VANS NAVIGATION SOFTWARE Clause Samples

VANS NAVIGATION SOFTWARE. To the extent that either party or any Affiliate or Sublicensee of such party employs a "lock-out" or similar mechanism designed to prevent or hinder the use of unauthorized VANS Navigation Software on its VANS Hardware, and such entity permits any third party other than an Affiliate of such entity to create VANS Navigation Software that can be used on such party's VANS Hardware, the other party to this agreement will thereupon be deemed to have the nonexclusive right to make, have made, practice, have practiced, copy, distribute, transmit, create derivative works based upon, use, lease, sell and otherwise transfer and exercise all proprietary rights in and to Interoperable VANS Navigation Software, and such entity will provide such technical information reasonably necessary to permit the other party to make such VANS Navigation Software, subject to the same geographic limitations imposed on such third party. By way of example only, if either party permits an unrelated third party to create Interoperable VANS Navigation Software that can be used on such party's VANS Hardware and to distribute such VANS Navigation Software in Japan, such party will provide the other party with such technical information reasonable necessary to permit the other party to make Interoperable VANS Navigation Software, and the other party shall have the right to create Interoperable VANS Navigation Software and distribute such Interoperable VANS Navigation Software in Japan.

Related to VANS NAVIGATION SOFTWARE

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Server Software Subject to the terms and conditions of this ▇▇▇▇, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.