Licensing Rules for Programs Licensed per UPK Module Clause Samples

This clause defines the specific terms and conditions under which software programs are licensed on a per UPK (User Productivity Kit) module basis. It outlines how each module is considered a separate licensable unit, meaning customers must obtain a license for each individual module they wish to use. For example, if a suite contains multiple UPK modules, a license is required for each module accessed or deployed. The core function of this clause is to clarify licensing obligations and prevent unauthorized use by ensuring that each module is properly licensed, thereby reducing ambiguity and potential disputes over software usage rights.
POPULAR SAMPLE Copied 1 times
Licensing Rules for Programs Licensed per UPK Module.  Oracle grants to You a non-exclusive, nontransferable license for Your UPK Developer(s) to: (i) use those User Productivity Kit ("UPK") Programs licensed as UPK modules (collectively referred to as “UPK content”) only as necessary to create and provide training solely for Employee and/or Application Users to use the underlying Programs for Your benefit; (ii) make an unlimited number of copies of the UPK content only as necessary to create and provide training solely to Employees and/or Application Users to use the underlying Programs for Your benefit; and (iii) develop modifications and customizations to the UPK content, if applicable, all subject to the terms and conditions set forth in this agreement, provided all copyright notices are reproduced as provided on the original. You represent and warrant that You have a valid license for the underlying Program(s). You are prohibited from reselling or distributing the UPK content to any other party or using the UPK content other than as explicitly permitted in this agreement. Oracle represents that the UPK content and any content created by You using the UPK content contains valuable proprietary information. Oracle retains title to all portions of the UPK content and any copies thereof. You shall use UPK content modifications created by You solely for Your internal use in accordance with the terms of this agreement. You may provide access to and use of the UPK content only to those third parties that are licensed as Application Users and that: (a) provide services to You concerning Your use of the UPK content; (b) have a need to use and access the UPK content; and (c) have agreed to substantially similar non-disclosure obligations imposed by You as those contained in this agreement. Application and Employee User(s) of UPK Programs may view and interact with simulations and documentation but may not create or modify simulations or documentation.

Related to Licensing Rules for Programs Licensed per UPK Module

  • Software License Terms (a) Software that is made available by a Provider to Recipient in connection with any Service (any such Software being referred to herein as “TSA-Licensed Software”) provided hereunder will be subject to the terms set forth in this Section 3.5 except as otherwise provided in the applicable Service Schedule. The Provider hereby grants to the Recipient a non-exclusive, non-transferable license to use, in object code form, any TSA-Licensed Software that is made available by the Provider pursuant to a Service Schedule. For the avoidance of doubt, the Provider that makes available any TSA-Licensed Software in connection with the provision of any Service retains the unrestricted right to enhance or otherwise modify such TSA-Licensed Software at any time, provided that such enhancements or other modifications do not disrupt the provision of such Service to the Recipient. (b) The Recipient may not exceed the number of licenses, agents, tiers, nodes, seats, or other use restrictions or authorizations, if any, specified in the applicable Service Schedule. Some TSA-Licensed Software may require license keys or contain other technical protection measures. The Recipient acknowledges that the Provider may monitor the Recipient’s compliance with use restrictions and authorizations remotely, or otherwise. If the Provider makes a license management program available which records and reports license usage information, the Recipient agrees to appropriately install, configure and execute such license management program. (c) Unless otherwise permitted by the Provider, the Recipient may only make copies or adaptations of the TSA-Licensed Software for archival purposes or when copying or adaptation is an essential step in the authorized use of TSA-Licensed Software. If the Recipient makes a copy for backup purposes and installs such copy on a backup device, the Recipient may not operate such backup installation of the TSA-Licensed Software without paying an additional license fee, except in cases where the original device becomes inoperable. If a copy is activated on a backup device in response to failure of the original device, the use on the backup device must be discontinued when the original or replacement device becomes operable. The Recipient may not copy the TSA-Licensed Software onto or otherwise use or make it available on, to, or through any public or external distributed network. Licenses that allow use over the Recipient’s intranet require restricted access by authorized users only. (d) The Recipient must reproduce all copyright notices that appear in or on the TSA-Licensed Software (including documentation) on all permitted copies or adaptations. Copies of documentation are limited to internal use. (e) Notwithstanding anything to the contrary herein, certain TSA-Licensed Software may be licensed under the applicable Service Schedule for use only on a computer system owned, controlled, or operated by or solely on behalf of the Recipient and may be further identified by the Provider by the combination of a unique number and a specific system type (“Designated System”) and such license will terminate in the event of a change in either the system number or system type, an unauthorized relocation, or if the Designated System ceases to be within the possession or control of the Recipient. (f) The Recipient will not modify, reverse engineer, disassemble, decrypt, decompile, or make derivative works of the TSA-Licensed Software. Where the Recipient has other rights mandated under statute, the Recipient will provide the Provider with reasonably detailed information regarding any intended modifications, reverse engineering, disassembly, decryption, or decompilation and the purposes therefor. (g) The Recipient may permit a consultant or subcontractor to use TSA-Licensed Software at the licensed location for the sole purpose of providing services to the Recipient. (h) Upon expiration or termination of the Service Schedule under which TSA-Licensed Software is made available, the Recipient will destroy the TSA-Licensed Software. The Recipient will remove and destroy or return to the Provider any copies of the TSA-Licensed Software that are merged into adaptations, except for individual pieces of data in the Recipient’s database. The Recipient will provide certification of the destruction of TSA-Licensed Software, and copies thereof, to the Provider. The Recipient may retain one copy of the TSA-Licensed Software subsequent to expiration or termination solely for archival purposes. (i) The Recipient may not sublicense, assign, transfer, rent, or lease the TSA-Licensed Software to any other person except as permitted in this Section 3.5. (j) The Recipient agrees that the Provider may engage a third party designated by the Provider and approved by the Recipient (such approval not to be unreasonably withheld) to audit the Recipient’s compliance with the Software License terms. Any such audit will be at the Provider’s expense, require reasonable notice, and will be performed during normal business hours. Such third party will be required to execute a non-disclosure agreement that restricts such third party from disclosing confidential information of the Recipient to the Provider, except to the extent required to report on the extent to which the Recipient is not in compliance with the Software License terms.

  • Software Licenses Seller has all necessary licenses to use all material third-party software used in Seller's business, and Seller's use of third-party software does not infringe the rights of any Person.

  • End User License Agreement This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. ▇▇▇▇://▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/licenses/by-nc-nd/3.0/ You are free to: Share: to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work).

  • First Source Hiring Program Contractor must comply with all of the provisions of the First Source Hiring Program, Chapter 83 of the San Francisco Administrative Code, that apply to this Agreement, and Contractor is subject to the enforcement and penalty provisions in Chapter 83.

  • Software Licensing A. Sourcewell selected The Gordian Group’s (Gordian) software, data and services (IQCC System) for their IQCC program. The system includes Gordian’s proprietary ezIQC, eGordian and Bid Safe IQCC applications (IQCC Applications) and construction cost data (Construction Task Catalog), which shall be used by the Contractor to prepare and submit Price Proposals, subcontractor lists, and other requirements specified by Sourcewell and Sourcewell Members. The Contractor’s use, in whole or in part, of ▇▇▇▇▇▇▇’s IQCC Applications and Construction Task Catalog and other proprietary materials provided by ▇▇▇▇▇▇▇ for any purpose other than to execute work under this Contract for Sourcewell and Sourcewell Members is strictly prohibited unless otherwise stated in writing by ▇▇▇▇▇▇▇. The Contractor hereby agrees to abide by the terms of the following IQCC System License: