Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly: (i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement; (ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement; (iii) create, recreate or obtain the source code for any Proprietary Item; (iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider; (v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM; (vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company; (vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise; (viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise; (ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item; (x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM; (xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement. (b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 15 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Metropolitan West Funds), Transfer Agency and Shareholder Services Agreement (GuideStone Funds), Transfer Agency and Shareholder Services Agreement (Bluepoint Investment Series Trust)
Use Restrictions. (a) Company and its Authorized Users will not do or attempt to do, and Company and its Authorized Users will not knowingly or through its negligence permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, "ethical hacking", "white hat hacking" or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access, test or harm the BNYM System or expose BNYM to harm through the BNYM System, other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted an Authorized User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 13 contracts
Sources: Transfer Agency Services Agreement (Voya Separate Portfolios Trust), Transfer Agency Services Agreement (Voya PARTNERS INC), Transfer Agency Services Agreement (Voya VARIABLE PORTFOLIOS INC)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 7 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Touchstone Funds Group Trust), Transfer Agency and Shareholder Services Agreement (Touchstone Investment Trust), Transfer Agency and Shareholder Services Agreement (Touchstone Strategic Trust)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, “ethical hacking”, “white hat hacking” or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 6 contracts
Sources: Transfer Agency and Shareholder Services Agreement (KKR Asset-Based Income Fund), Transfer Agency and Shareholder Services Agreement (Lord Abbett Research Fund Inc), Transfer Agency and Shareholder Services Agreement (Lord Abbett Investment Trust)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.; or
(xiii) engage in or attempt to engage in penetration testing or “ethical hacking” of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than in accordance with the security measures and access methods maintained by BNYM at the time..
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 5 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Manning & Napier Fund, Inc /Ny/), Transfer Agency and Shareholder Services Agreement (Manning & Napier Fund, Inc /Ny/), Transfer Agency and Shareholder Services Agreement (Touchstone Strategic Trust)
Use Restrictions. (a) Company will not directly or indirectly (i) do or attempt to do, and Company will not (ii) permit any other employee or Permitted User to do or attempt to do, or (iii) knowingly or negligently permit any person not an employee or entity Permitted User to do or attempt to do, any of the following, directly or indirectly:
(i) use or intentionally attempt to use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;; Confidential And Proprietary Execution Version
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement; or
(xiii) engage in or attempt to engage in penetration testing or “ethical hacking” of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use in accordance with the security measures and access methods maintained by BNYM at the time.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 5 contracts
Sources: Transfer Agency and Shareholder Services Agreement (AMG Funds II), Transfer Agency and Shareholder Services Agreement (AMG Funds IV), Transfer Agency and Shareholder Services Agreement (AMG Funds I)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;; Confidential And Proprietary Execution Version
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 4 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Sit Mutual Funds Inc), Transfer Agency and Shareholder Services Agreement (Sit Mutual Funds Ii Inc), Transfer Agency and Shareholder Services Agreement (Sit Mutual Funds Inc)
Use Restrictions. Confidential And Proprietary Execution Version
(a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM (the foregoing shall not be construed as limiting in any way Company’s ability to defend itself in any dispute or litigation, including, but not limited to, challenging BNYM’s Intellectual Property Rights, nor shall the foregoing limiting Company’s ability to enforce and protect its own Intellectual Property Rights);
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) fail to use commercially reasonable efforts that allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, "ethical hacking", "white hat hacking" or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events. The foregoing, however, shall not be construed as requiring Company to institute any litigation or become a party to any litigation.
Appears in 4 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Laudus Trust), Transfer Agency and Shareholder Services Agreement (Schwab Capital Trust), Transfer Agency and Shareholder Services Agreement (Schwab Annuity Portfolios)
Use Restrictions. (a) Company will not do or attempt to doa. Except as expressly authorized herein, Licensee shall not, and Company will shall not permit any other person or entity to do or attempt to do, any of the followingpermit, directly or indirectly:
(i) use (including make any Proprietary Item for any purpose, at any location copies of) the Software or in any manner not specifically authorized by this AgreementDocumentation beyond the scope of the license granted under Section 3;
(ii) make without providing notice to nCipher, provide any other entity, including any subcontractor, independent contractor, affiliate, or retain any copy service provider of any Proprietary Item except as specifically authorized by this AgreementLicensee, with access to or use of the Software or Documentation;
(iii) createmodify, recreate translate, adapt, or obtain otherwise create derivative works of the source code for Software or Documentation or any Proprietary Itempart thereof;
(iv) refer to combine the Software or otherwise use any Proprietary Item as part of thereof with, or incorporate the Software or any effort to develop part thereof in, any other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modifyreverse engineer, adaptdisassemble, translate decompile, decode or create derivative works based upon in any Proprietary Itemother manner attempt to derive or gain access to the source code of any component of the Software or any part thereof for any purpose or any portion thereof and on all portions contained in or merged into other programs and/or the Documentation. Licensee shall notify nCipher if Licensee becomes aware of any person or entity attempting to reverse engineer, reverse compile, or combine or merge disassemble any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;of the Product.
(vi) remove, erase delete, alter, or tamper with obscure any copyright trademarks or any copyright, trademark, patent, or other intellectual property or proprietary notice printed rights notices provided on or stamped onwith the Software or Documentation, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in including any copy of any Proprietary Item made by Companythereof;
(vii) rent, lease, lend, sell, sublicense, assign, distribute, publish, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYMmake available the Software, or marketany features or functionality of the Software, licenseto any Third Party for any reason, sublicensewhether or not over a network or on a hosted basis, distribute including in connection with the internet or otherwise grantany web hosting, wide area network (WAN), virtual private network (VPN), virtualization, time-sharing, service bureau, software as a service, cloud, or subcontract other technology or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Companyservice without nCipher’s behalf or otherwisewritten approval;
(viii) subcontract for use the Product on operating systems or delegate technology platforms other than those designated by nCipher in the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwiseDocumentation;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient use the Software or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts Documentation in violation of any Proprietary Item;law, regulation, or rule; or
(x) take any action that would challengeuse the Software or Documentation for purposes of competitive analysis of the Software, contest, impair the development of a competing software product or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operationservice, or services similar any other purpose that is to nCipher’s commercial disadvantage.
b. nCipher shall have, in addition to any other remedies available to it, the right to seek equitable remedies including injunctive relief in respect of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through CompanyLicensee’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of its obligations under this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or eventsTERMS OF SERVICE.
Appears in 3 contracts
Sources: Terms of Service Agreement, Terms of Service Agreement, Terms of Service Agreement
Use Restrictions. (a) Company will not do or attempt to doa. Except as expressly authorized herein, Licensee shall not, and Company will shall not permit any other person or entity to do or attempt to do, any of the followingpermit, directly or indirectly:
(i) use (including make any Proprietary Item for any purpose, at any location copies of) the Software or in any manner not specifically authorized by this AgreementDocumentation beyond the scope of the license granted under Section 3;
(ii) make without providing notice to nCipher, provide any other Person, including any subcontractor, independent contractor, affiliate, or retain any copy service provider of any Proprietary Item except as specifically authorized by this AgreementLicensee, with access to or use of the Software or Documentation;
(iii) createmodify, recreate translate, adapt, or obtain otherwise create derivative works of the source code for Software or Documentation or any Proprietary Itempart thereof;
(iv) refer to combine the Software or otherwise use any Proprietary Item as part of thereof with, or incorporate the Software or any effort to develop part thereof in, any other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modifyreverse engineer, adaptdisassemble, translate decompile, decode or create derivative works based upon in any Proprietary Itemother manner attempt to derive or gain access to the source code of any component of the Software or any part thereof for any purpose or any portion thereof and on all portions contained in or merged into other programs and/or the Documentation. Licensee shall notify nCipher if Licensee becomes aware of any person or entity attempting to reverse engineer, reverse compile, or combine or merge disassemble any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;of the Product.
(vi) remove, erase delete, alter, or tamper with obscure any copyright trademarks or any copyright, trademark, patent, or other intellectual property or proprietary notice printed rights notices provided on or stamped onwith the Software or Documentation, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in including any copy of any Proprietary Item made by Companythereof;
(vii) rent, lease, lend, sell, sublicense, assign, distribute, publish, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYMmake available the Software, or marketany features or functionality of the Software, licenseto any Third Party for any reason, sublicensewhether or not over a network or on a hosted basis, distribute including in connection with the internet or otherwise grantany web hosting, wide area network (WAN), virtual private network (VPN), virtualization, time-sharing, service bureau, software as a service, cloud, or subcontract other technology or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Companyservice without nCipher’s behalf or otherwisewritten approval;
(viii) subcontract for use the Product on operating systems or delegate technology platforms other than those designated by nCipher in the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwiseDocumentation;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient use the Software or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts Documentation in violation of any Proprietary Item;law, regulation, or rule; or
(x) take any action that would challengeuse the Software or Documentation for purposes of competitive analysis of the Software, contest, impair the development of a competing software product or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operationservice, or services similar any other purpose that is to nCipher’s commercial disadvantage.
b. nCipher shall have, in addition to any other remedies available to it, the right to seek equitable remedies including injunctive relief in respect of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use Licensee's breach of the Licensed Services or Company’s activities in connection with its obligations under this Agreement▇▇▇▇.
c. If Licensee has purchased an Issuance HSM, Licensee is strictly prohibited from using the Issuance HSM as a general purpose HSM and may only use the Issuance HSM for the limited purposes of supporting Entrust Datacard issuance products. As “Issuance HSM” means a hardware security module (b“HSM”) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted Userthat that has been purchased and/or licensed specifically for supporting Entrust Datacard’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or eventscredit card issuance products.
Appears in 3 contracts
Sources: End User License Agreement, End User License Agreement, End User License Agreement
Use Restrictions. (a) Company will not directly or indirectly (i) do or attempt to do, and Company will not (ii) permit any other employee or Permitted User to do or attempt to do, or (iii) knowingly permit any person not an employee or entity Permitted User to do or attempt to do, any of the following, directly or indirectly:
(i) use or intentionally attempt to use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;; Confidential And Proprietary Execution Version
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement; or
(xiii) engage in or attempt to engage in penetration testing or “ethical hacking” of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than in accordance with the security measures and access methods maintained by BNYM at the time.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 3 contracts
Sources: Transfer Agency and Shareholder Services Agreement (AMG Pantheon Infrastructure Fund, LLC), Transfer Agency and Shareholder Services Agreement (AMG Pantheon Credit Solutions Fund), Transfer Agency and Shareholder Services Agreement (AMG Pantheon Private Equity Fund, LLC)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement; or
(xiii) engage in or attempt to engage in penetration testing or “ethical hacking” of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use in accordance with the security measures and access methods maintained by BNYM at the time.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 3 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Sterling Capital Funds), Transfer Agency Services Agreement (Driehaus Mutual Funds), Transfer Agency and Shareholder Services Agreement (Bridgeway Funds Inc)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.; or
(bxiii) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances engage in or events regarding its attempt to engage in penetration testing or a Permitted User’s use “ethical hacking” of the Licensed BNYM System that are reasonably likely or otherwise engage in or attempt to constitute engage in any activity to use, access or result test or expose the BNYM System other than in a breach of this Section 2.12, accordance with the security measures and take all reasonable steps requested access methods maintained by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.at the time..
Appears in 3 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Touchstone Institutional Funds Trust), Transfer Agency and Shareholder Services Agreement (Touchstone Variable Series Trust), Transfer Agency and Shareholder Services Agreement (Touchstone Funds Group Trust)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement; or
(xiii) engage in or attempt to engage in penetration testing or “ethical hacking” of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than in accordance with the security measures and access methods maintained by BNYM at the time.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 2 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Motley Fool Funds Trust), Transfer Agency and Shareholder Services Agreement (Motley Fool Funds Trust)
Use Restrictions. (a) Company will not directly or indirectly (i) do or attempt to do, and Company will not (ii) permit any other employee or Permitted User to do or attempt to do, or (iii) knowingly or negligently permit any person not an employee or entity Permitted User to do or attempt to do, any of the following, directly or indirectly:
(i) use or intentionally attempt to use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or
(xiii) engage in or attempt to engage in penetration testing or "ethical hacking" of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use in accordance with the security measures and access methods maintained by BNYM at the time.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 2 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Pax World Funds Series Trust I), Transfer Agency and Shareholder Services Agreement (Pax World Funds Series Trust I)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, "ethical hacking", "white hat hacking" or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 2 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Touchstone Strategic Trust), Transfer Agency and Shareholder Services Agreement (Touchstone Variable Series Trust)
Use Restrictions. (a) Company and its Authorized Users will not do or attempt to do, and Company and its Authorized Users will not knowingly or through its negligence permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain or attempt to obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, "ethical hacking", "white hat hacking" or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access, test or harm the BNYM System or expose BNYM to harm through the BNYM System, other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted an Authorized User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 2 contracts
Sources: Transfer Agency and Shareholder Services Agreement (Fundrise Growth Tech Fund, LLC), Transfer Agency and Shareholder Services Agreement (Polen Credit Opportunities Fund)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement.; or
(xiii) engage in or attempt to engage in penetration testing or "ethical hacking" of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than in accordance with the security measures and access methods maintained by BNYM at the time..
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 2 contracts
Sources: Transfer Agency and Shareholder Services Agreement (EGA Emerging Global Shares Trust), Transfer Agency and Shareholder Services Agreement (Trust for Advised Portfolios)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;; Confidential And Proprietary Execution Version
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 2 contracts
Sources: Sub Transfer Agency and Shareholder Services Agreement (Virtus Insight Trust), Sub Transfer Agency and Shareholder Services Agreement (Virtus Equity Trust)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
; (xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (First Trust Series Fund)
Use Restrictions. (a) Company The Fund will not do or attempt to do, and Company the Fund will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Companythe Fund;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Companythe Fund’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Companythe Fund’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Companythe Fund’s systems or personnel or Companythe Fund’s use of the Licensed Services or CompanyFund’s activities in connection with this Agreement.; or
(xiii) engage in or attempt to engage in penetration testing or “ethical hacking” of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than in accordance with the security measures and access methods maintained by BNYM at the time..
(b) Company The Fund shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency Services Agreement (Old Westbury Funds Inc)
Use Restrictions. (a) Company and its Authorized Users will not do or attempt to do, and Company and its Authorized Users will not knowingly or through its negligence permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain or attempt to obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement.; or Confidential And Proprietary EXECUTION
(bxiii) Company shallengage in, promptly after becoming aware or attempt to engage in, vulnerability assessments or penetration testing of such, notify the BNYM System of any factsnature, circumstances “ethical hacking”, “white hat hacking” or events regarding its or a Permitted User’s use similar hacking of the Licensed BNYM System that are reasonably likely of any nature, or any other process or procedure intended to constitute identify or result exploit flaws, vulnerabilities or weaknesses in a breach of this Section 2.12the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access, test or harm the BNYM System or expose BNYM to harm through the BNYM System, other than access and take all reasonable steps requested use authorized by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or eventsin accordance with security measures and access methods approved by BNYM.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (Versus Capital Infrastructure Income Fund)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any Employee or any Permitted User who is employed by an Affiliate of the Management Companies to do or attempt to do, and Company will not through its negligence or intentional misconduct permit or facilitate any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or attempt to use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.; or
(xiii) engage in or attempt to engage in penetration testing or “ethical hacking” of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than in accordance with the security measures and access methods maintained by BNYM at the time..
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;; Confidential And Proprietary Execution Version
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, "ethical hacking", "white hat hacking" or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (Third Avenue Trust)
Use Restrictions. (a) Company and its Authorized Users will not do or attempt to do, and Company and its Authorized Users will not knowingly or through its negligence permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain or attempt to obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;; Confidential And Proprietary EXECUTION
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, "ethical hacking", "white hat hacking" or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access, test or harm the BNYM System or expose BNYM to harm through the BNYM System, other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted an Authorized User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (Fundrise Real Estate Interval Fund, LLC)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, penetration testing of the BNYM System of any nature, "ethical hacking" of the BNYM System of any nature, any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (FundVantage Trust)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;; Confidential And Proprietary Execution Version
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement.; or
(xiii) engage in or attempt to engage in penetration testing or "ethical hacking" of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than in accordance with the security measures and access methods maintained by BNYM at the time..
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Investor Services Agreement (Matthews a Share Selections Fund, LLC)
Use Restrictions. Confidential And Proprietary Execution Version
(a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, "ethical hacking", "white hat hacking" or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (Touchstone Funds Group Trust)
Use Restrictions. (a) Company and its Authorized Users will not do or attempt to do, and Company and its Authorized Users will not knowingly or through its negligence permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain or attempt to obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement; or Confidential And Proprietary EXECUTION
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, "ethical hacking", "white hat hacking" or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access, test or harm the BNYM System or expose BNYM to harm through the BNYM System, other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted an Authorized User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (Fundrise Income Real Estate Fund, LLC)
Use Restrictions. (a) Company and its Authorized Users will not do or attempt to do, and Company and its Authorized Users will not knowingly or through its negligence permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain or attempt to obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, “ethical hacking”,”white hat hacking” or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access, test or harm the BNYM System or expose BNYM to harm through the BNYM System, other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted an Authorized User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Unitholder Services Agreement (Afl Cio Housing Investment Trust)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;; C-80 Confidential And Proprietary Execution Version
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:: Confidential And Proprietary Execution Version (3)
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.; or
(xiii) engage in or attempt to engage in penetration testing or “ethical hacking” of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than in accordance with the security measures and access methods maintained by BNYM at the time..
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (Ramius Archview Credit & Distressed Fund)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;; Confidential And Proprietary Execution Version
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (TCW Alternative Funds)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement; or
(xiii) engage in or attempt to engage in (A) penetration testing or “ethical hacking” of the BNYM System, (B) any activity to gain access to or use of the BNYM System other than in accordance with the security measures and access methods approved by BNYM at the time, or (C) any other activity testing any aspect of the BNYM System or exposing the BNYM System to operational or other risks; provided, however, no operational activity engaged in as permitted by the Documentation shall be construed as a violation of this section 2.12(a).
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency Services Agreement (New Alternatives Fund Inc)
Use Restrictions. Customer and Authorized Users will use and access Cox Products and Cox Services solely for the purpose of managing and operating Customer’s business in the ordinary course or as otherwise set forth in the applicable Order Form. Customer and Customer Representatives may not:
(a) Company will Use or access any Cox Product or Third-Party Materials in a manner not do authorized under the applicable Order Form, Section 2 of this Agreement, or attempt any applicable Additional Product Terms or Attachments;
(b) Offer, sell, rent, lend, lease, license, pledge, transfer, distribute, provide access to door otherwise make available to any unauthorized Third-Party or use for service bureau or outsourcing purposes any Cox Product or Third-Party Materials or any information relating thereto;
(c) Reproduce, and Company will copy, modify, translate, reverse engineer, decompile or disassemble any Cox Product, or develop or create any derivative works of or relating to any Cox Product, Cox Service, or Third-Party Materials, or any underlying technology or intellectual property comprising any Cox Product, Cox Service, or Third-Party Materials;
(d) Violate any Law or any Intellectual Property Rights or other rights of any Third-Party or any Cox Affiliate in connection with any use of or access to any Cox Product, Cox Service, or Third-Party Materials; provided, however, Third-Party claims subject to ▇▇▇’▇ indemnification obligations under the Agreement shall not permit any other person or entity to do or attempt to do, any trigger a breach of the followingAgreement by Customer under this subsection;
(e) Attempt to gain unauthorized access to or disrupt the integrity or performance of any Cox Product or the data contained therein;
(f) Use a Cox Product in combination with any product or service that is not owned, directly provided, or indirectly:explicitly or implicitly authorized by Cox;
(g) Frame or utilize framing techniques to enclose any Cox Product (or portion thereof) without the prior written consent of Cox;
(h) Upload, store or maintain any Malicious Code, or infringing or unlawful material, on or within a Cox Product or any Third-Party Materials;
(i) Access or use any Proprietary Item Cox Product or Cox Service for any purposepurpose that is competitive with Cox or its products or services, at or for purposes of developing or promoting any location competing product or in any manner not specifically authorized by this Agreementservice;
(iij) make Permit direct access to or retain any copy use of any Proprietary Item except as specifically authorized a Cox Product by this Agreementa direct competitor of Cox;
(iiik) createUse a Cox Product for purposes of product evaluation, recreate benchmarking or obtain other comparative analysis without ▇▇▇’▇ prior written consent; provided, however, nothing in this Agreement shall prohibit Customer from exploring other products or services and internally comparing ▇▇▇’▇ offerings with or against those other services or providers in the source code for any Proprietary Itemnormal course of business as long as the results of such comparison of Cox Products are treated as the Confidential Information of Cox;
(ivl) refer to Publish, transfer, license, distribute or export any data from any Cox Product (other than by using the content export function or as otherwise use any Proprietary Item expressly contemplated in an applicable Order Form, if any, provided as part of any effort the applicable Cox Product), provided that in no event may Customer, Authorized Users use such exported data other than in the ordinary course of Customer’s business (which must not include offering, licensing, selling publishing or otherwise distributing data to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party ProviderThird-Parties independently of Customer’s business);
(vm) modify, adapt, translate Scrape or create derivative works based upon any Proprietary Item, data-mine a Cox Product Cox Service or combine or merge any Proprietary Item or part thereof with or into any other product website of Cox or service not provided for in this Agreement and not authorized in writing by BNYMits Affiliates (including through the use of any robot, spider or other automated device);
(vin) removeStore, erase maintain or tamper with any copyright transmit Consumer Information through a Cox Product or other proprietary notice printed Cox Service that is not intended to be used to process or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Companyreceive Consumer Information;
(viio) sellUse a Cox Product to harvest, transfer, assign collect or otherwise convey in assemble Consumer Information regarding any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on CompanyCustomer’s behalf or otherwisecustomers without such customers’ informed consent;
(viiip) subcontract for Disclose any Credentials relating directly to any Cox Product, Cox Service, or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwiseThird-Party Interfaces integrated therewith;
(ixq) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient Remove from or modify the circuit design, algorithms, logic, source code, object code alter any Cox Marks on a Cox Product or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;Cox Service; or
(xr) take Make any action that would challenge, contest, impair representations or otherwise adversely effect an ownership interest warranties regarding the functionality or Intellectual Property Right performance of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this AgreementCox Product.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Master Services Agreement (Rivian Automotive, Inc. / DE)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not knowingly permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s 's behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s 's behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM, provided, however, that the foregoing shall not be construed to impair Company’s rights to define and defend intellectual property rights in Company Data;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s 's systems or personnel or Company’s 's use of the Licensed Services or Company’s 's activities in connection with this Agreement.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s 's use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (Eaton Vance Growth Trust)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM BNY Mellon or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYMBNY Mellon;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYMBNY Mellon, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYMBNY Mellon;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYMBNY Mellon, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement; or
(xiii) engage in or attempt to engage in penetration testing or “ethical hacking” of the BNYM System or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use in accordance with the security measures and access methods maintained by BNY Mellon at the time.
(b) Company shall, promptly after becoming aware of such, notify BNYM BNY Mellon of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM BNY Mellon to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Administrative Services Agreement (Ironwood Multi-Strategy Fund LLC)
Use Restrictions. (a) Company will not do or attempt to doA. Licensee shall not, and Company will shall require its Authorized Users not permit any other person or entity to do or attempt to do, any of the followingto, directly or indirectly:
(i) use (including make any Proprietary Item for any purpose, at any location copies of) the Product or in any manner not specifically authorized by this Agreementdocumentation beyond the scope of the license granted under Section 2;
(ii) make provide any other person, including any subcontractor, independent contractor, affiliate, or retain any copy service provider of any Proprietary Item except as specifically authorized by this AgreementLicensee, with access to or use of the Product or documentation;
(iii) createmodify, recreate translate, adapt, or obtain otherwise create derivative works or improvements, whether or not patentable, of the source code for Product or documentation or any Proprietary Itempart thereof;
(iv) refer to combine the Product or otherwise use any Proprietary Item as part of thereof with, or incorporate the Product or any effort to develop part thereof in, any other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modifydisclose, adaptde-compile, translate decode, disassemble nor otherwise reverse engineer the Product or create derivative works based upon otherwise attempt to derive or gain access to the source code of the Product or any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing save to the extent expressly permitted by BNYMlaw;
(vi) remove, erase or tamper with create any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Companyderivative works based on the Product;
(vii) selluse the Product to provide facilities management or in connection with a service bureau or like activity whereby Licensee, transferwithout purchasing a license from Arcserve for such purpose, assign operates or otherwise convey in any manner any ownership interest or Intellectual Property Right uses the Product for the benefit of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwisea third party who has not purchased a copy of the Product;
(viii) subcontract for or delegate permit the performance use of the Product by any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwisethird party without the prior written consent of Arcserve;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify exchange the circuit design, algorithms, logic, source code, object code or program code or Authorized Use Limitation respecting the Product for any other properties, attributes, features or constituent Arcserve product. The Product is licensed as a single product. Its component parts of any Proprietary Itemmay not be separated for use;
(x) take remove, delete, alter, or obscure any action that would challengeproprietary markings, contesttrademarks or any copyright, impair trademark, patent, or otherwise adversely effect an ownership interest other intellectual property or Intellectual Property Right proprietary rights notices provided on or with the Product or documentation, including any copy thereof of BNYMArcserve or its licensors;
(xi) use any Proprietary Item to provide remote processingexcept as expressly set forth in herein, network processingcopy the Product or documentation, network communications, a service bureau in whole or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwisein part;
(xii) allow Harmful Code into any Proprietary Itemtransfer, as applicableassign, rent, lease, lend, sell, sublicense, distribute, publish, use, copy, transmit, embed, provided access to or otherwise make available the Product, or into any interface features or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use functionality of the Licensed Services Product, to any third party for any reason, whether or Company’s activities not over a network or on a hosted basis, including in connection with this Agreementthe internet or any web hosting, wide area network (WAN), virtual private network (VPN), virtualization, time-sharing, service bureau, software as a service, cloud, or other technology or service, or modify the product, in whole or in part, or permit others to do any of the foregoing with regard to the Product without Arcserve’s prior written consent, except to the extent the foregoing restriction is expressly prohibited under applicable law;
(xiii) use the Product or documentation in violation of any law, regulation, or rule;
(xiv) release the results of any benchmark testing of the Product to any third party without the prior written consent of Arcserve;
(xv) use the Product or documentation for purposes of competitive analysis of the Product, the development of a competing software product or service, or any other purpose that is to the Arcserve’s commercial disadvantage; and
(xvi) use Products for which Licensee has not paid and Arcserve has not received the applicable fees.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use B. The Product may be used only within the boundaries of the Licensed System that are reasonably likely to constitute or result country where the Product was purchased (except as otherwise provided on the Order Form) unless Arcserve consents otherwise in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or eventswriting.
Appears in 1 contract
Sources: End User License Agreement
Use Restrictions. Confidential And Proprietary Execution Version
(a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM (the foregoing shall not be construed as limiting in any way Company’s ability to defend itself in any dispute or litigation, including, but not limited to, challenging BNYM’s Intellectual Property Rights, nor shall the foregoing limiting Company’s ability to enforce and protect its own Intellectual Property Rights);
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) fail to use commercially reasonable efforts that allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement; or
(xiii) engage in, or attempt to engage in, vulnerability assessments or penetration testing of the BNYM System of any nature, “ethical hacking”, “white hat hacking” or similar hacking of the BNYM System of any nature, or any other process or procedure intended to identify or exploit flaws, vulnerabilities or weaknesses in the BNYM System, or otherwise engage in or attempt to engage in any activity to use, access or test or expose the BNYM System other than access and use authorized by BNYM in accordance with security measures and access methods approved by BNYM.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events. The foregoing, however, shall not be construed as requiring Company to institute any litigation or become a party to any litigation.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (Schwab Investments)
Use Restrictions. (a) Company will not do or attempt to do, and Company will not permit any other person or entity to do or attempt to do, any of the following, directly or indirectly:
(i) use or access or attempt to use or access any Proprietary Item for any purpose, at any location or in any manner not specifically authorized by this Agreement;
(ii) make or retain any copy of any Proprietary Item except as specifically authorized by this Agreement;
(iii) create, recreate or obtain the source code for any Proprietary Item;
(iv) refer to or otherwise use any Proprietary Item as part of any effort to develop other software, programs, applications, interfaces or functionalities or to compete with BNYM or a Third Party Provider;
(v) modify, adapt, translate or create derivative works based upon any Proprietary Item, or combine or merge any Proprietary Item or part thereof with or into any other product or service not provided for in this Agreement and not authorized in writing by BNYM;
(vi) remove, erase or tamper with any copyright or other proprietary notice printed or stamped on, affixed to, or encoded or recorded in any Proprietary Item, or fail to preserve all copyright and other proprietary notices in any copy of any Proprietary Item made by Company;
(vii) sell, transfer, assign or otherwise convey in any manner any ownership interest or Intellectual Property Right of BNYM, or market, license, sublicense, distribute or otherwise grant, or subcontract or delegate to any other person, including outsourcers, vendors, consultants, joint venturers and partners, any right to access or use any Proprietary Item, whether on Company’s behalf or otherwise;
(viii) subcontract for or delegate the performance of any act or function involved in accessing or using any Proprietary Item, whether on Company’s behalf or otherwise;
(ix) reverse engineer, re-engineer, decrypt, disassemble, decompile, decipher, reconstruct, re-orient or modify the circuit design, algorithms, logic, source code, object code or program code or any other properties, attributes, features or constituent parts of any Proprietary Item;
(x) take any action that would challenge, contest, impair or otherwise adversely effect an ownership interest or Intellectual Property Right of BNYM;
(xi) use any Proprietary Item to provide remote processing, network processing, network communications, a service bureau or time sharing operation, or services similar to any of the foregoing to any person or entity, whether on a fee basis or otherwise;
(xii) allow Harmful Code into any Proprietary Item, as applicable, or into any interface or other software or program provided by it to BNYM, through Company’s systems or personnel or Company’s use of the Licensed Services or Company’s activities in connection with this Agreement.
(b) Company shall, promptly after becoming aware of such, notify BNYM of any facts, circumstances or events regarding its or a Permitted User’s use of the Licensed System that are reasonably likely to constitute or result in a breach of this Section 2.12, and take all reasonable steps requested by BNYM to prevent, control, remediate or remedy any such facts, circumstances or events or any future occurrence of such facts, circumstances or events.
Appears in 1 contract
Sources: Transfer Agency and Shareholder Services Agreement (CRM Mutual Fund Trust)