Access to Source Codes Sample Clauses

Access to Source Codes. The Vendor grants the Owner a right to access the Source Code and to modify the Software (the "RTM License") for the maintenance, enhancement and support of those Products purchased from the Vendor and owned or operated by the Owner under the following circumstances which will be set forth in the Escrow Agreement:
AutoNDA by SimpleDocs
Access to Source Codes. The Vendor represents and warrants that as of the date hereof, Vendor has not established a Source Code escrow for any of its existing customers. In the event that Vendor establishes a Source Code escrow in the future which applies to any of the Software furnished to Owner hereunder, Vendor shall add Owner as a beneficiary of such Source Code escrow, and Owner shall be entitled to receive a copy of the escrowed Source Code in the event of the occurrence of any of the events set out below. In addition to the foregoing, the Vendor shall immediately deliver and hereby grants the Owner a right to access the Source Code and to modify the Software (the "RTM License") for the maintenance, enhancement and support of those Products purchased from the Vendor and owned or operated by the Owner under the following circumstances, provided that any such released Source Code shall be subject to the confidentiality provisions set forth in this Contract:
Access to Source Codes. Vendor represents and warrants that as of the date hereof, Vendor has not established a Source Code escrow for any of its existing U.S. CDMA customers. In the event that Vendor establishes a Source Code escrow in the future for a U.S. CDMA customer which applies to any of the Vendor Software furnished hereunder, Vendor shall add Cricket as a beneficiary of such Source Code escrow, and Cricket shall be entitled to receive a copy of the escrowed Source Code in the event of the occurrence of a “Triggering Event” as defined below. Additionally, upon the occurrence of a Triggering Event, as defined below, Vendor, to the extent of its legal right to do so, shall (i) deliver a copy of Software Source Code to Cricket and (ii) grant to Cricket a non-exclusive, non-transferable, royalty-free and perpetual license to access the Software source code and to modify the Vendor Software reasonably required to enable to Cricket to maintain and support the Products purchased under this Agreement in respect of their installed base of Products. For the purposes of this section “Triggering Event” shall be deemed to have occurred only if Nortel Networks Corporation (i) ceases to conduct business generally or ceases to make available technical assistance and support services for Products that are eligible for support under this Agreement, (ii) concludes a liquidation proceeding under Chapter 7 of Title 11 of the United States Code or under the Bankruptcy and Insolvency Act (Canada), or (iii) reorganizes under Chapter 11 of Title 11 of the United States Code or under any Nortel Networks and Cricket Communications Proprietary and Confidential Information other similar provision of the laws of Canada and in either such case rejects this Agreement in connection with such reorganization, AND ONLY IF none of Vendor, Nortel Networks Corporation, a successor entity or any transferee of Nortel Networks Corporation’s business related to the Products continue to sell or license the Products, functionally equivalent equipment and replacement parts nor offer technical assistance or support services for the Products under commercially reasonable terms and conditions. Any such released Vendor Software Source Code (i) shall not include Software that is no longer supported under the terms of the Agreement; (ii) shall not include Software that is licensed to Vendor by a third party under a license pursuant to which Vendor has no right to sublicense source code; (iii) shall be subject to the confi...
Access to Source Codes. Vendor represents and warrants that as of the date hereof, Vendor has not established a Source Code escrow for any of its existing customers. In the event that Vendor establishes a Source Code escrow in the future which applies to any of the Software furnished hereunder, Vendor shall add Cricket as a beneficiary of such Source Code escrow, and Cricket shall be entitled to receive a copy of the escrowed Source Code in the event of the occurrence of any of the events set out below. In addition to the foregoing, Vendor shall immediately deliver and hereby grants Cricket a right to access the Source Code and to modify the Software (the “RTM License”) for the maintenance, enhancement and support of those Products purchased from Vendor and owned or operated by any Company under the following circumstances, provided that any such released Source Code shall be subject to the confidentiality provisions set forth in this Agreement: Cricket Communications Proprietary and Confidential Information

Related to Access to Source Codes

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Source Code 5.1 Nothing in this XXXX shall give to the User or any other person any right to access or use the Source Code or constitute any licence of the Source Code.

  • Access to Services Subject to and in accordance with the terms of this Agreement, including any Schedules, Company grants You a non-exclusive, non-sublicensable, nontransferable, non-assignable, revocable license for the term of this Agreement to access and use the Services. Services may only be used by Your Users for internal business purposes only. You agree to comply with the terms and conditions of this Agreement, including any Schedules, and with all applicable Company procedures and policies that further define use of the Services. You acknowledge and agree that the actions of any of Your Users with respect to the Services will be deemed to be actions by You and that any breach by any of Your Users of the terms of this Agreement, including any Schedule, will be deemed to be a breach by You.

  • Usernames and Passwords 1. Staff will not share usernames and passwords with anyone, including supervisors and technical support staff.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Investment; Access to Data The undersigned has carefully reviewed and understands the risks of, and other considerations relating to, a purchase of the Common Stock and an investment in the Company. The undersigned has been furnished materials relating to the Company, the private placement of the Common Stock or anything else that it has requested and has been afforded the opportunity to ask questions and receive answers concerning the terms and conditions of the offering and obtain any additional information which the Company possesses or can acquire without unreasonable effort or expense. Representatives of the Company have answered all inquiries that the undersigned has made of them concerning the Company, or any other matters relating to the formation and operation of the Company and the offering and sale of the Common Stock. The undersigned has not been furnished any offering literature other than the materials that the Company may have provided at the request of the undersigned; and the undersigned has relied only on such information furnished or made available to the undersigned by the Company as described in this Section. The undersigned is acquiring the Shares for investment for the undersigned's own account, not as a nominee or agent and not with the view to, or for resale in connection with, any distribution thereof. The undersigned acknowledges that the Company is a start-up company with no current operations, assets or operating history, which may possibly cause a loss of Purchaser’s entire investment in the Company.

  • Access to Work Locations Reasonable access to employee work locations shall be granted officers of the Association and their officially designated representatives for the purpose of processing grievances or contacting members of the Association concerning business within the scope of representation. Such officers or representatives shall not enter any work location without the consent of the City Manager. Access shall be restricted so as not to interfere with the normal operations of the department or with established safety or security requirements. Solicitation of membership and activities concerned with the internal management of the Association, such as collecting dues, holding membership meetings, campaigning for office, conducting elections and distributing literature, shall not be conducted during working hours.

  • Access to Company Information (a) The Company shall (and shall cause each Company Subsidiary to) permit representatives of the Parent to have full access (at all reasonable times, and in a manner so as not to interfere with the normal business operations of the Company and the Company Subsidiaries) to all premises, properties, financial and accounting records, contracts, other records and documents, and personnel, of or pertaining to the Company and each Company Subsidiary.

Time is Money Join Law Insider Premium to draft better contracts faster.