Common use of Limitations on Access Clause in Contracts

Limitations on Access. Customer shall not: (a) sell, lease or sublease access to the Data Products; (b) copy, decompile, or reverse engineer any portion of the Data Products; (c) use the Data Products to provide third party processing services to other parties, commercial timesharing, rental or sharing arrangements, or on a “service bureau” basis; (d) remove any StreetLight titles, trademark symbols, copyright symbols and restrictive legends; (e) bypass or disable any protections that may be put in place to provide security for the Data Products or to protect against unlicensed use of the Data Products; (f) use the Data Products to store, transmit or produce infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; (g) introduce into the Data Products, or use the Data Products to transmit, viruses, Trojan horses and other harmful or malicious code; (h) interfere with or disrupt the integrity or performance of the Data Products or third-party data contained therein; or (i) use the Data Products with any products, systems, or applications for or in connection with (1) real time navigation or route guidance, including but not limited to turn-by-turn route guidance that is synchronized to the position of a User's or a third party’s sensor-enabled device; or (2) any systems or functions for automatic or autonomous control of vehicle behavior.

Appears in 4 contracts

Samples: Sample Master Data Access Agreement, Master Data Access Agreement, Master Data Access Agreement

AutoNDA by SimpleDocs

Limitations on Access. Customer shall not: (a) sell, lease or sublease access to the Data Products; (b) copy, decompile, or reverse engineer any portion of the Data Products; (c) use the Data Products to provide third party processing services to other parties, commercial timesharing, rental or sharing arrangements, or on a “service bureau” basis; (d) remove any StreetLight titles, trademark symbols, copyright symbols and restrictive legends; (e) bypass or disable any protections that may be put in place to provide security for the Data Products or to protect against unlicensed use of the Data Products; (f) use the Data Products to store, transmit or produce infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights; (g) introduce into the Data Products, or use the Data Products to transmit, viruses, Trojan horses and other harmful or malicious code; (h) interfere with or disrupt the integrity or performance of the Data Products or third-third- party data contained therein; or (i) use the Data Products with any products, systems, or applications for or in connection with (1) real time navigation or route guidance, including but not limited to turn-by-turn route guidance that is synchronized to the position of a User's or a third party’s sensor-enabled device; or (2) any systems or functions for automatic or autonomous control of vehicle behavior.

Appears in 1 contract

Samples: Access Agreement

AutoNDA by SimpleDocs
Time is Money Join Law Insider Premium to draft better contracts faster.