Locking Devices. Some Software may require the use of a key to prevent unauthorized installation and use of the Software, but the Software may not include expiration codes, “time bombs”, or similar devices that can disable the software once a proper key is provided. Further, the software may not contain any routines, functions, or devices that can or are designed to transmit or transfer any data surreptitiously to the Contractor or any other party. Nor may the software contain any routines, functions, or similar devices designed to permit the Contractor or a third party to surreptitiously access data on the State’s network or on any of the State’s computers. Should the State need assistance with a key or similar device to use the Software within the State’s scope of license, the Contractor will assist the State at any time and without charge or fee, regardless of whether such Software is then under Support.
Appears in 3 contracts
Sources: Software Licensing Agreement, Master Contract for Software Licensing, Software Licensing Agreement