By Sysdig Sample Clauses

By Sysdig. Sysdig shall defend Customer from and against any claim by a third party alleging that the Service when used as authorized under this Agreement infringes any trademark or copyright of such third party, enforceable in the jurisdiction of Customer’s use of the SaaS Service, or misappropriates a trade secret (but only to the extent that such misappropriation is not a result of Customer’s actions) (“Infringement Claim”) and shall indemnify and hold harmless Customer from and against any damages and costs awarded against Customer by a court of competent jurisdiction or agreed in settlement by Sysdig (including reasonable attorneys’ fees) resulting from such Infringement Claim. Sysdig will have no obligation and assumes no liability under this Section 8 or otherwise with respect to any claim based on: (1) if the Service is modified by any party other than Sysdig, but solely to the extent the alleged infringement is caused by such modification; (2) if the Service is combined, operated or used with any Customer Data or any Customer or third party products, services, hardware, data, content, or business processes not provided by Sysdig where there would be no infringement Claim but for such combination; (4) to any action arising as a result of Customer Data or any third-party deliverables or components contained within the Service; (5) if Customer settles or makes any admissions with respect to a claim without Sysdig’s prior written consent; or (6) to any use provided on a no-charge or evaluation basis. THIS SECTION 8 SETS FORTH SYSDIG’S AND ITS SUPPLIERS’ SOLE LIABILITY AND CUSTOMER’S SOLE AND EXCLUSIVE REMEDY WITH RESPECT TO ANY CLAIM OF INTELLECTUAL PROPERTY INFRINGEMENT.
AutoNDA by SimpleDocs
By Sysdig. Sysdig shall defend Customer from and against any claim by a third party alleging that the Software, when used as authorized under this Agreement, infringes any trademark or copyright of such third party, enforceable in the jurisdiction of Customer’s use of the Software, or misappropriates a trade secret (but only to the extent that such misappropriation is not a result of Customer’s actions) (“Infringement Claim”) and shall indemnify and hold harmless Customer from and against any damages and costs awarded against Customer by a court of competent jurisdiction or agreed in settlement by Sysdig (including reasonable attorneys’ fees) resulting from such Infringement Claim, provided that Customer: (a) promptly provides Sysdig with a written notice of the Infringement Claim; (b) allows Sysdig sole control of the defense and settlement of the Infringement Claim; and (c) reasonably cooperated in response to Sysdig’s requests for assistance and information. The Customer may participate in the defense of the Infringement Claim, at the Customer’s sole expense (not subject to reimbursement). Customer will not, without Sysdig’s prior written consent, make any admission or prejudicial statement, settle, compromise or consent to the entry of any judgement with respect to any pending or threatened Infringement Claim.
By Sysdig. Sysdig shall defend Customer from and against any claim by a third party alleging that the Software, when used as authorized under this Agreement, infringes any trademark or copyright of such third party, enforceable in the jurisdiction of Customer’s use of the Software, or misappropriates a trade secret (but only to the extent that such misappropriation is not a result of Customer’s actions) (“Infringement Claim”) and shall indemnify and hold harmless Customer from and against any damages and costs awarded against Customer by a court of competent jurisdiction or agreed in settlement by Sysdig (including reasonable attorneys’ fees) resulting from such Infringement Claim, provided Sysdig, Inc. |000 Xxxx Xxxxxx, 00xx Xxxxx, Xxx Xxxxxxxxx, XX 00000 | 415-872-9473 | xxx.xxxxxx.xxx
By Sysdig. Sysdig shall hold Customer harmless from liability of unaffiliated parties resulting from infringement of the SaaS Service of any copyright enforceable in the jurisdiction of Customer’s use of the SaaS Service, or misappropriates a trade secret (but only to the extent that such misappropriation is not a result of Customer’s actions) (“Infringement Claim”) , provided Sysdig is promptly notified of any and all threats, claims and proceedings related thereto and given reasonable assistance and the opportunity to assume control over defense and settlement. Sysdig will have no obligation and assumes no liability under this Section 9 or otherwise with respect to any claim based on: (a) if the Service is modified by any party other than Sysdig, but solely to the extent the alleged infringement is caused by such modification; (b) if the Service is combined, operated or used with any Customer Data or any Customer or third party products, services, hardware, data, content, or business processes not provided by Sysdig; (c) to any action arising as a result of Customer Data or any third-party deliverables or components contained within the Service;

Related to By Sysdig

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Equipment and Software Requirements In order to view and retain electronic communications that we make available to you, you must have: • A PC or other device with an Internet browser that has “cookies” enabled and supports 128 bit encryption • An Internet connection • An email address • A PDF viewer (such as Adobe Reader) • A printer or computer with sufficient electronic storage space All communications shall be delivered to the last address we have on file for you. These notices will be sent through electronic delivery (email) and will be considered delivered the same day as sent. If you have opted out of electronic delivery, communications sent to you through the United States Postal Service are considered delivered 5 business days after the postmark date. It is your responsibility to notify the Custodian of any email address change or residential address change. We will not be held liable for any losses or damages if you have not provided Custodian with the most current address information. The electronically signed copy of this document should be considered equivalent to a printed hard copy form. It is considered a true and complete record of the document, admissible in arbitration and/or administrative hearings or proceedings. Your electronic signature on the Application and other electronic forms such as the Investment Direction are considered valid and the same as if the paper form or Application were signed.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • E10 Malicious Software E10.1 The Contractor shall, as an enduring obligation throughout the Contract Period, use the latest versions of anti-virus definitions available from an industry accepted anti-virus software vendor to check for and delete Malicious Software from the ICT Environment.

  • Equipment and Software To use the Mobile Remote Deposit Services, you must obtain and maintain at your expense, compatible equipment and software that we may specify from time to time.

Time is Money Join Law Insider Premium to draft better contracts faster.