{"component": "definition", "props": {"groups": [{"snippet": "means, without limitation, (a) the x-ray, electronic scanning or physical or chemical stripping of semiconductor components, (b) the disassembly, decompilation, decryption or simulation of object code or executable code, or (c) any other technique designed to extract source code or facilitate the duplication of a program or product.", "samples": [{"hash": "dHSlnraaGhQ", "uri": "/contracts/dHSlnraaGhQ#reverse-engineering", "label": "License Agreement", "score": 31.3408622742, "published": true}, {"hash": "fNtWKlJTSL2", "uri": "/contracts/fNtWKlJTSL2#reverse-engineering", "label": "License Agreement (THQ Inc)", "score": 21.0, "published": true}, {"hash": "dNYPe0E8d1s", "uri": "/contracts/dNYPe0E8d1s#reverse-engineering", "label": "License Agreement (THQ Inc)", "score": 21.0, "published": true}], "size": 11, "snippet_links": [{"key": "without-limitation", "type": "clause", "offset": [7, 25]}, {"key": "object-code", "type": "definition", "offset": [189, 200]}, {"key": "executable-code", "type": "definition", "offset": [204, 219]}, {"key": "source-code", "type": "clause", "offset": [268, 279]}], "hash": "dd210e18d6b35c906bc6aefa654fcf2e", "id": 1}, {"snippet": "means all actions, including observing, testing, examining and disassembling or reassembling with the purpose of obtaining Confidential Information. The receiving party shall refrain from exploiting or imitating Confidential Information outside the scope of its purpose in any manner whatsoever (in particular by means of Reverse Engineering) or having it exploited or imitated by third parties and, in particular, from applying for intellectual property rights \u2013 in particular trademarks, designs, patents or utility models \u2013 to the Confidential Information.", "samples": [{"hash": "8OqUvErF7Xs", "uri": "/contracts/8OqUvErF7Xs#reverse-engineering", "label": "Camunda Academy Terms and Conditions", "score": 33.8264465332, "published": true}, {"hash": "e5crDKA0WvJ", "uri": "/contracts/e5crDKA0WvJ#reverse-engineering", "label": "Camunda Academy Terms and Conditions", "score": 33.4432182312, "published": true}, {"hash": "1jIswz4oXlv", "uri": "/contracts/1jIswz4oXlv#reverse-engineering", "label": "Camunda Academy Terms and Conditions", "score": 33.2526245117, "published": true}], "size": 10, "snippet_links": [{"key": "all-actions", "type": "definition", "offset": [6, 17]}, {"key": "purpose-of", "type": "clause", "offset": [102, 112]}, {"key": "the-receiving-party", "type": "definition", "offset": [149, 168]}, {"key": "scope-of", "type": "definition", "offset": [249, 257]}, {"key": "in-particular", "type": "clause", "offset": [296, 309]}, {"key": "by-third-parties", "type": "clause", "offset": [378, 394]}, {"key": "intellectual-property-rights", "type": "definition", "offset": [433, 461]}, {"key": "utility-models", "type": "clause", "offset": [510, 524]}, {"key": "the-confidential-information", "type": "definition", "offset": [530, 558]}], "hash": "a55717f4820bbc153442c631a1004c5e", "id": 2}, {"snippet": "means any technique designed to extract source code or facilitate the duplication of a program or product including, without limitation, (a) the x-ray, electronic scanning or physical or chemical stripping of semiconductor components, or (b) the disassembly, decompilation, decryption or simulation of object code or executable code.", "samples": [{"hash": "ag8ryriRQ4f", "uri": "/contracts/ag8ryriRQ4f#reverse-engineering", "label": "Renewal License Agreement (Activision Inc /Ny)", "score": 20.0, "published": true}, {"hash": "eah6cxsfT1Q", "uri": "/contracts/eah6cxsfT1Q#reverse-engineering", "label": "License Agreement (Activision Inc /Ny)", "score": 18.0, "published": true}, {"hash": "5q0V2I35xNL", "uri": "https://investor.activision.com/static-files/7d5e2cd4-dc0a-475c-8709-6b742acdf9df", "label": "Amendment", "score": 13.965092659, "published": false}], "size": 7, "snippet_links": [{"key": "source-code", "type": "clause", "offset": [40, 51]}, {"key": "without-limitation", "type": "clause", "offset": [117, 135]}, {"key": "object-code", "type": "definition", "offset": [302, 313]}, {"key": "executable-code", "type": "definition", "offset": [317, 332]}], "hash": "a95c60f792584aba51a84ef416d4030c", "id": 3}, {"snippet": "means: (a) the x-ray electronic scanning and/or physical or chemical stripping of semiconductor components; (b) the disassembly, decompilation, decryption, simulation, debugging or code tracing of microcode; and/or (c) the disassembly, decompilation, decryption, simulation, debugging or code tracing of object code or executable code, specifically including, but not limited to, any NINTENDO supplied or developed libraries or microcode. The limitations set forth in this Section 3.4 shall not preclude LICENSEE from engaging in reverse engineering of any Game code which was developed solely by LICENSEE and related only to the Game and was not supplied by nor derived from any code supplied by NINTENDO.", "samples": [{"hash": "lfR1JnkqrsZ", "uri": "/contracts/lfR1JnkqrsZ#reverse-engineering", "label": "Confidential License Agreement (Acclaim Entertainment Inc)", "score": 18.0, "published": true}, {"hash": "kMvK2z20Bbz", "uri": "/contracts/kMvK2z20Bbz#reverse-engineering", "label": "License Agreement (Bam Entertainment Inc)", "score": 18.0, "published": true}, {"hash": "jUpc3O9p7j7", "uri": "/contracts/jUpc3O9p7j7#reverse-engineering", "label": "Confidential License Agreement (THQ Inc)", "score": 18.0, "published": true}], "size": 6, "snippet_links": [{"key": "object-code", "type": "definition", "offset": [304, 315]}, {"key": "executable-code", "type": "definition", "offset": [319, 334]}, {"key": "not-limited", "type": "clause", "offset": [364, 375]}, {"key": "section-34", "type": "clause", "offset": [473, 484]}, {"key": "engaging-in", "type": "definition", "offset": [518, 529]}, {"key": "by-licensee", "type": "clause", "offset": [594, 605]}], "hash": "60ea1b3ef6ed39344441e42d1e7578fc", "id": 4}, {"snippet": "means the process of studying, analyzing, or disassembling a product or device to discover its design, structure, construction, or source code provided that the product or device was acquired lawfully or from a person having the legal right to convey it.", "samples": [{"hash": "54UAuXDxEnC", "uri": "https://www.fwlawreporter.com/wp-content/uploads/sites/265/2016/12/TUTSA_with_DTSA_Redlines.pdf", "label": "www.fwlawreporter.com", "score": 8.5920600891, "published": false}, {"hash": "hvau8KJqb68", "uri": "https://statutes.capitol.texas.gov/Docs/CP/htm/CP.134A.htm", "label": "statutes.capitol.texas.gov", "score": 8.1704311371, "published": false}, {"hash": "h5eBYmzSfLL", "uri": "http://search.txcourts.gov/SearchMedia.aspx?MediaVersionID=31ae68c0-3664-4a2f-a47e-5868af86e866&coa=cossup&DT=MOTION&MediaID=2b8d5da4-47b7-4e25-ab6f-9b973220b443", "label": "search.txcourts.gov", "score": 8.1704311371, "published": false}], "size": 5, "snippet_links": [{"key": "the-process", "type": "clause", "offset": [6, 17]}, {"key": "source-code", "type": "clause", "offset": [131, 142]}, {"key": "provided-that", "type": "definition", "offset": [143, 156]}, {"key": "the-product", "type": "definition", "offset": [157, 168]}, {"key": "a-person", "type": "definition", "offset": [209, 217]}, {"key": "right-to-convey", "type": "clause", "offset": [235, 250]}], "hash": "2c4ac66e262fbbe8ee364479a5a2854b", "id": 5}, {"snippet": "means the examination, disassembly, decompilation, decryption, simulation, code tracing of object code or executable code, debugging, or analysis of the Product or Confidential Information to determine its Source Code, structure, organization, internal design, constituent technologies, algorithms or encryption devices.", "samples": [{"hash": "7edhIevBQiE", "uri": "/contracts/7edhIevBQiE#reverse-engineering", "label": "Distribution Agreement", "score": 31.8755607605, "published": true}, {"hash": "lRaZDhHzUjC", "uri": "/contracts/lRaZDhHzUjC#reverse-engineering", "label": "Distribution Agreement", "score": 26.414100647, "published": true}, {"hash": "1fpsIy5Enkg", "uri": "/contracts/1fpsIy5Enkg#reverse-engineering", "label": "Distribution Agreement", "score": 26.414100647, "published": true}], "size": 4, "snippet_links": [{"key": "the-examination", "type": "clause", "offset": [6, 21]}, {"key": "object-code", "type": "definition", "offset": [91, 102]}, {"key": "executable-code", "type": "definition", "offset": [106, 121]}, {"key": "the-product", "type": "definition", "offset": [149, 160]}, {"key": "confidential-information", "type": "clause", "offset": [164, 188]}, {"key": "to-determine", "type": "clause", "offset": [189, 201]}, {"key": "source-code", "type": "clause", "offset": [206, 217]}], "hash": "4763457a1e1e9c8eb1f09793ddf42420", "id": 6}, {"snippet": "means the process of discovering the technological principles of a device, object or system through analysis of its structure, function and operation as", "samples": [{"hash": "499bh5ZXyEz", "uri": "https://judiciary.go.ug/files/downloads/Act%20No.2%20of%202009%20Trade%20Secrets%20Protection%20Act.pdf", "label": "judiciary.go.ug", "score": 17.2746524811, "published": false}, {"hash": "eWk1La6UFsf", "uri": "https://www.ictpolicyafrica.org/api/documents/download?_id=5d9432bc9b93fa001b80410c", "label": "www.ictpolicyafrica.org", "score": 7.6433949471, "published": false}, {"hash": "2yKYfgTyibu", "uri": "https://old.ulii.org/system/files/legislation/act/2009/2/Trade%20Secrets%20Protection%20Act,%202009.docx", "label": "old.ulii.org", "score": 5.210814476, "published": false}], "size": 4, "snippet_links": [{"key": "the-process", "type": "clause", "offset": [6, 17]}, {"key": "and-operation", "type": "clause", "offset": [136, 149]}], "hash": "c46058028cd5af429ce33c5eb0245cfa", "id": 7}, {"snippet": "means any act of reverse engineering, translating, disassembling, decompiling, decrypting or deconstructing (including \"cable sniffing\" or \"black box\" reverse engineering) or any method or process of obtaining or converting any information, data, or software from one form into a human readable form.", "samples": [{"hash": "8L7OKGKPnWP", "uri": "/contracts/8L7OKGKPnWP#reverse-engineering", "label": "Software License Agreement", "score": 26.716632843, "published": true}, {"hash": "4A4loXZYxBj", "uri": "/contracts/4A4loXZYxBj#reverse-engineering", "label": "Software License Agreement", "score": 26.0691299438, "published": true}], "size": 4, "snippet_links": [{"key": "black-box", "type": "definition", "offset": [140, 149]}], "hash": "84a8f91f47c0cad0a9764cf462526262", "id": 8}, {"snippet": "means: (a) the x-ray electronic scanning and/or physical or chemical stripping of semiconductor components; and/or (b) the disassembly, decompilation, decryption, or simulation of object code or executable code, specifically including, but not limited to, any NINTENDO supplied or developed libraries. The limitations set forth in this Section 3.4 shall not preclude LICENSEE from engaging in reverse engineering of any Game code which was developed solely by LICENSEE and relates only to the Game(s) and was not supplied by nor derived from any code supplied by NINTENDO.", "samples": [{"hash": "iO1rj5ElkGC", "uri": "/contracts/iO1rj5ElkGC#reverse-engineering", "label": "Confidential License Agreement (3do Co)", "score": 18.0, "published": true}, {"hash": "9vDT0ggJpAW", "uri": "/contracts/9vDT0ggJpAW#reverse-engineering", "label": "License Agreement (3do Co)", "score": 18.0, "published": true}], "size": 3, "snippet_links": [{"key": "object-code", "type": "definition", "offset": [180, 191]}, {"key": "executable-code", "type": "definition", "offset": [195, 210]}, {"key": "not-limited", "type": "clause", "offset": [240, 251]}, {"key": "section-34", "type": "clause", "offset": [336, 347]}, {"key": "engaging-in", "type": "definition", "offset": [381, 392]}, {"key": "by-licensee", "type": "clause", "offset": [457, 468]}], "hash": "45b9f0d813a0080a39fecf8611de3b32", "id": 9}, {"snippet": "means all actions, including observation, testing, examination and dismantling and, where applicable, reassembly, with the aim of obtaining Confidential Information.", "samples": [{"hash": "idIDwVxa13y", "uri": "/contracts/idIDwVxa13y#reverse-engineering", "label": "Special Terms for Myptv Value Added Reseller", "score": 28.1389465332, "published": true}, {"hash": "dmzHZEFdkvw", "uri": "/contracts/dmzHZEFdkvw#reverse-engineering", "label": "Special Terms for Myptv Independent Software Vendor", "score": 26.7946605682, "published": true}], "size": 2, "snippet_links": [{"key": "all-actions", "type": "definition", "offset": [6, 17]}, {"key": "where-applicable", "type": "clause", "offset": [84, 100]}, {"key": "confidential-information", "type": "clause", "offset": [140, 164]}], "hash": "63481e589290588d0be195af1b32e283", "id": 10}], "next_curs": "CmASWmoVc35sYXdpbnNpZGVyY29udHJhY3RzcjwLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiIccmV2ZXJzZS1lbmdpbmVlcmluZyMwMDAwMDAwYQyiAQJlbhgAIAA=", "definition": {"snippet": "means, without limitation, (a) the x-ray, electronic scanning or physical or chemical stripping of semiconductor components, (b) the disassembly, decompilation, decryption or simulation of object code or executable code, or (c) any other technique designed to extract source code or facilitate the duplication of a program or product.", "size": 62, "title": "Reverse Engineering", "id": "reverse-engineering", "examples": ["The receiving party is prohibited from obtaining Confidential Information by means of so-called <strong>Reverse Engineering</strong>.", "The receiving party shall refrain from exploiting or imitating Confidential Information outside the scope of its purpose in any manner whatsoever (in particular by means of <strong>Reverse Engineering</strong>) or having it exploited or imitated by third parties and, in particular, from applying for Intellectual Property Rights \u2013 in particular trademarks, designs, patents or utility models \u2013 to the Confidential Information.", "Limitations on <strong>Reverse Engineering</strong>, De-compilation, and Disassembly.", "The Receiving Party is prohibited from obtaining Confidential Information by means of so-called <strong>Reverse Engineering</strong>.", "Limitations on <strong>Reverse Engineering</strong>, Decompilation and Disassembly.", "Limitations on <strong>Reverse Engineering</strong>, Decompilation, and Disassembly."], "related": [["engineering", "Engineering", "Engineering"], ["systems-engineering", "Systems Engineering", "Systems Engineering"], ["geotechnical-engineer", "Geotechnical engineer", "Geotechnical engineer"], ["value-engineering", "Value Engineering", "Value Engineering"], ["practice-of-engineering", "Practice of engineering", "Practice of engineering"]], "related_snippets": [], "updated": "2025-07-24T04:27:56+00:00"}, "json": true, "cursor": ""}}