Source Code Security Sample Clauses

Source Code Security. Licensee agrees to take all reasonable steps -------------------- required to maintain the confidentiality of the Licensed Technology (including all Upgrades provided to Licensee) and Modifications thereof, which steps shall in any event include all of security measures set forth in this Section 3.3. ----------- Xxx.Xxx agrees to take all reasonable steps required to maintain the confidentiality of the Licensee Modifications, which steps shall in any event include all of security measures set forth in this Section 3.3. Each Primary ----------- Party shall have the right, upon fifteen (15) days written notice to inspect the facilities and records of the other Primary Party (including those containing any relevant Source Code) to ensure compliance with the requirements of this Section 3.3.
AutoNDA by SimpleDocs
Source Code Security. Microsoft agrees to apply substantially the same -------------------- security policies and procedures with respect to maintaining the confidentiality of the Company Source Code licensed under this Agreement as Microsoft applies to Source Code of technologies that Microsoft has developed and implemented in The Microsoft Network, including, without limitation restrictions on copying, access and location of the Company Source Code and any copies permitted to be made. As of the Effective Date, security measures applied to Source Code used in operating The Microsoft Network include storage on a central server; limiting access according to two levels of security (a read/write access level and a read only access level, with the read/write level of access being provided on the most restricted basis).
Source Code Security. 3.6.1 At the written request of the Customer and upon payment of the fee prescribed and execution of a form of Escrow Agreement approved by Zavanti, a copy of the source code for the Software Product shall be deposited with an escrow agent nominated by Zavanti and the Customer may take benefit of the escrow agreement so prescribed.
Source Code Security 

Related to Source Code Security

  • Source Code 5.1 Nothing in this XXXX shall give to the User or any other person any right to access or use the Source Code or constitute any licence of the Source Code.

  • Source Code Escrow On the date hereof, Company shall deliver to an independent third party escrow agent, selected and designated by AMEX and approved by Company (such approval not to be unreasonably withheld) ("Escrow Agent"), for deposit in accordance with an escrow agreement among the Escrow Agent and the parties hereto and substantially in the form attached as Exhibit E ("Escrow Agreement"), a current and complete copy of the source code (the "Source Code") for the Domain Name and any other materials required to operate the Source Code (the "Escrow Materials"). Within [ ** ] of the installation of any new update to the Service (or any other substantial modification to the Source Code, the Domain Name or the Service) or within [ ** ] of the last deposit hereunder, whichever is sooner, Company shall deliver to the Escrow Agent, for deposit in accordance with such Escrow Agreement, any and all changes to the Escrow Materials which correspond to changes, if any, made to the corresponding Escrow Material or shall notify Escrow Agent that no changes were made during the preceding period. All materials deposited hereunder shall be considered "Escrow Materials" as the term is used herein. In the event of (i) the Company's insolvency (as defined in Section 16(e)) or (ii) the Company's material breach of the terms of this Agreement specifically because of its gross negligence or willful misconduct and such breach is not fully remedied within thirty (30) days of AMEX's notice to Company, then notwithstanding any other rights and remedies to which AMEX may be entitled, AMEX shall immediately have the right to obtain a copy of the Escrow Materials from the Escrow Agent upon written notice as provided in the Escrow Agreement for use in continued provision of the Service. AMEX shall have the right, at any time upon at least ten (10) days' written notice to Company and Escrow Agent, to select and designate a new escrow agent to replace the Escrow Agent hereunder. Upon such notice, Escrow Agent shall completely, safely and securely transfer the Escrow Materials to the new escrow agent (which will then become the "Escrow Agent" hereunder) and confirm such transfer in writing to AMEX and Company. ** INDICATES CONFIDENTIAL TREATMENT REQUESTED.

  • Derivative Works Constellation Beers shall acquire no ownership rights in the Licensed Intellectual Property or derivative works based thereon or any intellectual property deemed to be owned by Marcas Modelo or Modelo Group as a result of this Agreement. Constellation Beers shall, at any time requested by Marcas Modelo or Modelo Group, whether during or subsequent to the term hereof, disclaim in writing any such property interest or ownership in the Licensed Intellectual Property.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Redistribution If any amount owing by an Obligor under this Agreement to a Lender (the recovering Lender) is discharged by payment, set-off or any other manner other than through the Facility Agent under this Agreement (a recovery), then:

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Open Source Software The Software product may include certain open source components that are subject to open source licenses (“Open Source Software”), in which case, the embedded Open Source Software is owned by a third party. The Open Source Software is not subject to the terms and conditions of this XXXX. Instead, each item of Open Source Software is licensed under its applicable license terms which accompanies such Open Source Software. Nothing in this XXXX limits your rights under, nor grants you rights that supersede, the terms and conditions of any applicable license terms for the Open Source Software. Any fees charged by GC in connection with the SOFTWARE, do not apply to the Open Source Software for which fees may not be charged under the applicable license terms. The terms and conditions of the applicable license for the Open Source Software are available on the LICENSE.txt file, which is provided with the SOFTWARE.

  • Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

Time is Money Join Law Insider Premium to draft better contracts faster.