Security and authentication. (a) The Software may be accessed by one of two ways: (i) Cloud authentication; or (ii) Dongle authentication. (b) For Cloud authentication, the Licensee agrees and acknowledges that the Software will be inoperable unless the computer on which the Software is installed can access the Cloud service to authenticate the Software. (c) For Dongle authentication, the Licensee agrees and acknowledges that the Software will be inoperable unless a Dongle provided by the Licensor is attached to the computer on which the Software is to be installed. (d) The Dongle remains the property of the Licensor at all times. (e) The Licensee agrees: (i) to comply with the Software Security Policy found at [▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/licensing/]; and (ii) that use of the Software is subject to that Software Security Policy.
Appears in 3 contracts
Sources: Software License Agreement, Software License Agreement, Software License Agreement
Security and authentication. (a) The Software may be accessed by one of two ways:
(i) Cloud authentication; or
(ii) Dongle authentication.
(b) For Cloud authentication, the Licensee agrees and acknowledges that the Software will be inoperable unless the computer on which the Software is installed can access the Cloud service to authenticate the Software.
(c) For Dongle authentication, the Licensee agrees and acknowledges that the Software will be inoperable unless a Dongle provided by the Licensor is attached to the computer on which the Software is to be installed.
(d) The Dongle remains the property of the Licensor at all times.
(e) The Licensee agrees:
(i) to comply with the Software Security Policy found at [▇▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇/licensing/]/security-policy; and
(ii) that use of the Software is subject to that Software Security Policy.
Appears in 1 contract
Sources: Software License Agreement