Third Party Software 1. The Software may contain third party software that requires and/or additional terms and conditions. Such required third party software notices and/or additional terms and conditions are located at xxxx://xxx.xxxxxxxxx.xxx/thirdparty/index.html and are made a part of and incorporated by reference into this XXXX. By accepting this XXXX, You are also accepting the additional terms and conditions, if any, set forth therein.
SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.
Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.
Patent/Copyright Materials/Proprietary Infringement Unless otherwise expressly provided in this Contract, Contractor shall be solely responsible for clearing the right to use any patented or copyrighted materials in the performance of this Contract. Contractor warrants that any software as modified through services provided hereunder will not infringe upon or violate any patent, proprietary right, or trade secret right of any third party. Contractor agrees that, in accordance with the more specific requirement contained in paragraph “HH” below, it shall indemnify, defend and hold County and County Indemnities harmless from any and all such claims and be responsible for payment of all costs, damages, penalties and expenses related to or arising from such claim(s), including, but not limited to, attorney’s fees, costs and expenses.
Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.
Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.
Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.
Infringement of Third Party Rights Each party shall promptly notify the other in writing of any allegation by a Third Party that the activity of either of the parties hereunder infringes or may infringe the intellectual property rights of such Third Party. Allergan shall have the first right but not the obligation to control any defense of any such claim involving alleged infringement of Third Party rights by Allergan’s activities under this Agreement at its own expense and by counsel of its own choice, and ACADIA shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. If Allergan fails to proceed in a timely fashion with regard to such defense, ACADIA shall have the right but not the obligation to control any such defense of such claim at its own expense and by counsel of its own choice, and Allergan shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. ACADIA shall have the first right but not the obligation to control any defense of any such claim involving alleged infringement of Third Party rights by ACADIA’s activities under this Agreement at its own expense and by counsel of its own choice, and Allergan shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. If ACADIA fails to proceed in a timely fashion with regard to such defense, Allergan shall have the right but not the obligation to control any such defense of such claim at its own expense and by counsel of its own choice, and ACADIA shall have the right but not the obligation, at its own expense, to be represented in any such action by counsel of its own choice. Neither party shall have the right to settle any infringement action under this Section 10.5 in a manner that diminishes the rights or interests of the other party without the consent of such party.
Malicious Software 12.1 The Supplier shall, as an enduring obligation throughout the Term, use the latest versions of anti-virus definitions available [from an industry accepted anti-virus software vendor] to check for and delete Malicious Software from the ICT Environment.
Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.