Common use of Customer Restrictions Clause in Contracts

Customer Restrictions. Customers and Authorized Users will comply with the applicable Documentation and the copyright laws of the United States and all other relevant jurisdictions (including the copyright laws where Customer uses the Services) in connection with their use of the Services. Customer will not, and will not allow others including the Authorized Users, to make the Services available for use by unauthorized third parties, including via a commercial rental or sharing arrangement; reverse engineer, disassemble, or reprogram software used to provide the Services or any portion thereof to a human- readable form; modify, create derivative works of, or merge the Services or software used to provide the Services with other software; copy, reproduce, distribute, lend, or lease the Services or Documentation for or to any third party; take any action that would cause the Services, software used to provide the Services, or Documentation to be placed in the public domain; use the Services to compete with Motorola; remove, alter, or obscure, any copyright or other notice; share user credentials (including among Authorized Users); use the Services to store or transmit malicious code; or attempt to gain unauthorized access to the Services or its related systems or networks.

Appears in 1 contract

Samples: Cyber Security Services

AutoNDA by SimpleDocs

Customer Restrictions. Customers and Authorized Users will comply with the applicable Documentation and the copyright laws of the United States and all other relevant jurisdictions (including the copyright laws where Customer uses the Services) in connection with their use of the Services. Customer will not, and will not allow others including the Authorized Users, to make the Services available for use by unauthorized third parties, including via a commercial rental or sharing arrangement; reverse engineer, disassemble, or reprogram software used to provide the Services or any portion thereof to a human- human-readable form; modify, create derivative works of, or merge the Services or software used to provide the Services with other software; copy, reproduce, distribute, lend, or lease the Services or Documentation for or to any third party; take any action that would cause the Services, software used to provide the Services, or Documentation to be placed in the public domain; use the Services to compete with Motorola; remove, alter, or obscure, any copyright or other notice; share user credentials (including among Authorized Users); use the Services to store or transmit malicious code; or attempt to gain unauthorized access to the Services or its related systems or networks.

Appears in 1 contract

Samples: Cyber Security Services

Customer Restrictions. Customers and Authorized Users will comply with the applicable Documentation Documentation, if any, and the copyright laws of the United States and all other relevant jurisdictions (including the copyright laws where Customer uses the Services) in connection with their use of the Services. Customer will not, and will not allow others including the Authorized Users, to make the Services available for use by unauthorized third parties, including via a commercial rental or sharing arrangement; reverse engineer, disassemble, or reprogram software used to provide the any Subscription Services or any portion thereof to a human- human-readable form; modify, create derivative works of, or merge the Services or software used to provide the Services with other software; copy, reproduce, distribute, lend, or lease the Services or Documentation for or to any third party; take any action that would cause the Services, software used to provide the Services, or Documentation to be placed in the public domain; use the Services to compete with Motorola; remove, alter, or obscure, any copyright or other notice; share user credentials to Subscription Services (including among Authorized Users); use the Services to store or transmit malicious code; or attempt to gain unauthorized access to the Subscription Services or its related systems or networks.

Appears in 1 contract

Samples: Cyber Security Services Agreement

AutoNDA by SimpleDocs

Customer Restrictions. Customers and Authorized Users will comply with the applicable Documentation Documentation, if any, and the copyright laws of the United States and all other relevant jurisdictions (including the copyright laws where Customer uses the Services) in connection with their use of the Services. Customer will not, and will not allow others including the Authorized Users, to make the Services available for use by unauthorized third parties, including via a commercial rental or sharing arrangement; reverse engineer, disassemble, or reprogram software used to provide the any subscription Services or any portion thereof to a human- human-readable form; modify, create derivative works of, or merge the Services or software used to provide the Services with other software; copy, reproduce, distribute, lend, or lease the Services or Documentation for or to any third party; take any action that would cause the subscription Services, software used to provide the Services, or Documentation to be placed in the public domain; use the Services to compete with Motorola; remove, alter, or obscure, any copyright or other notice; share user credentials to subscription Services (including among Authorized Users); use the Services to store or transmit malicious code; or attempt to gain unauthorized access to the subscription Services or its related systems or networks.

Appears in 1 contract

Samples: Cyber Security Services Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.