Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Users, or use any Service or Content for the benefit of, anyone other than You, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Application to store or transmit infringing, libellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a Service or Content, or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Non-SmartSimple Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Non-SmartSimple Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non-SmartSimple product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.Order
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You Customer will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouCustomer or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any orperformance ofany Service or third-party data partydata contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Services or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our Vlocity intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your Customer's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a non-Vlocity product or service, or (2l) build reverse engineer any Service (to the extent such restriction is permitted by law). Customer’s or a product or service using similar ideas, features, functions or graphics User’s intentional violation of the Serviceforegoing, (3) copy or any ideas, features, functions or graphics of the Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You Customer or Users that in Our Vlocity’s judgment imminently threatens the security, integrity or availability of Our Vlocity’s services, may result in Our Vlocity’s immediate suspension of the Services, however We . Vlocity will use commercially reasonable efforts under the circumstances to provide You Customer with notice and an opportunity to remedy such violation or threat prior to any such suspension. Vlocity’s right of suspension of the Services hereunder is applicable to any violation asserted by Vlocity that is not disputed by Customer. Any dispute regarding any violation of the foregoing is subject to the Contract Disputes Act.
Appears in 1 contract
Sources: Contract
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or any type of outsourcing offering, (c) use a Service or ProduQtive Non-UDPaaS Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Non-UDPaaS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non-UDPaaS product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate temporary suspension of the Services. However, however We will we may use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Non-Apptega Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Non-Apptega Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy i)copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non-Apptega product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Service Agreement
Usage Restrictions. You Client will not not
(a) make any SaaS Service or Content available to anyone other than Client or Users, or use any SaaS Service or Content for the benefit of, of anyone other than YouClient or its Affiliates, unless expressly stated otherwise in an Order Form or the Documentation, ,
(b) sell, resell, license, sublicense, distribute, make available, rent or lease any SaaS Service or Content, or include any SaaS Service or Content in a service bureau or outsourcing offering, ,
(c) use a SaaS Service or ProduQtive Non-Anacle Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, ,
(d) use a SaaS Service or 3rd Party Non-Anacle Application to store or transmit Malicious Code, ,
(e) interfere with or disrupt the integrity or performance of any SaaS Service or third-party data contained therein, ,
(f) attempt to gain unauthorised unauthorized access to any SaaS Service or Content or its related systems or networks, ,
(g) permit direct or indirect access to or use of any Service SaaS Services or Content in a way that circumvents a contractual usage limit, or use of any of Our SaaS Services in a manner that violates Our Acceptable Use and External Facing Services Policy to access, or to access copy or use any of Our Anacle intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, ,
(h) modify, copy, or create derivative works based on of a SaaS Service or any part, feature, function or user interface thereof, ,
(i) copy Content except as permitted herein or in an Order Form or the Documentation, ,
(j) frame or mirror any part of any SaaS Service or Content, other than framing on Your Client's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, or ,
(k) except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile a Service or Content, Content or access it to to
(1i) build a competitive product or service, ,
(2ii) build a product or service using similar ideas, features, functions or graphics of the SaaS Service, ,
(3iii) copy any ideas, features, functions or graphics of the Service or Service, or
(4iv) determine whether the SaaS Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Software as a Service Agreement
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Application to store or transmit infringing, libellouslibelous, obscene, or otherwise unlawful unlawful, objectionable or tortious material, or to store or transmit material in violation of a third-party party’s rights, including but not limited to privacy rights or intellectual property rights, (d) use a Service or 3rd Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained thereinService, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentService, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (j) access any Service in order to build a competitive product or (k) disassemble, reverse engineer, service or decompile a Service or Content, or access it to (1) build benchmark with a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4k) determine whether reverse engineer any Service (to the Services are within the scope of extent such restriction is permitted by law). Neither We nor Our suppliers or licensors has any patentresponsibility for preventing or identifying Your compliance with this Section 3.4 or any liability, directly or indirectly, for any loss or damage caused by Your Data. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the ServicesServices and/or removal of the offending Data, however however, We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Non-Prezentt Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Non-Prezentt Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-third- party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non-Prezentt product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You At all times, you will comply, and ensure each User complies, with all applicable Privacy laws while using the Service. Without limiting the generality of Section 4.2, you agree that you will not, and will not permit any person, including without limitation any Users, to: (a) make any Service or Content available to anyone other than Users, or use any Service or Content for the benefit of, anyone other than Youyou, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Third-Party Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, publicity rights, defamation rights, intellectual property rights, proprietary rights, contractual rights or any other legal right (d) use a Service or 3rd Third-Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our our Services in a manner that violates Our Acceptable Use and External Facing Services Policy is in violation of Applicable Laws, or to access or use any of Our our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your your own intranets or otherwise for Your your own internal business purposes or as permitted in the Documentation, (k) access or use a Service for benchmarking purposes, including without limitation monitoring its availability, performance or functionality, or (kl) disassemble, reverse engineer, or decompile a Service or Content, or access or use it for any purpose competitive with iComply’s business, including without limitation to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.or
Appears in 1 contract
Sources: Master Terms and Conditions
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Users, or use any Service or Content for the benefit of, anyone other than You, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive N on-TORO Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party N on-TORO Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-third- party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our O ur Services in a manner that violates Our O ur Acceptable Use and External Facing Services Policy at ▇▇▇▇▇://▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/legal/acceptable-use- policy.pdf, or to access or use any of Our O ur intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a Service or Content, or access it to to
(1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our O ur judgment threatens the security, integrity or availability of Our O ur services, may result in Our O ur immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Non-CHC Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Non-CHC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non-CHC product or service, or
(2l) build a product or service using similar ideas, features, functions or graphics of reverse engineer any Service (to the Service, (3) copy any ideas, features, functions or graphics of the Service or (4) determine whether the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Non- RevenueWell Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Non-RevenueWell Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non- RevenueWell product or service, (2l) build a product use any of Our Confidential Information to dispute or service using similar ideascontext the validity of Our intellectual property rights, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4m) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Non- DealerTeam Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Non-DealerTeam Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non-DealerTeam product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer any Service (to the Services are within the scope of any patent. Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.extent such
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not (a) make any Service the Software or Content available to anyone other than Usersto, or use any Service the Software or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service the Software or Content, or include any Service the Software or Content in a service bureau or outsourcing offering, (c) use a Service the Software or ProduQtive Non-PA Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service the Software or 3rd Party Non-PA Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service the Software or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service the Software or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service the Software or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or the Software to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service copy the Software or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service the Software or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, access the Software or decompile a Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non-PA product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer the Services are within Software (to the scope of any patentextent such restriction is permitted by law). Any use of the Services Software in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our servicesthe Software, may result in Our immediate suspension of Your use of the ServicesSoftware, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Subscription Agreement
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive ▇▇▇-▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Non- ▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non- ▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇ product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Service Agreement
Usage Restrictions. You will not (a) make any Service cFive Services or Content available to anyone other than Usersto, or use any Service cFive Services or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service cFive Services or Content, or include any Service cFive Services or Content in a service bureau or outsourcing offeringonline or other offering or product, (c) use a Service or ProduQtive Application cFive Services to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Application cFive Services to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service cFive Services or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service cFive Services or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service cFive Services or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as expressly permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on a Service copy cFive Services or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service cFive Services or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, access cFive Services or decompile a Service or Content, or access it Content to (1) build a competitive product or service or to benchmark with a third party product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether the Services are within the scope of any patentreverse engineer cFive Services. Any use of the cFive Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the cFive Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not not, directly or indirectly: (ai) make any Service or Content available to anyone other than Users, or use any Service or Content for the benefit of, anyone other than You, unless expressly stated otherwise in an Order Form or the Documentation, (b) sellsublicense, resell, licenserent, sublicenselease, distributetransfer, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Application to store or transmit infringing, libellousassign, or otherwise unlawful commercially exploit or tortious materialmake the Services available to any third party; (ii) reverse engineer, decompile, disassemble or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) otherwise attempt to gain unauthorised access discover the source code, object code or underlying structure, ideas, know-how or algorithms relevant to the Services or any Service software, Documentation or Content or its data related systems or networksto the Services (where reverse engineering is permitted by applicable law obtaining such information as is necessary to achieve interoperability with Vercel's services, you must first request such information from Vercel); (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (hiii) modify, copytranslate, or create derivative works based on a Service the Services (except to the extent expressly permitted by Vercel or any part, feature, function authorized within the Services) or user interface thereof, otherwise attempt to gain unauthorized access to the Services or its related systems or networks; (iiii) copy Content except as permitted herein use the Services for timesharing or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets service bureau purposes or otherwise for Your own internal business purposes the benefit of a third-party; or as permitted remove any proprietary notices or labels; (iv) remove, alter or obscure in any way any proprietary rights notices (including copyright notices) of Vercel or its suppliers on or within the Services or Documentation; (v) violate any applicable laws or regulations (including without limitation in violation of any data, privacy or (kexport control laws) disassemble, reverse engineer, or decompile a Service or Content, infringe the rights of any third-party in connection with the use or access it to (1) build a competitive product or service, (2) build a product or service using similar ideas, features, functions or graphics of the ServiceServices. You shall comply with any codes of conduct, (3) copy any ideaspolicies or other notices, featuresVercel provides you or publishes in connection with the Services, functions and you shall promptly notify Vercel if you learn of a security breach or graphics of issue related to the Service or (4) determine whether Services. Without limiting the Services are within the scope of any patent. Any foregoing, you acknowledge that Vercel may establish general practices and limits concerning use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We including without limitation the maximum period of time that data, code or other content will use commercially reasonable efforts under be retained by the circumstances to provide Services, the maximum storage space that will be allotted on Vercel's servers on your behalf, and the maximum compute capacity provided for the execution of builds and functions and the maximum network data transferred by the Services. You with notice and an opportunity to remedy such violation or threat prior to such suspension.further acknowledge that Vercel reserves the right to
Appears in 1 contract
Sources: Enterprise Terms and Conditions
Usage Restrictions. You will not (a) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service or ProduQtive Non- CommissionTrac Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or 3rd Party Non-CommissionTrac Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non-CommissionTrac product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4l) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement
Usage Restrictions. You will not (ai) make any Service or Content available to anyone other than Usersto, or use any Service or Content for the benefit of, anyone other than YouYou or Users, unless expressly stated otherwise in an Order Form or the Documentation, (bii) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (ciii) use a Service or ProduQtive Non-iFOLIO Application to store or transmit infringing, libellouslibelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (div) use a Service or 3rd Party Non-iFOLIO Application to store or transmit Malicious Code, (ev) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorised access to any Service or Content or its related systems or networks, (gvi) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or of use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (hvii) modify, copy, or create derivative works based on copy a Service or any part, feature, function or user interface thereof, (iviii) copy Content except as permitted herein or in an Order Form or the Documentation, (jix) frame or mirror any part of any Service or Content, other than framing on Your own intranets intranet or otherwise for Your own internal business purposes or as permitted in the Documentation, or (kx) disassemble, reverse engineer, or decompile a access any Service or Content, or access it Content in order to (1) build a competitive product or service or to benchmark with a Non-iFOLIO product or service, (2) build a product or service using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (4xi) determine whether reverse engineer any Service (to the Services are within the scope of any patentextent such restriction is permitted by law). Any use of the Services in breach of this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, integrity or availability of Our services, may result in Our immediate suspension of the Services, however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension.
Appears in 1 contract
Sources: Master Subscription Agreement