{"component": "clause", "props": {"groups": [{"size": 2, "snippet_links": [{"key": "subject-to", "type": "definition", "offset": [0, 10]}, {"key": "a-non", "type": "clause", "offset": [62, 67]}, {"key": "transferable-license", "type": "definition", "offset": [83, 103]}, {"key": "during-the-term", "type": "clause", "offset": [104, 119]}, {"key": "section-34", "type": "clause", "offset": [133, 144]}, {"key": "object-code", "type": "definition", "offset": [162, 173]}, {"key": "the-security", "type": "clause", "offset": [184, 196]}, {"key": "internal-business-use", "type": "definition", "offset": [215, 236]}, {"key": "in-the-event-of-a", "type": "clause", "offset": [238, 255]}, {"key": "the-\u2587", "type": "clause", "offset": [289, 294]}], "samples": [{"hash": "dqjTzHWsbuh", "uri": "/contracts/dqjTzHWsbuh#security-software", "label": "Systems Integrator Agreement (Presidio, Inc.)", "score": 28.126625061, "published": true}, {"hash": "8pEMbkRqZEc", "uri": "/contracts/8pEMbkRqZEc#security-software", "label": "Systems Integrator Agreement (Presidio, Inc.)", "score": 27.986995697, "published": true}], "snippet": "Subject to these ELA Terms, Cisco and its suppliers grant You a non-exclusive, non-transferable license during the term specified in Section 3.4 to use unlimited Object Code copies of the Security Software for Your Internal Business Use. In the event of a conflict between these Terms and the \u2587\u2587\u2587\u2587, these Terms shall govern.", "hash": "cadabc44ac30228ef01b341b112caf7a", "id": 1}, {"size": 2, "snippet_links": [{"key": "the-internet", "type": "clause", "offset": [26, 38]}, {"key": "access-to-your-personal-information", "type": "clause", "offset": [81, 116]}, {"key": "exchange-bank", "type": "definition", "offset": [124, 137]}, {"key": "online-banking", "type": "definition", "offset": [154, 168]}, {"key": "the-software", "type": "definition", "offset": [242, 254]}], "samples": [{"hash": "hk9ZTz2nBMv", "uri": "/contracts/hk9ZTz2nBMv#security-software", "label": "Internet Access Agreement", "score": 31.9618930817, "published": true}, {"hash": "7MnnIN6FnPn", "uri": "/contracts/7MnnIN6FnPn#security-software", "label": "Internet Access Agreement", "score": 24.364818573, "published": true}], "snippet": "All computers that access the internet are potential targets for thieves to gain access to your personal information. Texas Exchange Bank recommends that online banking users install anti-virus and firewall software on your computer and that the software automatically updates.", "hash": "622053e549b98593201b2f89dd4b5997", "id": 2}, {"size": 2, "snippet_links": [{"key": "customer-agrees-to", "type": "clause", "offset": [5, 23]}, {"key": "to-attempt-to", "type": "clause", "offset": [139, 152]}, {"key": "of-the-company", "type": "clause", "offset": [221, 235]}, {"key": "to-maintain", "type": "clause", "offset": [258, 269]}, {"key": "company-server", "type": "definition", "offset": [376, 390]}, {"key": "account-termination", "type": "clause", "offset": [406, 425]}, {"key": "service-charges", "type": "clause", "offset": [427, 442]}, {"key": "customer-acknowledges", "type": "clause", "offset": [468, 489]}, {"key": "provide-technical-support", "type": "clause", "offset": [514, 539]}, {"key": "the-customer", "type": "clause", "offset": [576, 588]}, {"key": "name-changes", "type": "clause", "offset": [619, 631]}, {"key": "the-company-shall", "type": "clause", "offset": [701, 718]}], "samples": [{"hash": "gYXtOLEvgTe", "uri": "/contracts/gYXtOLEvgTe#security-software", "label": "Terms of Service", "score": 23.0485668182, "published": true}, {"hash": "lJmBsvfYes5", "uri": "/contracts/lJmBsvfYes5#security-software", "label": "End User Agreement", "score": 21.1026687622, "published": true}], "snippet": "5.1. Customer agrees to take all steps reasonable, necessary, and prudent to protect their Login ID and password.\n5.2. Customer agrees not to attempt to undermine or cause harm to any server, software, system or customer of the Company.\n5.3. Customer agrees to maintain Customers' computing equipment responsibly, including running virus software.\n5.4. Uploading a virus to a Company server will result in account termination, service charges and/or prosecution.\n5.5. Customer acknowledges that the Company cannot provide technical support for any software and/or script that the Customer installs, other than variable name changes. The Company supplies technical support for VPS hosting issues only. The Company shall be the sole arbiter as to what constitutes a \"VPS hosting\u201d issue.", "hash": "843a1c1984481adab5ca4c06c2e68073", "id": 3}, {"size": 1, "snippet_links": [{"key": "of-seller", "type": "clause", "offset": [12, 21]}, {"key": "the-security", "type": "clause", "offset": [35, 47]}, {"key": "in-accordance-with", "type": "clause", "offset": [70, 88]}, {"key": "technical-specifications", "type": "clause", "offset": [93, 117]}], "samples": [{"hash": "dDFaJOTdu1W", "uri": "/contracts/dDFaJOTdu1W#security-software", "label": "Limited Assets Purchase Agreement (Merchandise Creations, Inc.)", "score": 19.0, "published": true}], "snippet": "To the best of Seller\u2019s knowledge, the Security Software will operate in accordance with the technical specifications associated therewith.", "hash": "b7dd6260697a2dac18a61097981bef0d", "id": 4}, {"size": 1, "snippet_links": [{"key": "in-addition", "type": "clause", "offset": [0, 11]}, {"key": "sole-discretion", "type": "definition", "offset": [20, 35]}, {"key": "available-to", "type": "definition", "offset": [54, 66]}, {"key": "parental-control", "type": "clause", "offset": [185, 201]}, {"key": "computer-system", "type": "clause", "offset": [290, 305]}, {"key": "internet-service", "type": "clause", "offset": [330, 346]}, {"key": "such-security", "type": "definition", "offset": [352, 365]}, {"key": "software-provided", "type": "clause", "offset": [366, 383]}, {"key": "to-provide", "type": "clause", "offset": [421, 431]}, {"key": "level-of-protection", "type": "definition", "offset": [447, 466]}, {"key": "that-\u2587", "type": "clause", "offset": [537, 543]}], "samples": [{"hash": "8mGyDH5U2Ye", "uri": "/contracts/8mGyDH5U2Ye#security-software", "label": "Subscriber Agreement", "score": 31.7397079468, "published": true}], "snippet": "In addition, in its sole discretion, \u2587\u2587\u2587\u2587\u2587\u2587\u2587 may make available to Subscriber security software, such as anti-virus software, firewall software, \u201cpop-up\u201d advertising blocking software, parental control software, and anti-spyware or anti-adware software for Subscriber\u2019s use on Subscriber\u2019s computer system in conjunction with the Internet Service. Any such security software provided by \u2587\u2587\u2587\u2587\u2587\u2587\u2587 to Subscriber is intended to provide only a minimal level of protection to Subscriber\u2019s computer system(s). Subscriber understands and agrees that \u2587\u2587\u2587\u2587\u2587\u2587\u2587 and its third-party suppliers of any such security software do not guarantee its accuracy, efficacy or performance. Subscriber understands and agrees that \u2587\u2587\u2587\u2587\u2587\u2587\u2587 and its third-party suppliers are not", "hash": "6ae79666bb79ac00e51d2e8d88860cd5", "id": 5}, {"size": 1, "snippet_links": [{"key": "the-lender", "type": "clause", "offset": [0, 10]}, {"key": "sole-discretion", "type": "definition", "offset": [112, 127]}, {"key": "in-accordance-with", "type": "clause", "offset": [129, 147]}, {"key": "this-agreement", "type": "clause", "offset": [148, 162]}, {"key": "after-an-event-of-default", "type": "clause", "offset": [174, 199]}, {"key": "certain-features", "type": "clause", "offset": [259, 275]}, {"key": "collect-data", "type": "clause", "offset": [318, 330]}, {"key": "without-limitation", "type": "clause", "offset": [360, 378]}, {"key": "power-usage", "type": "clause", "offset": [380, 391]}, {"key": "data-usage", "type": "definition", "offset": [404, 414]}, {"key": "signal-strength", "type": "definition", "offset": [419, 434]}, {"key": "downloaded-from", "type": "clause", "offset": [507, 522]}, {"key": "app-store", "type": "definition", "offset": [526, 535]}, {"key": "integral-part", "type": "definition", "offset": [569, 582]}, {"key": "the-service-provided", "type": "clause", "offset": [586, 606]}, {"key": "derivative-works", "type": "clause", "offset": [694, 710]}, {"key": "copies-of-the", "type": "clause", "offset": [825, 838]}, {"key": "the-foregoing", "type": "definition", "offset": [902, 915]}, {"key": "reverse-engineer", "type": "definition", "offset": [922, 938]}, {"key": "the-object-code", "type": "clause", "offset": [983, 998]}, {"key": "source-code-form", "type": "definition", "offset": [1027, 1043]}, {"key": "operation-of-the-security", "type": "clause", "offset": [1123, 1148]}, {"key": "the-content", "type": "clause", "offset": [1204, 1215]}, {"key": "any-other-thing", "type": "clause", "offset": [1231, 1246]}, {"key": "rights-of", "type": "clause", "offset": [1308, 1317]}, {"key": "third-party", "type": "clause", "offset": [1322, 1333]}, {"key": "copyright-notices", "type": "clause", "offset": [1380, 1397]}, {"key": "notices-in", "type": "clause", "offset": [1437, 1447]}, {"key": "access-to-the", "type": "clause", "offset": [1563, 1576]}, {"key": "limitations-on-use", "type": "clause", "offset": [1606, 1624]}, {"key": "persons-using-the", "type": "clause", "offset": [1766, 1783]}, {"key": "your-obligations", "type": "clause", "offset": [1963, 1979]}, {"key": "satisfied-in-full", "type": "definition", "offset": [2025, 2042]}], "samples": [{"hash": "4bwXJ4bBPiT", "uri": "/contracts/4bwXJ4bBPiT#security-software", "label": "Loan Agreement", "score": 25.704996109, "published": true}], "snippet": "The Lender has installed security software on the Handset (\u201cSecurity Software\u201d) that enables the Lender, at its sole discretion, in accordance with this Agreement (including after an Event of Default has occurred and is continuing):\n(i) To suspend or disable certain features of the Handset, including (without\n(v) To collect data from the Handset, including (without limitation) power usage, app usage, data usage and signal strength;\n(vi) To customise certain apps installed on the Handset, such as those downloaded from an app store; and The Security Software is an integral part of the Service provided under this Agreement, and you shall not (and shall not attempt to):\n(a) modify, create derivative works from, display, copy, mirror, publish, distribute, transmit, transfer, license, sublicense, sell, market, or lease copies of the Security Software in whole or in part (or attempt to do any of the foregoing);\n(b) reverse engineer, decompile, disassemble or otherwise reduce the object code of the Security Software to source code form (or attempt to do any of the foregoing);\n(c) interrupt or attempt to interrupt operation of the Security Software in any way;\n(d) use the Security Software, or the content therein, or do any other thing that will infringe any Intellectual Property Rights or other rights of any third party;\n(e) remove or obscure any trademark symbols, copyright notices, or other intellectual property rights notices in the Security Software (or attempt to do any of the foregoing);\n(f) bypass the measures used to prevent or restrict access to the Security Software or enforce limitations on use thereof (or attempt to do any of the foregoing);\n(g) do anything likely to impair, interfere with or damage or cause harm or distress to any persons using the Security Software; or\n(h) use any information obtained using the Security Software otherwise than in The Lender shall not be required to remove the Security Software until all of your obligations to the Lender under this Agreement have been satisfied in full.", "hash": "010f29cc2fecadb1c7cce97bf889c205", "id": 6}, {"size": 1, "snippet_links": [{"key": "in-addition", "type": "clause", "offset": [0, 11]}, {"key": "sole-discretion", "type": "definition", "offset": [20, 35]}, {"key": "subscriber-a", "type": "definition", "offset": [70, 82]}, {"key": "parental-control", "type": "clause", "offset": [201, 217]}, {"key": "computer-system", "type": "clause", "offset": [307, 322]}, {"key": "internet-service", "type": "clause", "offset": [347, 363]}, {"key": "such-security", "type": "definition", "offset": [369, 382]}, {"key": "to-provide", "type": "clause", "offset": [449, 459]}, {"key": "level-of-protection", "type": "definition", "offset": [475, 494]}, {"key": "third-party-suppliers", "type": "definition", "offset": [594, 615]}, {"key": "responsible-for", "type": "clause", "offset": [795, 810]}, {"key": "the-information", "type": "clause", "offset": [860, 875]}, {"key": "the-security", "type": "clause", "offset": [910, 922]}], "samples": [{"hash": "5y46xt3mLCG", "uri": "/contracts/5y46xt3mLCG#security-software", "label": "Internet Services Agreement", "score": 29.8892478943, "published": true}], "snippet": "In addition, in its sole discretion, Raptor Wireless may recommend to Subscriber a particular security software, such as anti-virus software, firewall software, \"pop-up\" advertising blocking software, parental control software, and anti- spyware or anti-adware software for Subscriber's use on Subscriber's computer system in conjunction with the Internet Service. Any such security software recommended by Raptor Wireless to Subscriber is intended to provide only a minimal level of protection to Subscriber's computer system(s). Subscriber understands and agrees that Raptor Wireless and its third party suppliers of any such security software do not guarantee its accuracy, efficacy or performance. Subscriber understands and agrees that Raptor Wireless and its third party suppliers are not responsible for any damage to Subscriber's computer system(s) or the information stored on it that may result from the security software or its non-performance.", "hash": "ecdc2178e1c557f1646de71deb2e8534", "id": 7}, {"size": 1, "snippet_links": [{"key": "in-addition", "type": "clause", "offset": [0, 11]}, {"key": "sole-discretion", "type": "definition", "offset": [20, 35]}, {"key": "available-to", "type": "definition", "offset": [54, 66]}, {"key": "parental-control", "type": "clause", "offset": [185, 201]}, {"key": "computer-system", "type": "clause", "offset": [290, 305]}, {"key": "internet-service", "type": "clause", "offset": [330, 346]}, {"key": "such-security", "type": "definition", "offset": [352, 365]}, {"key": "software-provided", "type": "clause", "offset": [366, 383]}, {"key": "to-provide", "type": "clause", "offset": [421, 431]}, {"key": "level-of-protection", "type": "definition", "offset": [447, 466]}, {"key": "responsible-for", "type": "clause", "offset": [751, 766]}, {"key": "the-information", "type": "clause", "offset": [816, 831]}, {"key": "the-security", "type": "clause", "offset": [866, 878]}], "samples": [{"hash": "68WCWijNmEq", "uri": "/contracts/68WCWijNmEq#security-software", "label": "Residential Internet Service Agreement", "score": 23.4366874695, "published": true}], "snippet": "In addition, in its sole discretion, Madison may make available to Subscriber security software, such as anti-virus software, firewall software, \"pop-up\" advertising blocking software, parental control software, and anti-spyware or anti-adware software for Subscriber's use on Subscriber's computer system in conjunction with the Internet Service. Any such security software provided by Madison to Subscriber is intended to provide only a minimal level of protection to Subscriber's computer system(s). Subscriber understands and agrees that Madison and its third-party suppliers of any such security software do not guarantee its accuracy, efficacy or performance. Subscriber understands and agrees that Madison and its third-party suppliers are not responsible for any damage to Subscriber's computer system(s) or the information stored on it that may result from the security software or its non-performance.", "hash": "5ade01be0f4cf63c4e4bdec40d87575a", "id": 8}, {"size": 1, "snippet_links": [{"key": "security-products", "type": "clause", "offset": [22, 39]}, {"key": "installation-and-use", "type": "clause", "offset": [53, 73]}, {"key": "in-accordance-with", "type": "clause", "offset": [158, 176]}, {"key": "the-framework-agreement", "type": "definition", "offset": [211, 234]}, {"key": "to-use-the-software", "type": "clause", "offset": [236, 255]}, {"key": "in-order-to", "type": "clause", "offset": [256, 267]}, {"key": "as-specified", "type": "clause", "offset": [288, 300]}, {"key": "order-form", "type": "definition", "offset": [308, 318]}, {"key": "the-service-provider-shall", "type": "clause", "offset": [324, 350]}, {"key": "reasonable-endeavours", "type": "definition", "offset": [355, 376]}, {"key": "to-ensure", "type": "clause", "offset": [377, 386]}, {"key": "the-network", "type": "definition", "offset": [427, 438]}, {"key": "provide-the", "type": "clause", "offset": [482, 493]}, {"key": "the-provision-of-the-services", "type": "clause", "offset": [533, 562]}, {"key": "maintenance-events", "type": "definition", "offset": [565, 583]}, {"key": "normal-business-hours", "type": "definition", "offset": [616, 637]}, {"key": "the-customer-acknowledges", "type": "clause", "offset": [643, 668]}, {"key": "services-are-provided", "type": "clause", "offset": [678, 699]}, {"key": "data-centre", "type": "clause", "offset": [709, 720]}, {"key": "right-to", "type": "clause", "offset": [812, 820]}, {"key": "other-premises", "type": "definition", "offset": [851, 865]}, {"key": "notice-to-the-customer", "type": "clause", "offset": [894, 916]}, {"key": "at-any-time", "type": "clause", "offset": [987, 998]}, {"key": "client-portal", "type": "definition", "offset": [1114, 1127]}, {"key": "scheduled-maintenance", "type": "definition", "offset": [1130, 1151]}, {"key": "in-writing", "type": "definition", "offset": [1178, 1188]}, {"key": "the-term", "type": "definition", "offset": [1324, 1332]}, {"key": "managed-security-service", "type": "definition", "offset": [1354, 1378]}, {"key": "internet-access", "type": "definition", "offset": [1446, 1461]}, {"key": "the-specifications", "type": "definition", "offset": [1544, 1562]}, {"key": "by-the-service-provider", "type": "clause", "offset": [1573, 1596]}, {"key": "from-time-to-time", "type": "clause", "offset": [1597, 1614]}], "samples": [{"hash": "fo5FiTi8QCF", "uri": "/contracts/fo5FiTi8QCF#security-software", "label": "Product Schedule", "score": 25.5242977142, "published": true}], "snippet": "8.1 Where the Managed Security Products requires the installation and use of specific software, the Service Provider hereby grants to the Customer a licence, in accordance with Clause 8.2.1 and Clause 8.2.2. of the Framework Agreement, to use the Software in order to access the Services as specified in the Order Form.\n8.2 The Service Provider shall use reasonable endeavours to ensure that any changes, updates or repairs to the network or software which it uses as a platform to provide the Services which require interruption to the provision of the Services (\u201cMaintenance Events\u201d) shall not be performed during Normal Business Hours.\n8.3 The Customer acknowledges that the Services are provided from the Data Centre or as the Cloud, as specified in the Order Form, and that the Service Provider retains the right to provide the Services from any other premises without providing any prior notice to the Customer.\n8.4 The Service Provider may interrupt the provision of the Services at any time to carry out Maintenance Events so long as it gives the Customer at least five [5] days\u2019 notice via the Customer\u2019s client portal (\u201cScheduled Maintenance\u201d), or as otherwise agreed in writing within the Order Form or at any time thereafter.\n8.5 Where requested in the Order Form, the Service Provider shall provide, throughout the Term, connectivity to the Managed Security service. Where, the Customer make its own arrangements for connectivity or Internet access in order to access the Managed Security service, it must do so in accordance with the specifications suggested by the Service Provider from time to time.", "hash": "e44df243b90f0920faf6bf9b0aa09482", "id": 9}, {"size": 1, "snippet_links": [{"key": "online-security", "type": "clause", "offset": [35, 50]}, {"key": "from-time-to-time", "type": "clause", "offset": [163, 180]}, {"key": "in-addition", "type": "clause", "offset": [182, 193]}, {"key": "free-of-charge", "type": "clause", "offset": [195, 209]}, {"key": "business-customers", "type": "definition", "offset": [220, 238]}, {"key": "transaction-information", "type": "definition", "offset": [282, 305]}, {"key": "the-software", "type": "definition", "offset": [361, 373]}, {"key": "you-acknowledge", "type": "clause", "offset": [382, 397]}, {"key": "reasonable-security", "type": "clause", "offset": [445, 464]}, {"key": "potential-loss", "type": "definition", "offset": [559, 573]}, {"key": "payment-order", "type": "definition", "offset": [613, 626]}, {"key": "issued-in", "type": "definition", "offset": [655, 664]}, {"key": "accepted-by", "type": "clause", "offset": [679, 690]}, {"key": "agree-to", "type": "clause", "offset": [759, 767]}, {"key": "in-good-faith", "type": "clause", "offset": [859, 872]}, {"key": "the-foregoing", "type": "definition", "offset": [898, 911]}, {"key": "mutually-agreed", "type": "definition", "offset": [937, 952]}, {"key": "security-procedures", "type": "clause", "offset": [958, 977]}], "samples": [{"hash": "eCYyTtHVbIK", "uri": "/contracts/eCYyTtHVbIK#security-software", "label": "Treasury Management Services Agreement", "score": 31.9394879987, "published": true}], "snippet": "As part of our layered approach to online security, we employ software to monitor and analyze login and banking behavior. Such programs may be updated or replaced from time to time. In addition, free of charge, we offer business customers Trusteer Rapport, which protects login and transaction information. You may accept this security procedure by downloading the software online. You acknowledge that use of Trusteer Rapport is a commercially reasonable security practice and that, by refusing to accept this Account feature, you face increased exposure to potential loss due to fraud. You will be bound by any payment order, whether or not authorized, issued in your name and accepted by us if you do not choose to download Trusteer Rapport. YOU EXPRESSLY AGREE TO BE BOUND TO ANY PAYMENT ORDER, WHETHER OR NOT AUTHORIZED, ISSUED IN YOUR NAME AND ACCEPTED IN GOOD FAITH BY US IN COMPLIANCE WITH THE FOREGOING COMMERCIALLY REASONABLE, MUTUALLY AGREED UPON SECURITY PROCEDURES.", "hash": "9a8dca35627366f926132b2c4fbbc6c6", "id": 10}], "next_curs": "CloSVGoVc35sYXdpbnNpZGVyY29udHJhY3RzcjYLEhZDbGF1c2VTbmlwcGV0R3JvdXBfdjU2IhpzZWN1cml0eS1zb2Z0d2FyZSMwMDAwMDAwYQyiAQJlbhgAIAA=", "clause": {"size": 22, "children": [["", ""], ["for-fiscal-year-2015-2016-onward", "For fiscal year 2015/2016 onward"], ["claims-review", "Claims Review"], ["compliance-program", "Compliance Program"], ["compensation", "\u2019 Compensation"]], "parents": [["disclaimer-of-warranties-and-limitation-of-liability", "Disclaimer of Warranties and Limitation of Liability"], ["miscellaneous", "Miscellaneous"], ["\u2587\u2587\u2587\u2587\u2587\u2587\u2587-rights-and-remedies", "\u2587\u2587\u2587\u2587\u2587\u2587\u2587 rights and remedies"], ["amendment", "Amendment"], ["resulting-requirements", "Resulting Requirements"]], "title": "Security Software", "id": "security-software", "related": [["third-party-software", "Third Party Software", "Third Party Software"], ["embedded-software", "Embedded Software", "Embedded Software"], ["intellectual-property-software", "Intellectual Property; Software", "Intellectual Property; Software"], ["proprietary-software", "Proprietary Software", "Proprietary Software"], ["licensed-software", "Licensed Software", "Licensed Software"]], "related_snippets": [], "updated": "2025-07-17T06:09:22+00:00"}, "json": true, "cursor": ""}}