Protection of Computer Systems and Software Sample Clauses

Protection of Computer Systems and Software. The Employee agrees to take all necessary precautions to protect the computer systems and software of the Company, including, without limitation, complying with the obligations set out in the Company’s policies.
AutoNDA by SimpleDocs
Protection of Computer Systems and Software. I agree to take all necessary precautions to protect the computer systems and software of the Company and of the suppliers and clients of the Company. A4
Protection of Computer Systems and Software. The Consultant agrees to take all necessary precautions to protect the computer systems and software of the Corporation and of the suppliers and clients of the Corporation. The Consultant agrees to comply with the obligations set out in the Corporation’s Computer and Network Protection Rules (the “Rules”). A copy of the Rules, as currently in effect, is attached as Schedule "B" to this Agreement. The Consultant agrees that the Corporation may unilaterally amend the Rules, and upon their delivery to the Consultant such new Rules will form part of this Agreement and will be binding on the Consultant. The Consultant agrees that violation of any of such Rules may constitute a fundamental breach of the Consultant's engagement.
Protection of Computer Systems and Software. 13. The Employee agrees to take all necessary precautions to protect the computer systems and software of Hostopia and of the suppliers and clients of Hostopia, including without limitation complying with the obligations set out in Hostopia's Computer and Network Protection Rules (collectively, the "Rules"). A copy of the Rules, as currently in effect, is attached as Exhibit B to this Agreement. The Employee agrees that Hostopia may unilaterally amend the Rules, and upon their delivery to the Employee such new rules shall form part of this Agreement and will be binding on the Employee. The Employee agrees that violation of any of such Rules may be grounds for discipline up to and including immediate dismissal for cause.
Protection of Computer Systems and Software. The Consultant agrees to take all necessary precautions to protect the computer systems and software of the Company, including, without limitation, complying with the obligations set out in the Company’s policies.
Protection of Computer Systems and Software. I agree to take all necessary precautions to protect the computer systems and software of the Company and of the suppliers and clients of the Company, including without limitation complying with the obligations set out in the Company’s Computer and Network Protection Rules (collectively, the “Rules”). A copy of the Rules, as currently in effect, is attached as Schedule B to this Agreement. I agree that the Company may unilaterally amend the Rules, and upon their delivery to me such new Rules will form part of this Agreement and will be binding on me. I agree that violation of any of such Rules may be grounds for discipline up to and including immediate dismissal for cause.
Protection of Computer Systems and Software. The Employee agrees to take all necessary precautions to protect the computer systems and software of the Corporation, and the Corporation's Affiliates, including, without limitation, complying with the obligations set out in any of the Corporation's policies of which the Employee is advised from time to time. The Employee will not insert into the software any time bombs, trojan horses, worms or other hidden devices that will, or whose intention is, to cause any software owned, used or licensed by the Corporation or any of the Corporations Affiliates to cease to operate or to fail to operate in accordance with its documentation. The Employee agrees that violation of any of such policies may be grounds for discipline up to and including immediate dismissal for just cause.
AutoNDA by SimpleDocs

Related to Protection of Computer Systems and Software

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • Computer Systems (a) The Computer Systems adequately meet the data processing and other computing needs of the Business as presently conducted. The Computer Systems function, operate, process and compute in accordance with all Applicable Laws, industry standards and trade practices. The Computer Systems operate and perform in all material respects in accordance with their documentation and functional specifications. The Computer Systems have not materially malfunctioned or failed within the past three years.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

Time is Money Join Law Insider Premium to draft better contracts faster.