Our Technology; Internal Software Sample Clauses

Our Technology; Internal Software. To facilitate the provision of the Services, we may provide your designated users (each, a “User”) with access to and use of functionality of website(s), cloud software services, software tools, automated forms and other technologies developed by or for us (collectively, “Our Technology”). You are responsible for: (a) the confidentiality of User access credentials that are in your possession or control; (b) setting up appropriate internal roles, permissions, policies and procedures for the safe and secure use of Our Technology, (c) your Users’ use of Our Technology; and (d) your Users’ compliance with the Agreement, including our Acceptable Use Policy, and applicable laws. You must notify us promptly if you become aware, or reasonably suspect, that your account’s security has been compromised. To efficiently provide the Services, we use certain internal technologies and tools developed by or for us, such as integrations with Third-Party Services, software rules, checklists and other technologies (collectively, “Internal Software”). You agree to reasonably cooperate with us to enable us to use Internal Software in the provision of the Services and to refrain from interfering with the operation of Internal Software. If you obtain new, or make changes to, information technology systems or services that contain relevant data for the Services, you agree to notify us promptly and reasonably cooperate with us to facilitate the efficient use of Internal Software.

Related to Our Technology; Internal Software

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.