Security for access to source code, etc Sample Clauses

Security for access to source code, etc. The Customer may, in Appendix 1, stipulate a requirement that the Contractor shall offer the Customer an agreement concerning access to source code or some other solution (for example, a performance bond from its parent company or an associated company) that satisfactorily secures the Customer's interests should the Contractor go bankrupt or for some other reason be unable, or cease, to deliver its services pursuant to this Agreement or an associated maintenance agreement. In those circumstances where the Customer is entitled to access to the source code pursuant to this provision or have arrangements put in place to fulfil this provision, the Customer shall have an expanded right of disposal that covers the right to use, copy, modify and develop the deliverables itself, or with the aid of a third party, to the extent necessary to achieve the purpose of the procurement.
AutoNDA by SimpleDocs
Security for access to source code, etc. The Contractor shall place a copy of the source code to the software in escrow with a neutral third party ("the Escrow Agent"), appointed jointly by the parties, entitled to grant the Customer access to the source code if the Contractor becomes unable or ceases to perform its obligations under the agreement or the associated Maintenance Agreement. If the parties do not agree on an Escrow Agent or the terms and conditions governing the escrow agreement, the source code shall be placed in escrow with Nordic Trustee under its standard escrow terms. The Contractor undertakes to place a copy of the at the time current version of the source code in escrow no later than MS 12, cf. SSA-T appendix 4, and subsequently without undue delay after release of any updates to or new versions of the software in accordance with the maintenance agreement (SSA-V). The Contractor shall document that the source code has been placed in escrow as agreed.

Related to Security for access to source code, etc

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • FOREIGN ACCESS TO TECHNOLOGY This Article shall remain in effect during the term of the Agreement and for (INSERT NUMBER OF YEARS) ( ) years thereafter.

  • Access to Site 3.05.1 Contractor may enter and leave the premises at all reasonable times without charge. Contractor and its employees may use the common areas and roadways of the premises where it is to perform the services together with all facilities, equipment, improvements, and services provided in connection with the premises for common use. This excludes parking for Contractor’s personnel. Contractor shall repair any damage caused by it or its employees as a result of its use of the common areas.

  • Access to NID 2.17.3.1 TWTC may access the customer’s premises wiring by any of the following means and TWTC shall not disturb the existing form of electrical protection and shall maintain the physical integrity of the NID:

  • Access to System If Business Associate needs access to a Covered Entity Information Technology system to comply with its obligations under the Contract or this Agreement, Business Associate shall request, review, and comply with any and all policies applicable to Covered Entity regarding such system including, but not limited to, any policies promulgated by the Office of Information Technology and available at xxxx://xxx.xxxxx.xx.xx/about/policies.

  • Access to Data Operator shall make Data in the possession of the Operator available to the LEA within five (5) business days of a request by the LEA.

  • Information Access and Audit Rights 25.1 Information Access 25.2 Reporting of Non-Force Majeure Events 25.3 Audit Rights 25.3.1 25.3.2 25.4 Audit Rights Periods

  • Accessibility of Web-Based Information and Applications For State Agency Authorized User Acquisitions: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08-005, Accessibility of Web-Based Information and Applications as follows: Any web-based information and applications development, or programming delivered pursuant to the contract or procurement, will comply with New York State Enterprise IT Policy NYS-P08- 005, Accessibility of Web-Based Information and Applications as such policy may be amended, modified or superseded, which requires that state agency web-based information and applications are accessible to persons with disabilities. Web-based information and applications must conform to New York State Enterprise IT Policy NYS-P08-005 as determined by quality assurance testing. Such quality assurance testing will be conducted by the State Agency Authorized User and the results of such testing must be satisfactory to the Authorized User before web-based information and applications will be considered a qualified deliverable under the contract or procurement.

  • Access to Service You acknowledge that Your ability to access the Service may require the payment of third- party fees (such as telephone toll charges, ISP, or airtime charges) and that You are responsible for paying such fees. The Provider is not responsible for any equipment You may need to be able to access the Service.

Time is Money Join Law Insider Premium to draft better contracts faster.