Common use of Usage Restrictions Clause in Contracts

Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of outsourcing offering, (c) use a Service or Non-UDPaaS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Non-UDPaaS product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law). Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. However, we may use reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or termination.

Appears in 2 contracts

Sources: Master Subscription Agreement, Master Subscription Agreement

Usage Restrictions. You will shall not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of a service bureau or outsourcing offering, (c) use a Service or Non-UDPaaS SFDC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS SFDC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our the Services in a manner that violates SFDC’s Acceptable Use and External Facing Service Policy, or to access or use any of Our SFDC’s or ▇▇▇▇▇▇▇▇▇▇.▇▇▇’s intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your Customer's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Nonnon-UDPaaS SFDC product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law). Any Customer’s or a User’s intentional violation of the foregoing, or any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You Customer or Users that in Our ▇▇▇▇▇▇▇▇▇▇.▇▇▇’s or as applicable, SFDC’s, judgment imminently threatens the security, confidentiality, integrity or availability of Our SFDC’s services, may result in Our ▇▇▇▇▇▇▇▇▇▇.▇▇▇’s or as applicable, SFDC’s, immediate suspension or termination of the Services. However, we may ▇▇▇▇▇▇▇▇▇▇.▇▇▇ will use commercially reasonable efforts under the circumstances to provide You Customer with notice and an opportunity to remedy such violation or threat prior to any such suspension or terminationsuspension.

Appears in 2 contracts

Sources: Master Subscription Agreement, Main Services Agreement

Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of outsourcing offering, (c) use a Service or Non-UDPaaS RevenueWell Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS RevenueWell Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Non-UDPaaS Non- RevenueWell product or service, (l) use any of Our Confidential Information to dispute or context the validity of Our intellectual property rights, or (lm) reverse engineer any Service (to the extent such restriction is permitted by law). Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. However, we may however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or terminationsuspension.

Appears in 2 contracts

Sources: Master Subscription Agreement, Master Subscription Agreement

Usage Restrictions. You will not (a) make any Service modify, decompile, disassemble or Content available toreverse engineer, or use cause or permit any Service other party to modify, decompile, disassemble or Content for the benefit ofreverse engineer, anyone other than You or UsersSoftware, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, and/or Services; (b) sublicense any of Our or our licensor’s intellectual property to third parties or sell, resell, licenserent, sublicense, distribute, make available, rent sublicense or lease the Services or any Software to third parties; (c) attempt to gain unauthorized access to any Service or Contentits related systems or networks, or include any Service otherwise violate the license grant or Content restrictions set forth in any type of outsourcing offering, Section 7 above; (cd) use a Service or Non-UDPaaS Application the Services to store or transmit Malicious Code or infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS Application to store or transmit Malicious Code, ; (e) interfere with or disrupt the integrity or performance of any Service the Services or third-party data contained therein, ; (f) attempt to gain unauthorized access to any Service the Services or Content or its their related systems or networks, ; (g) alter, copy, move or delete any tags or code placed as part of the Services except as provided for in Section 6; (h) place tags on website pages not pre-approved by Us in writing; (i) permit direct or indirect access to or use of any Service or Content Services in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our or our licensor’s intellectual property property, except as permitted under this Agreement, an Order Form, or the Documentation; or (j) misappropriate any Services or Software, (h) copy a Service or use the Services or Software, to create competing products or services, or modify Our or our licensor’s intellectual property or use any part, feature, function of Our or user interface thereof, (i) copy Content except as our licensor’s intellectual property unless otherwise permitted herein or otherwise agreed to by Us in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Non-UDPaaS product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law)signed writing. Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our servicesthe Services, may result in Our immediate suspension or termination of the Services. However, we may use reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or termination.

Appears in 2 contracts

Sources: Terms of Service, Terms of Service

Usage Restrictions. You will not (a) make any Service or Content available toto anyone other than Users, or use any Service or Content for the benefit of, anyone other than You or UsersYou, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of a service bureau or outsourcing offering, (c) use a Service or Non-UDPaaS ProduQtive Application to store or transmit infringing, libelouslibellous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS 3rd Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized unauthorised access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) access any disassemble, reverse engineer, or decompile a Service or Content in order Content, or access it to (1) build a competitive product or service or to benchmark with service, (2) build a Non-UDPaaS product or serviceservice using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (l4) reverse engineer determine whether the Services are within the scope of any Service (to the extent such restriction is permitted by law)patent. Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. However, we may however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or terminationsuspension.

Appears in 1 contract

Sources: Master Subscription Agreement

Usage Restrictions. You Customer will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You Customer or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of a service bureau or outsourcing offering, (c) use a Service or Non-UDPaaS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any orperformance ofany Service or third-party data partydata contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Services or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our Vlocity intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your Customer's own intranets or otherwise for Your its own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Nonnon-UDPaaS Vlocity product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law). Any Customer’s or a User’s intentional violation of the foregoing, or any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You Customer or Users that in Our Vlocity’s judgment imminently threatens the security, confidentiality, integrity or availability of Our Vlocity’s services, may result in Our Vlocity’s immediate suspension or termination of the Services. However, we may Vlocity will use commercially reasonable efforts under the circumstances to provide You Customer with notice and an opportunity to remedy such violation or threat prior to any such suspension. Vlocity’s right of suspension or terminationof the Services hereunder is applicable to any violation asserted by Vlocity that is not disputed by Customer. Any dispute regarding any violation of the foregoing is subject to the Contract Disputes Act.

Appears in 1 contract

Sources: Contract

Usage Restrictions. You will not (ai) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (bii) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of a service bureau or outsourcing offering, (ciii) use a Service or Non-UDPaaS iFOLIO Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (div) use a Service or Non-UDPaaS iFOLIO Application to store or transmit Malicious Code, (ev) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (gvi) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or of use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (hvii) copy a Service or any part, feature, function or user interface thereof, (iviii) copy Content except as permitted herein or in an Order Form or the Documentation, (jix) frame or mirror any part of any Service or Content, other than framing on Your own intranets intranet or otherwise for Your own internal business purposes or as permitted in the Documentation, (kx) access any Service or Content in order to build a competitive product or service or to benchmark with a Non-UDPaaS iFOLIO product or service, or (lxi) reverse engineer any Service (to the extent such restriction is permitted by law). Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. However, we may use reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or termination.

Appears in 1 contract

Sources: Master Subscription Agreement

Usage Restrictions. You will not (a) make any Service or Content available toto anyone other than Users, or use any Service or Content for the benefit of, anyone other than You or UsersYou, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of a service bureau or outsourcing offering, (c) use a Service or Non-UDPaaS SavvyDox Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS SavvyDox Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy , or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, or (k) access any disassemble, reverse engineer, or decompile a Service or Content in order Content, or access it to (1) build a competitive product or service or to benchmark with service, (2) build a Non-UDPaaS product or serviceservice using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (l4) reverse engineer determine whether the Services are within the scope of any Service (to the extent such restriction is permitted by law)patent. Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. However, we may however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or terminationsuspension.

Appears in 1 contract

Sources: Master Subscription Agreement

Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of outsourcing offering, (c) use a Service or Non-UDPaaS Non- RevenueWell Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS RevenueWell Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Non-UDPaaS Non- RevenueWell product or service, (l) use any of Our Confidential Information to dispute or context the validity of Our intellectual property rights, or (lm) reverse engineer any Service (to the extent such restriction is permitted by law). Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. However, we may however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or terminationsuspension.

Appears in 1 contract

Sources: Master Subscription Agreement

Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of outsourcing offering, (c) use a Service or Non-UDPaaS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Non-UDPaaS product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law). Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate temporary suspension or termination of the Services. However, we may use reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or terminationsuspension.

Appears in 1 contract

Sources: Master Subscription Agreement

Usage Restrictions. You will not (a) make any Service or Content available toto anyone other than Users, or use any Service or Content for the benefit of, anyone other than You or UsersYou, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of a service bureau or outsourcing offering, (c) use a Service or Non-UDPaaS SFDC Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS SFDC Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our Services in a manner that violates Our Acceptable Use and External Facing Services Policy, or to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, o r (k) access any disassemble, reverse engineer, or decompile a Service or Content in order Content, or access it to (1) build a competitive product or service or to benchmark with service, (2) build a Non-UDPaaS product or serviceservice using similar ideas, features, functions or graphics of the Service, (3) copy any ideas, features, functions or graphics of the Service or (l4) reverse engineer determine whether the Services are within the scope of any Service (to the extent such restriction is permitted by law)patent. Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. However, we may however We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or terminationsuspension.

Appears in 1 contract

Sources: Master Subscription Agreement

Usage Restrictions. You Customer will not (a) make any Service Purchased Services or Content available toto anyone other than Customer or Authorized Users, or use any Service Purchased Services or Content for the benefit of, of anyone other than You or UsersCustomer, unless expressly stated otherwise in your service Contract, an Order Form or the Documentationan SOW, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service Purchased Services or Content, or include any Service Purchased Services or Content in any type of a service bureau or outsourcing offering, (c) use a Service or any Purchased Services and Non-UDPaaS FTA Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service any Purchased Services or Non-UDPaaS FTA Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service Purchased Services or third-party data contained therein, (f) attempt to gain unauthorized access to any Service Purchased Services or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service Purchased Services or Content in a way that circumvents a contractual usage limit, or use any of Our Purchased Services to access or use any of Our intellectual property FTA Intellectual Property Rights except as permitted under this Agreement, an Order Form, or the Documentationan SOW, (h) copy a Service modify, copy, or create derivative works based on Purchased Services or Platform or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentationan SOW, (j) frame or mirror any part of any Service Purchased Services or Content, other than framing on Your Customer's own intranets Workspace or otherwise for Your its own internal business purposes or as permitted in the Documentationpurposes, (k) access any Service except to the extent permitted by applicable law, disassemble, reverse engineer, or decompile Purchased Services, Platform, or Content in order or access it to (1) build a competitive product or service or to benchmark with service, (2) build a Non-UDPaaS product or serviceservice using similar ideas, features, functions or graphics of Purchased Services and Platform, (3) copy any ideas, features, functions or graphics of Purchased Services and Platform, or (l4) reverse engineer determine whether Purchased Services or Platform are within the scope of any Service (to the extent such restriction is permitted by law). Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. However, we may use reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or terminationpatent.

Appears in 1 contract

Sources: Master Service Agreement

Usage Restrictions. You will not (a) make any Service cFive Services or Content available to, or use any Service cFive Services or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service cFive Services or Content, or include any Service cFive Services or Content in any type of outsourcing offeringa service bureau or online or other offering or product, (c) use a Service or Non-UDPaaS Application cFive Services to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service or Non-UDPaaS Application cFive Services to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service cFive Services or third-party data contained therein, (f) attempt to gain unauthorized access to any Service cFive Services or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service cFive Services or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as expressly permitted under this Agreement, an Order Form, or the Documentation, (h) copy a Service cFive Services or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service cFive Services or Content, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service cFive Services or Content in order to build a competitive product or service or to benchmark with a Non-UDPaaS third party product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law)cFive Services. Any use of the cFive Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the cFive Services. However, we may use reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or termination.

Appears in 1 contract

Sources: Master Subscription Agreement

Usage Restrictions. You At all times, you will comply, and ensure each User complies, with all applicable Privacy laws while using the Service. Without limiting the generality of Section 4.2, you agree that you will not, and will not permit any person, including without limitation any Users, to: (a) make any Service or Content available toto anyone other than Users, or use any Service or Content for the benefit of, anyone other than You or Usersyou, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or Content, or include any Service or Content in any type of a service bureau or outsourcing offering, (c) use a Service or NonThird-UDPaaS Party Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, publicity rights, defamation rights, intellectual property rights, proprietary rights, contractual rights or any other legal right (d) use a Service or NonThird-UDPaaS Party Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use of any of Our our Services in a manner that is in violation of Applicable Laws, or to access or use any of Our our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy modify, copy, or create derivative works based on a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or Content, other than framing on Your your own intranets or otherwise for Your your own internal business purposes or as permitted in the Documentation, (k) access any or use a Service for benchmarking purposes, including without limitation monitoring its availability, performance or functionality, or (l) disassemble, reverse engineer, or decompile a Service or Content in order Content, or access or use it for any purpose competitive with iComply’s business, including without limitation to (1) build a competitive product or service or to benchmark with service, (2) build a Non-UDPaaS product or serviceservice using similar ideas, features, functions or (l) reverse engineer any Service (to the extent such restriction is permitted by law). Any use graphics of the Services in breach of your ContractService, this Agreement(3) copy any ideas, Documentation features, functions or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination graphics of the Services. However, we may use reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or termination.Service or

Appears in 1 contract

Sources: Master Terms and Conditions

Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service in a service bureau or Content in any type of outsourcing offering, (c) use a Service or Non-UDPaaS Application to store or transmit infringing, libelous, or otherwise unlawful or tortious material, or to store or transmit material in violation of third-party privacy rights, (d) use a Service to store or Non-UDPaaS Application transmit individuals’ health, medical or payment card information, (e) use a Service to store or transmit Malicious Code, (ef) interfere with or disrupt the integrity or performance of any Service or third-party data contained therein, (fg) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (gh) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (hi) copy a Service or any part, feature, function or user interface thereofthereof (including, (i) copy Content except as permitted herein without limitation, into a Salesforce organization or tenant not authorized in an Order Form or the Documentationwriting by FF), (j) frame or mirror any part of any Service or ContentService, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (k) access any Service or Content in order to build a competitive product or service or to benchmark with a Nonnon-UDPaaS FinancialForce product or service, or (l) reverse engineer any Service (to the extent such restriction is permitted by law). Any If You use of the Services in breach of your Contract, a way that breaches this Agreement, Documentation or Order Forms, by You or Users that in Our judgment Agreement and threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. However, we We may immediately suspend the Services; however, We will use efforts reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy the breach before any such violation or threat prior suspension. This paragraph applies equally to such suspension or terminationthe Salesforce Platform as to the Services.

Appears in 1 contract

Sources: Master Subscription Agreement

Usage Restrictions. You will not (a) make any Service or Content available to, or use any Service or Content for the benefit of, anyone other than You or Users, unless expressly stated otherwise in your service Contract, an Order Form or the Documentation, (b) sell, resell, license, sublicense, distribute, make available, rent or lease any Service or ContentService, or include any Service in a service bureau or Content in any type of outsourcing offering, (c) use a Service or Non-UDPaaS Application to store or transmit infringing, libelous, obscene, or otherwise unlawful unlawful, objectionable or tortious material, or to store or transmit material in violation of a third-party party’s rights, including but not limited to privacy rights or intellectual property rights, (d) use a Service or Non-UDPaaS Application to store or transmit Malicious Code, (e) interfere with or disrupt the integrity or performance of any Service or third-party data contained thereinService, (f) attempt to gain unauthorized access to any Service or Content or its related systems or networks, (g) permit direct or indirect access to or use of any Service or Content in a way that circumvents a contractual usage limit, or use any of Our Services to access or use any of Our intellectual property except as permitted under this Agreement, an Order Form, or the Documentation, (h) copy a Service or any part, feature, function or user interface thereof, (i) copy Content except as permitted herein or in an Order Form or the Documentation, (j) frame or mirror any part of any Service or ContentService, other than framing on Your own intranets or otherwise for Your own internal business purposes or as permitted in the Documentation, (kj) access any Service or Content in order to build a competitive product or service or to benchmark with a Non-UDPaaS competitive product or service, or (lk) reverse engineer any Service (to the extent such restriction is permitted by law). Neither We nor Our suppliers or licensors has any responsibility for preventing or identifying Your compliance with this Section 3.4 or any liability, directly or indirectly, for any loss or damage caused by Your Data. Any use of the Services in breach of your Contract, this Agreement, Documentation or Order Forms, by You or Users that in Our judgment threatens the security, confidentiality, integrity or availability of Our services, may result in Our immediate suspension or termination of the Services. HoweverServices and/or removal of the offending Data, we may however, We will use commercially reasonable efforts under the circumstances to provide You with notice and an opportunity to remedy such violation or threat prior to such suspension or terminationsuspension.

Appears in 1 contract

Sources: Master Subscription Agreement