to (1) build a competitive product or serviceservice or for purposes of monitoring the availability, performance or functionality of such Service, or for any other benchmarking or competitive purposes, (2k) build a product allow to reverse engineer any Service (to the extent such restriction is permitted by law), or service using similar ideas, features, functions or graphics of the to create derivative works based upon any Service, (3l) copy any ideasallow to modify, features, functions adapt or graphics unbundle the component parts of the ServiceSoftware for use on different computer devices, or (4m) determine whether allow to use the Services are within outside the scope of territory or region where any patentuser obtained the Services from Barco or its authorized reseller or as otherwise stated in the Documentation.
Appears in 1 contract
Sources: Cloud Connected Services Agreement
Usage Restrictions. Customer Customers will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-AMI Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-AMI Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ AMI intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, ,
(c) use a Service or Non-▇▇▇▇▇▇ Non-QEEXO Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-QEEXO Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ QEEXO intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's ’s own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-GPM Corp Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-GPM Corp Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ GPM Corp intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Service Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-third- party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Aforza Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ Aforza intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, copy or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, ideas features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.or
Appears in 1 contract
Sources: Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-Chakra Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Chakra Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ Chakra intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, ,
(i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-GIKKO Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-GIKKO Inc Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ▇▇▇▇▇▇ GIKKO intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.,
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-Belle Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-Belle Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ Belle intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) scrape any part of any Service or Content, or (l) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions functions, or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Cloud Services Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make availablerent, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇ Non-ENDGRATE Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇ Non-ENDGRATE Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy, or use any of ▇▇▇▇▇▇ ENDGRATE intellectual property except as permitted under this Agreement, an Order FormOrder, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (( j) frame or mirror any part of any Service or Content, other than framing on Customer's ’s own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, or (k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions functions, or graphics of the Service, (3) copy any ideas, features, functions functions, or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Main Services Agreement
Usage Restrictions. Customer will not (not:
a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (;
b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (;
c) use a Service or Non-▇▇▇▇▇▇ Non-Prospecta Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (;
d) use a Service or Non-▇▇▇▇▇▇ Non-Prospecta Application to store or transmit Malicious Code, (;
e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (;
f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (;
g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇ Prospecta intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (;
h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (;
i) copy Content except as permitted herein or in an Order Form or the Documentation, (;
j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (;
k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) to:
i. build a competitive product or service, (2) ;
ii. build a product or service using similar ideas, features, functions or graphics of the Service, (3) ;
iii. copy any ideas, features, functions or graphics of the Service, or (4) ; or
iv. determine whether the Services are within the scope of any patent.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. Customer will not (a) make any Service or Content available to anyone other than Customer or Users, or use any Service or Content for the benefit of anyone other than Customer or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-▇▇▇▇▇▇▇ Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-▇▇▇▇▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Services or Content in a way that circumvents a contractual usage limit, or use any Services to access access, copy or use any of ▇▇▇▇▇▇▇ intellectual property intellectualproperty except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Customer's own intranets or otherwise for its own internal business purposes or as permitted in the Documentation, (k) except to exceptto the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service, or (4) determine whether the Services are within the scope of any patent.)
Appears in 1 contract
Sources: Main Services Agreement