Use of the Software Service Sample Clauses

The "Use of the Software Service" clause defines the terms under which users are permitted to access and utilize the software provided by the service provider. It typically outlines acceptable and prohibited uses, such as restrictions on reverse engineering, sharing access credentials, or using the service for unlawful activities. By clearly specifying these boundaries, the clause helps ensure that the software is used appropriately and protects the provider from misuse or unauthorized activities.
Use of the Software Service. The use of the Engage Digital Services is strictly limited to the following: (i) to access, read and reply to incoming messages; (ii) to supervise, analyse and use incoming messages; and (iii) to collect, manage and process the Customer Content.
Use of the Software Service. 3.1 The Customer may only use the Software Service for the agreed purpose specified in the Order and the valid service description. The valid service description for Software Service is available at ▇▇▇▇.▇▇▇▇▇▇▇.▇▇▇. The Customer is not entitled to resell, sublicense, publish, display, loan, distribute or lease the Software Service or otherwise grant any rights thereto to any third party (such as access rights or usernames). 3.2 The contracted workforce, outsourcing partners or other experts used by the Customer shall not be considered as third parties. The Customer shall ensure that such individuals comply with these Terms and the Customer shall be liable for the acts and omission of such individuals as for its own. The Software Service must always be used only for the benefit of the Customer and for purposes that support the Customer's operations. 3.3 The Software Service shall only be used in accordance with the valid License Grant defined in the Order. 3.4 The Customer undertakes to comply with all applicable laws and regulations issued by competent authorities, including particularly all rules and regulations pertaining to the processing of personal data. The Customer shall be responsible for providing instructions regarding the use of the Software Service to its users and ensure that the users adhere to the additional terms set out in section 23 and give the required consents for the use. Terms regarding information to be provided to the users may also be set forth in other annexes of the Order. 3.5 The Customer acknowledges and agrees that: (i) the licensor of the Supplier shall not be directly responsible to the Customer; (ii) Customer is expressly prohibited from using any component of the Software Service in any way other than integrated with the Software Service; (iii) Customer is expressly prohibited from using any data structures not included in the Software Service; and (iv) Customer has no independent license or any other right to the components of the Software Service or to use such components independently from the Software Service. 3.6 If the Software Service includes software or other service components manufactured or provided by a third party, in addition to these Terms, the Customer undertakes to accept and abide by license, access right and/or service conditions of the supplier or manufacturer in question. The current list of such additional terms is specified in section 23.

Related to Use of the Software Service

  • Use of the Software TO THE EXTENT OF A CONFLICT BETWEEN THE PROVISIONS OF THE FOREGOING DOCUMENTS, THE ORDER OF PRECEDENCE SHALL BE (1)THE SIGNED CONTRACT, (2) THE CLICK-ACCEPT AGREEMENT OR THIRD PARTY LICENSE AGREEMENT, AND

  • Use of the Service 11.1 When using the Service you must comply with: (a) our CRA, including clause 4 of the General Terms, and this clause 11; and (b) any rules, including any acceptable use conditions, imposed by any third party whose content or services you access using the Service or whose Network on which your data transmits. 11.2 Any use of the Service at the Premises is your responsibility. The terms of our CRA apply to you and also to anyone else who uses the Service (regardless of whether you give them permission to do so or not). 11.3 You must ensure that any software you use in relation to the Service is properly licensed. 11.4 The use of a Local Area Network (LAN) for personal use is permitted, however the set-up and configuration of a LAN connected to the modem is not supported by customer service. 11.5 All IP addresses provided by us for your use remain our property. Most Services include a dynamic IP address. A new IP address is usually allocated whenever the computer and modem are rebooted. The IP address remains until the next time the computer and modem are switched off. Where provided, you may configure your computer or modem to connect using a static IP address. 11.6 We may at any time adjust aspects of the Service for security or Network management reasons, including, without limitation: (a) deleting transitory data that has been stored on our servers for longer than 90 days; (b) deleting stored email messages that are older than 90 days; (c) rejecting any incoming email messages and attachments that exceed 30 Megabytes (including encapsulation); (d) delivering access and content via proxy servers; (e) limiting the number of addresses to whom an outgoing email can be sent; (f) refusing to accept incoming email messages to mailboxes that have exceeded the email storage limit; (g) managing the Network to prioritise certain types of Internet traffic over others; and (h) blocking or filtering specific Internet ports. 11.7 You are responsible for providing any security or privacy measures for your computer networks and any data stored on those networks or accessed through the Service. We will not be liable to you in respect of any loss, damage, costs or expenses incurred by you in connection with your failure to provide that security. 11.8 You may request additional users on the Service in accordance with the Pricing Schedule. 11.9 You must take reasonable steps to ensure that others do not gain unauthorised access to the Service through your account. We recommend that you do not disclose your password to others and that you change your password regularly. 11.10 We may monitor use of the Service to investigate a breach (or suspected breach) of the Acceptable Use Policy or upon the request of an authorised authority. 11.11 Where you provide your own wireless computer connection device, you are responsible for any loss caused by an unauthorised interception of the Service.

  • Use of the Services 1.1 We will make the Oracle services listed in Your order (the “Services”) available to You pursuant to this Agreement and Your order. Except as otherwise stated in this Agreement or Your order, You have the non- exclusive, worldwide, limited right to use the Services during the period defined in Your order, unless earlier terminated in accordance with this Agreement or Your order (the “Services Period”), solely for Your internal business operations. You may allow Your Users (as defined below) to use the Services for this purpose, and You are responsible for their compliance with this Agreement and Your order. 1.2 The Service Specifications describe and govern the Services. During the Services Period, we may update the Services and Service Specifications (with the exception of the Data Processing Agreement as described below) to reflect changes in, among other things, laws, regulations, rules, technology, industry practices, patterns of system use, and availability of Third Party Content (as defined below). Oracle updates to the Services or Service Specifications will not materially reduce the level of performance, functionality, security or availability of the Services during the Services Period of Your order. 1.3 You may not, and may not cause or permit others to: (a) use the Services to harass any person; cause damage or injury to any person or property; publish any material that is false, defamatory, harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws, ordinances or regulations; (b) perform or disclose any benchmarking or availability testing of the Services; (c) perform or disclose any performance or vulnerability testing of the Services without Oracle’s prior written approval, or perform or disclose network discovery, port and service identification, vulnerability scanning, password cracking or remote access testing of the Services; or (d) use the Services to perform cyber currency or crypto currency mining ((a) through (d) collectively, the “Acceptable Use Policy”). In addition to other rights that we have in this Agreement and Your order, we have the right to take remedial action if the Acceptable Use Policy is violated, and such remedial action may include removing or disabling access to material that violates the policy.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.