Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).
Appears in 17 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. You Customer will not (a) make any Service or Content available toto anyone other than Customer or Users, or use any Service or Content for the benefit of, of anyone other than You Customer or Usersits Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-SFDC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-SFDC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Services or Content in a way that circumvents a contractual usage limit, or use any Services to access, copy or use any of SFDC intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy modify, copy, or create derivative works of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your Customer's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, (k) access any except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content in order or access it to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law1).
Appears in 12 contracts
Sources: Main Services Agreement, Main Services Agreement, Main Services Agreement
Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).
Appears in 4 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. You Customer will not (a) make any Service or Content available toto anyone other than Customer or Users, or use any Service or Content for the benefit of, of anyone other than You or UsersCustomer, unless expressly stated otherwise in an Order Form, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Services or Content in a way that circumvents a contractual usage limit, or use any Services to access, copy or use any of Privaini intellectual property except as permitted under this Agreement or an Order Form (h) copy modify, copy, or create derivative works of a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your Customer's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, (k) access transmit or procure the sending of, any Service advertisement or Content in order to build a competitive product or servicepromotional material, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).including any
Appears in 2 contracts
Sources: Software as a Service (Saas) Agreement, Software as a Service (Saas) Agreement
Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-DealerTeam Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-DealerTeam Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).a
Appears in 2 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).
Appears in 2 contracts
Sources: Master Subscription Agreement, Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You you or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your your own intranets or otherwise for Your your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).
Appears in 1 contract
Sources: Terms of Service
Usage Restrictions. You will not not
(a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone any purpose other than You or Users, providing services to Your Subscribers,
(b) sell, resell, license, sublicense, distribute, rent rent, or lease any Service or ContentSoftware, or include any Service or Content Software in a service bureau or outsourcing offering, ,
(c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, ,
(d) knowingly use a Service to store or transmit Malicious Code, ,
(e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, ,
(f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, ,
(g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, ,
(h) copy a Service or any part, feature, function function, or user interface thereof, ,
(i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentService, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, ,
(kj) access any Service or Content Software in order to build a similar or competitive product or service, or or
(lk) reverse engineer any Service or Software (to the extent such restriction is permitted by law). These restrictions apply to all versions of Visp-provided software, including, but not limited to, production, beta, development, or demo versions of Visp software.
Appears in 1 contract
Sources: Master Service Agreement
Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, (b) sell, resell, license, sublicensesub-license, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious tortuous material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You Customer will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You Customer or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) access the Services or Content in order to build a competitive product or services, (k) frame or mirror any part of any Service or Content, other than framing on Your Customer's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, (kl) access any Service or Content in order to build a competitive product or service, or (lm) reverse engineer any Service (to the extent such restriction is permitted by law).
Appears in 1 contract
Sources: Terms and Conditions
Usage Restrictions. You Customer will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You Customer or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious tortuous material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your Customer’s own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).
Appears in 1 contract
Usage Restrictions. You Client will not (a) make any Service or Content available toto anyone other than Client or Users, or use any Service or Content for the benefit of, of anyone other than You Client or Usersits Affiliates, unless expressly stated otherwise in the Agreement , (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-ZINFI Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-ZINFI Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Services or Content in a way that circumvents a contractual usage limit, or use any Services to access or use any of ZINFI intellectual property except as permitted under the Agreement, Documentation, (h) copy modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the DocumentationAgreement , (j) frame or mirror any part of any Service or Content, other than framing on Your Client's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).Agreement,
Appears in 1 contract
Sources: Service Level Agreement
Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Customer Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-third- party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) decompile, reverse engineer engineer, disassemble, modify, or create derivative works of any Service (to the extent such restriction is permitted by law)Service.
Appears in 1 contract
Sources: Subscription Agreement
Usage Restrictions. You Customer will not (a) make any Service or Content available to(in any way) to anyone other than Customer or Users, or use any Service or Content for the benefit of, of anyone other than You Customer or Usersits Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-Cloudteam & Rootstock Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non- Cloudteam & Rootstock Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Services or Content in a way that circumvents a contractual usage limit, (h) copy a Service or use any part, feature, function Services to access or user interface thereof, (i) copy Content use any of Cloudteam intellectual property except as permitted herein or in under this Agreement, an Order Form Form, or the Documentation, (jh) frame or mirror any part of any Service or Contentmodify, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or servicecopy, or (l) reverse engineer any create derivative works based on a Service (to the extent such restriction is permitted by law).or
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available toto anyone other than you or Users, or use any Service or Content for the benefit of, of anyone other than You you or Usersyour Affiliates for the purposes of a Transaction, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or Non-Bridge Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-Bridge Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Services or Content in a way that circumvents a contractual usage limit, (h) or use any Services to access, copy a Service or use any part, feature, function or user interface thereof, (i) copy Content of our intellectual property except as permitted herein or in under this Agreement, an Order Form Form, or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).,
Appears in 1 contract
Sources: Main Services Agreement