Use of the Apple Software Clause Samples

POPULAR SAMPLE Copied 2 times
Use of the Apple Software. As a condition to using the Apple Software and any Apple Services, You agree that: (a) You will use the Apple Software and any services only for the purposes and in the manner expressly permitted by this Agreement and in accordance with all applicable laws and regulations; (b) You will not use the Apple Software or any Apple Services for any unlawful or illegal activity, nor to develop any Covered Product, which would commit or facilitate the commission of a crime, or other tortious, unlawful or illegal act; (c) Your Application, Library and/or Pass will be developed in compliance with the Documentation and the Program Requirements, the current set of which is set forth in Section 3.3 below; (d) To the best of Your knowledge and belief, Your Covered Products, Licensed Application Information, and Pass Information do not and will not violate, misappropriate, or infringe any Apple or third party copyrights, trademarks, rights of privacy and publicity, trade secrets, patents, or other proprietary or legal rights (e.g., musical composition or performance rights, video rights, photography or image rights, logo rights, third party data rights, etc. for content and materials that may be included in Your Application); (e) You will not, through use of the Apple Software, Apple Certificates, services or otherwise, create any Covered Product or other code or program that would disable, hack or otherwise interfere with the Security Solution, or any security, digital signing, digital rights management, verification or authentication mechanisms implemented in or by iOS, watchOS, tvOS, the Apple Software, or any services, or other Apple software or technology, or enable others to do so (except to the extent expressly permitted by Apple in writing); (f) You will not, directly or indirectly, commit any act intended to interfere with the Apple Software or Services, the intent of this Agreement, or Apple’s business practices including, but not limited to, taking actions that may hinder the performance or intended use of the App Store, B2B Program, or the Program (e.g., submitting fraudulent reviews of Your own Application or any third party application, choosing a name for Your Application that is substantially similar to the name of a third party application in order to create consumer confusion, or squatting on application names to prevent legitimate third party use); (g) Applications for iOS Products, Apple Watch, or Apple TV developed using the Apple Software may be dist...
Use of the Apple Software. As a condition to using the Apple Software and any Services, You agree that: (a) You will use the Apple Software and any Services only for the purposes and in the manner expressly permitted by this Agreement and in accordance with all applicable laws and regulations; (b) You will not use the Apple Software or any Services for any unlawful or illegal activity, nor to develop any Covered Product, which would commit or facilitate the commission of a crime, or other tortious, unlawful or illegal act; (c) Your Internal Use Application, Library and/or Pass will be developed in compliance with the Documentation and the Program Requirements, the current set of which is set forth in Section
Use of the Apple Software. As a condition to using the Apple Software and any services, You agree that: (a) You will only use the Apple Software and any services for the purposes and in the manner expressly permitted by this Agreement and in accordance with all applicable laws and regulations; (b) You will not use the Apple Software or any services for any unlawful or illegal activity, nor to develop any Application which would commit or facilitate the commission of a crime, or other tortious, unlawful or illegal act; (c) Your Application will be developed in compliance with the Documentation and the Program Requirements, the current set of which is set forth in Section 3.3 below; (d) To the best of Your knowledge and belief, Your Application and Licensed Application Information do not and will not violate, misappropriate, or infringe any Apple or third party copyrights, trademarks, rights of privacy and publicity, trade secrets, patents, or other proprietary or legal rights (e.g. musical composition or performance rights, video rights, photography or image rights, logo rights, third party data rights, etc. for content and materials that may be included in Your Application); (e) You will not, through use of the Apple Software, services or otherwise, create any Application or other program that would disable, hack or otherwise interfere with the Security Solution, or any security, digital signing, digital rights management, verification or authentication mechanisms implemented in or by the iPhone OS, this Apple Software, any services or other Apple software or technology, or enable others to do so; and (f) Applications developed using the Apple Software may only be distributed if selected by Apple (in its sole discretion) for distribution via the App Store or for limited distribution on Registered Devices (ad hoc distribution) as contemplated in this Agreement.

Related to Use of the Apple Software

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇.▇▇▇/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/aupdetail.html • The UC Policy on Copyright Ownership: ▇▇▇▇://▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇▇.▇▇▇/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.