Use of Unauthorized Software Sample Clauses

The "Use of Unauthorized Software" clause prohibits parties from installing, accessing, or utilizing software that has not been expressly approved or licensed by the organization or contract holder. In practice, this means employees or contractors must only use software that has been vetted for security and compliance, and may not download or run personal or third-party applications on company systems. This clause helps protect the organization from security vulnerabilities, legal risks, and potential data breaches that can arise from unapproved or pirated software.
POPULAR SAMPLE Copied 22 times
Use of Unauthorized Software. During the Term, Executive shall not knowingly load any unauthorized software into Executive’s computer (whether personal or owned by Employer). Executive may request that Employer purchase, register and install certain software or other digital intellectual property, but Executive may not copy or install such software or intellectual property himself. Executive acknowledges that certain software and digital intellectual property is Confidential Information of Employer and Executive agrees, in accordance with Section 2.2, to keep such software and intellectual property confidential and not to use it except in furtherance of Employer’s Business or the operations of Employer or its Affiliates.
Use of Unauthorized Software. Customer represents and warrants that it will only use SISW software that has been validly licensed to it by SISW or its authorized partner. Any SISW software not duly purchased from SISW or its authorized partner constitutes unauthorized software for purposes of this Agreement. If Customer downloads, installs and/or uses unauthorized software, then SISW has the right to terminate this Agreement in accordance with the terms of Section 4.3 of this Agreement. Furthermore, no refund or credit will be due to Customer as a result of termination of the Agreement, or termination of any Software licenses, Maintenance Services, Professional Services or other products or services provided under this Agreement. All amounts owed to SISW by Customer for services rendered up to the effective date of termination shall remain outstanding and shall be due and payable in accordance with the terms of this Agreement.
Use of Unauthorized Software. Licensee represents and warrants that it will only use Siemens software that has been validly licensed to it by Siemens or its authorized partner. Any Siemens software not duly licensed from Siemens or its authorized partner constitutes unauthorized software. If Licensee downloads, installs and/or uses unauthorized software, then Siemens has the right to terminate this Agreement in accordance with the terms of Article 6 below.
Use of Unauthorized Software. End User represents and warrants that it will only use Storecheck software that has been validly licensed to it by Storecheck or its authorized distributors. Any Storecheck software not duly licensed from Storecheck or its authorized distributors constitutes unauthorized software for purposes of this Agreement. If End User downloads, installs and/or uses unauthorized software, then Storecheck has the right to terminate this Agreement and the Master Agreement.
Use of Unauthorized Software. Under the ERAP Prime Contract (at Part B of Section 26 of Appendix B- 1), all technology used by NMA and Guidehouse needed to meet contractually-specified standards or receive prior approval from OTDA. This did not occur with respect to Guidehouse’s use of certain software. Specifically, from November 10, 2021 through December 14, 2021, Guidehouse used a certain third-party data cloud software program to administer a program adjacent to the ERAP and store PII (the “Unauthorized Software”). Guidehouse did not seek or receive OTDA’s approval to use it until after NMA raised concerns to Guidehouse about its need to obtain State approval to use the program.
Use of Unauthorized Software. Use software, scripts, or other automated mechanisms (including bots, spiders, crawlers, or scraping tools) to access or interact with the Services without Goose's express authorization.
Use of Unauthorized Software. Customer represents and warrants that it will only use BCKS software that has been validly licensed to it by BCKS or its authorized partner. Any BCKS software not duly purchased from BCKS or its authorized partner constitutes unauthorized software for purposes of this Agreement. If Customer downloads, installs and/or uses unauthorized software, then BCKS has the right to terminate this Agreement in accordance with the terms of Section 4.3 of this Agreement. Furthermore, no refund or credit will be due to Customer as a result of termination of the Agreement, or termination of any Software licenses, Maintenance Services, Professional Services or other products or services provided under this Agreement. All amounts owed to BCKS by Customer for services rendered up to the effective date of termination shall remain outstanding and shall be due and payable in accordance with the terms of this Agreement.

Related to Use of Unauthorized Software

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Unauthorized Use or Disclosure The Contractor shall notify COMMERCE within five (5) working days of any unauthorized use or disclosure of any confidential information, and shall take necessary steps to mitigate the harmful effects of such use or disclosure.

  • Unauthorized Use The Participating Institutions, or the Authorized Users shall not knowingly permit anyone other than the Authorized Users to access the Licensed Materials.