Escrowed Technology Software License Sample Clauses

Escrowed Technology Software License. Subject to the terms and conditions of this Agreement, in the event of and only in the event of a Triggering Event, LMI grants Intel a license for two years after such Triggering Event to the Escrow Technology solely for the purposes of the Solution, including the right to modify, port, translate, localize or create derivative works from the LMI Components or any Escrowed Technology . Intel shall pay a licensing fee to LMI equal to [**]% of the Revenue LMI would otherwise be entitled to under Section 12.6 herein. This license is a nontransferable, nonexclusive and without the right to sublicense. The license is solely in connection with accessing or connecting to personal computers and servers for the purposes specifically described in this Agreement and the Schedules hereto and only during for the time period described in this Section. Intel acknowledges that LMI owns, and shall continue to own, all right, title and interest in the items subject to the license, and Intel agrees that it will do nothing inconsistent with such ownership, and does not obtain by this Agreement any right to use said the items subject to the license other than for the specific purposes that may be identified. This license is a right and license allowing Intel to use the Escrowed Technology under the restrictions, terms and conditions within this Agreement.
AutoNDA by SimpleDocs

Related to Escrowed Technology Software License

  • Licensed Software Section 3.17(f).......................................27

  • Software License ICS will grant the Business Manager a non-exclusive and royalty-free right and license to use and copy software owned by ICS and to use certain third party software according to the terms of the applicable third party licenses to ICS, all in connection with the Business Manager’s obligations under the Agreement. ICS will provide the Business Manager with all upgrades to the licensed software.

  • Software License Agreement McDATA agrees that all Licensed Software will be distributed to Customers subject to a Software License Agreement (including warranty statement), along with a McDATA Manual, in a manner which is (a) no less protective of BROCADE's Intellectual Property Rights in the Licensed Software than the form attached hereto as Exhibit D, and (b) legally enforceable in the jurisdictions in which the Licensed Software, as incorporated into the McDATA Products, is distributed.

  • Third Party Software Customer acknowledges that in order for MyEcheck to perform the Consulting Services, Customer may need to obtain additional third party services ("Third Party Services") or third party technology ("Third Party Technology"). Customer agrees that the rights and licenses with respect to Third Party Technology and Third Party Services shall be under terms set forth in the pertinent purchase, license or services agreements between Customer and the vendors of such Third Party Software or Third Party Services. Customer shall execute and comply with appropriate purchase, license, or services agreements with respect to any Third Party Software or Third Party Services. Any amounts payable to third party vendors or service providers under such agreements are the sole responsibility of Customer and shall be paid directly by Customer to such third party vendors or service providers. MyEcheck Services Agreement

  • Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).

  • Software Licenses Seller has all necessary licenses to use all material third-party software used in Seller's business, and Seller's use of third-party software does not infringe the rights of any Person.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

  • Licensed Technology The term "Licensed Technology" shall mean the ------------------- Licensed Patents, plus all improvements thereto developed by Licensor, and all related data, know-how and technology.

  • Source Code OEM acknowledges the extreme importance of the confidentiality and trade secret status of the RSA Source Code and OEM agrees, in addition to complying with the requirements of Section 6.1 as it relates to the RSA Source Code, to: (i) only use the RSA Source Code at the address set forth on page 1 hereof or such alternate location specified in the applicable License/Product Schedule; (ii) inform any employee that is granted access to all or any portion of the RSA Source Code of the importance of preserving the confidentiality and trade secret status of the RSA Source Code; and (iii) maintain a controlled, secure environment for the storage and use of the RSA Source Code.

Time is Money Join Law Insider Premium to draft better contracts faster.