Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, (b) sell, resell, license, sublicense, distribute, rent or lease any Service or Content, or include any Service or Content in a service bureau or outsourcing offering, (c) use a Service to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law).
Usage Restrictions. Customer will not (a) sell, resell, license, sublicense, distribute, make available, rent or lease the Services, (b) use the Services to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (c) use the Services to store or transmit Malicious Code, (d) interfere with or disrupt the integrity or performance of the Services or third-party data contained therein, (e) attempt to gain unauthorized access to the Services or its related systems or networks, (f) permit direct or indirect access to or use of the Services that circumvents a contractual usage limit, or use any of the Services to access or use any of Supplier or EFESO intellectual property except as permitted under this Agreement or an Order Form, (g) copy the Services or any part, feature, function or user interface thereof, (h) frame or mirror any part of the Services, (i) access the Services in order to build a competitive product or service or to benchmark with another product, or (j) modify, decompile, or reverse engineer the Services (to the extent such restriction is permitted by law). Any such unauthorized use of the Services may result in the immediate suspension of the Services, without limiting Supplier’s other rights and remedies. Supplier will use commercially reasonable efforts under the circumstances to provide Customer with notice and an opportunity to remedy within a given timeframe such violation or threat prior to such suspension. In any event of such unauthorized use, the Customer will safeguard and indemnify the interest of Supplier against any claims of third parties.
Usage Restrictions. Except to the extent permitted by law without the possibility of contractual waiver, Customer may not reverse engineer, modify, decrypt, extract, disassemble, or decompile the Software, or permit anyone else to do so (a “Prohibited Action”). Before Customer exercises any legal right to conduct a Prohibited Action it must provide Epicor with reasonable prior written notice and will not unreasonably refuse to accept any alternative course of action that Epicor proposes to satisfy Customer’s legal rights in lieu of conducting a Prohibited Action.
Usage Restrictions. 5.1 The Services usage and functional limitations (“Usage Restrictions”) are determined in the Services Description and must be complied with to the fullest by Customer and considered when using the Services. Notwithstanding section 8.2, Customer waives any and all warranty and liability claims and remedies resulting due to Customer`s usage of the Services not being in compliance with the Usage Restrictions.
Usage Restrictions. The purpose for usage of the equipment, the Services and support, and the Flock IP is solely to facilitate gathering evidence that could be used in a criminal investigation by the appropriate government agency and not for tracking activities that the system is not designed to capture (“Permitted Purpose”). Agency will not, and will not permit any Authorized End Users to, (i) copy or duplicate any of the Flock IP; (ii) decompile, disassemble, reverse engineer or otherwise attempt to obtain or perceive the source code from which any software component of any of the Flock IP is compiled or interpreted, or apply any other process or procedure to derive the source code of any software included in the Flock IP, or attempt to do any of the foregoing, and Agency acknowledges that nothing in this Agreement will be construed to grant Agency any right to obtain or use such source code; (iii) modify, alter, tamper with or repair any of the Flock IP, or create any derivative product from any of the foregoing, or attempt to do any of the foregoing, except with the prior written consent of Flock; (vi) interfere or attempt to interfere in any manner with the functionality or proper working of any of the Flock IP; (v) remove, obscure, or alter any notice of any intellectual property or proprietary right appearing on or contained within any of the Application IP; (vii) use the Flock Services for timesharing or service bureau purposes or otherwise for the benefit of a third party or any purpose other than the Purpose; (viii) use the Services, support, equipment and the Flock IP for anything other than the Permitted Purpose; or (ix) assign, sublicense, sell, resell, lease, rent or otherwise transfer or convey, or pledge as security or otherwise encumber, Agency’s rights under Sections 2.1, 2.2, or 2.3.
Usage Restrictions. Customer will not and will not permit any third party to do the following with respect to the Subscription Service: (i) use it or any external programs in a manner that intentionally circumvents usage restrictions; (ii) license, sub-license, sell, re-sell, rent, lease, transfer, distribute, time share or otherwise make any of it available for access by third parties except as expressly provided herein; (iii) access it for the purpose of developing or operating products or services intended to compete with it; (iv) disassemble, reverse engineer or decompile it; (v) copy, create derivative works or otherwise modify it except as permitted in this Agreement; (vi) remove or modify a copyright or other proprietary rights notice in it; (vii) use it to reproduce, distribute, display, transmit or use illegal material or material protected by copyright or other intellectual property right (including the rights of publicity or privacy) without first obtaining the permission of the owner; (viii) use it to create, use, send, store or run code, files, scripts, agents or programs intended to do harm, including viruses, worms, time bombs and Trojan horses or other harmful computer code, files, scripts, agents or other programs or otherwise engage in a malicious act or disrupt its security, integrity or operation; or (ix) access or disable any Nuvolo or third party data, software or network.
Usage Restrictions. Unless expressly agreed otherwise in the applicable Order, Customer may access and use the software in the Subscription Services for Customer’s business use only, and not for the benefit of, or to provide services to, any third party. The rights granted to Customer under the Agreement may not be sold, resold, assigned (except as set forth in Section 11.3), leased, rented, sublicensed, or otherwise transferred or made available for use by third parties, in whole or in part, by Customer without Provider’s prior written consent. Customer shall not gain or attempt to gain unauthorized access to any portion of the Software, or its related systems or networks, for use in a manner that would exceed the scope granted under the Agreement and the Order, or facilitate any such unauthorized access for any third party. If any unauthorized access occurs, Customer shall promptly notify Provider of the incident and shall reasonably cooperate in resolving the issue. Customer shall not reverse engineer, decompile, or disassemble any Software or otherwise attempt to discover the source code thereof or permit any third party to do so. Customer shall not attempt to disable or circumvent any security measures in place. Customer may not knowingly reproduce or copy the software used in the Subscription Services, in whole or in part. Customer shall not modify, adapt, or create derivative works of the software used in the Subscription Services. Customer shall not use the software used in the Subscription Services to store or transmit libelous or otherwise unlawful or tortious material or any material in violation of third party privacy rights. Customer shall not knowingly interfere with or disrupt the integrity or performance of the software used in the Subscription Services or third party data contained therein.