Unauthorized Copies or Installations Sample Clauses

Unauthorized Copies or Installations. Customer shall not copy, permit others to copy, install, or cause the Software to be installed on its behalf, outside of Customer’s Premises, or on a computer system other than the Licensed Computer System, without STS prior written approval. Customer may, however, use the Software temporarily on an alternative processor to the Licensed Computer System only for the purposes of disaster recovery, and not more than twice per year for testing disaster recovery procedures. Customer may also install, or cause the Software to be installed, on a designated fail-over Computer System, for use when the designated Licensed Computer System is not available for production use. Customer shall also have the right to install copies of the Software on Licensed Computer Systems for the purpose of testing, training and assistance in the Maintenance Services. Any other transfer of the Software from the Licensed Computer System requires prior written approval of STS and may be subject to additional license fees.
AutoNDA by SimpleDocs

Related to Unauthorized Copies or Installations

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Unauthorized Work The contractor is not authorized at any time to commence task order performance prior to issuance of a signed TO or other written approval provided by the CO to begin work.

  • Destruction of Confidential Information Upon the written request of the disclosing Party, the receiving Party shall cease using and arrange for the destruction of all copies of any Confidential Information then in the receiving Party’s possession or under such Party’s control. The receiving Party agrees to dispose of the Confidential Information in such a manner that the information cannot be read or reconstructed after destruction. Upon the written request of the disclosing Party, the receiving Party shall certify in writing that it has complied with the obligations set forth in this paragraph.

  • Unauthorized Alterations or Improvements In the event that the Tenant shall undertake alterations or improvements relating to the Property in violation of this section the same shall be considered a material breach of this Lease putting the Tenant in default. The Landlord may, upon the Landlord’s discretion, require the Tenant to undo the alterations or improvements and restore the Property to the its condition prior to any unauthorized alteration or improvement at the sole expense of the Tenant.

  • Retention or destruction of Confidential Information If Network Rail or the Train Operator, as the case may be, has not received a request to return any Confidential Information to the other party under and within the time limits specified in Clause 14.3, it may destroy or retain such Confidential Information.

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Notice of Unauthorized Use The Receiving Party will notify the Disclosing Party immediately upon discovery of any unauthorized use or disclosure of Confidential Information or any other breach of this Agreement by Receiving Party. The Receiving Party will cooperate with the Disclosing Party in every reasonable way to help the Disclosing Party regain possession of such Confidential Information and prevent its further unauthorized use.

  • Unauthorized Changes The terms of Section 1 of Article VI apply to the resolution of any unauthorized changes regarding Number Portability.

  • No Unauthorized Use Provider shall not use Student Data or information in a Pupil Record for any purpose other than as explicitly specified in this DPA.

  • Unauthorized Aliens Consultant hereby promises and agrees to comply with all of the provisions of the Federal Immigration and Nationality Act (8 U.S.C.A. & 1101, et seq.), as amended; and in connection therewith, shall not employ unauthorized aliens as defined therein. Should Consultant so employ such unauthorized aliens for the performance of work and/or services covered by this contract, and should the Federal Government impose sanctions against the City for such use of unauthorized aliens, Consultant hereby agrees to, and shall, reimburse City for the cost of all such sanctions imposed, together with any and all costs, including attorneys' fees, incurred by the City in connection therewith.

Time is Money Join Law Insider Premium to draft better contracts faster.