RELOCATION, MODIFICATION OR IMPROPER USAGE OF SOFTWARE Sample Clauses

RELOCATION, MODIFICATION OR IMPROPER USAGE OF SOFTWARE. Copper Mountain Networks shall be under no obligation to continue provision of service for software under this Agreement if:
AutoNDA by SimpleDocs
RELOCATION, MODIFICATION OR IMPROPER USAGE OF SOFTWARE. Seller shall be under no obligation to continue provision of Service for software under this Agreement if:

Related to RELOCATION, MODIFICATION OR IMPROPER USAGE OF SOFTWARE

  • Modification of Licensed Materials The Participating Institutions or the Authorized Users shall not modify or manipulate the Licensed Materials without the prior written permission of the Licensor.

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

  • Unbundled Loop Modifications (Line Conditioning 2.5.1 Line Conditioning is defined as routine network modification that BellSouth regularly undertakes to provide xDSL services to its own customers. This may include the removal of any device, from a copper Loop or copper Sub-loop that may diminish the capability of the Loop or Sub-loop to deliver high-speed switched wireline telecommunications capability, including xDSL service. Such devices include, but are not limited to, load coils, excessive bridged taps, low pass filters, and range extenders. Excessive bridged taps are bridged taps that serves no network design purpose and that are beyond the limits set according to industry standards and/or the XxxxXxxxx XX 00000.

  • Software Modifications Company may request that BNYM, at Company’s expense, develop modifications to the software constituting a part of the Licensed System that BNYM generally makes available to customers for modification (“Software”) that are required to adapt the Software for Company’s unique business requirements. Such requests, containing the material features and functionalities of all such modifications in reasonable detail, will be submitted by Company in writing to BNYM in accordance with the applicable, commercially reasonable procedures maintained by BNYM at the time of the request. Company shall be solely responsible for preparing, reviewing and verifying the accuracy and completeness of the business specifications and requirements relied upon by BNYM to estimate, design and develop such modifications to the Software. BNYM shall have no obligation to develop modifications to the Licensed System requested by Company, but may in its discretion agree to develop requested modifications which it, in its sole discretion, reasonably determines it can accomplish with existing resources or with readily obtainable resources without disruption of normal business operations provided Company agrees at such time in writing to pay all costs and expenses, including out-of-pocket expenses, associated with the customized modification. BNYM shall be obligated to develop modifications under this Section 2.16 only upon the execution of and in accordance with a writing containing, to BNYM’s reasonable satisfaction, all necessary business and technical terms, specifications and requirements for the modification as determined by BNYM in its sole judgment (“Customization Order”) and Company’s agreement to pay all costs and expenses, including out-of-pocket expenses, associated with the customized modification (“Customization Fee Agreement”). All modifications developed and incorporated into the Licensed System pursuant to a Customization Order are referred to herein as “Company Modifications”. BNYM may make Company Modifications available to all users of the Licensed System, including BNYM, at any time after implementation of the particular Company Modification and any entitlement of Company to reimbursement on account of such action must be contained in the Customization Fee Agreement.

  • DOES THE SPR NEED TO BE UPDATED IF INFORMATION CHANGES Yes. It remains a continuing obligation of the principal or his/her authorized agent to update the SPR whenever any of the information provided on the initial form changes. WHERE DO THE SPR AND ANY UPDATES NEED TO BE FILED? The SPR needs to be filed with the County Department or County Division processing the application or matter. If and when an additional expenditure is incurred subsequent to the initial filing of the SPR, an amended SPR needs to be filed with the County Department or County Division where the original application, including the initial SPR, was filed. WHEN DO THE SPR AND ANY UPDATES NEED TO BE FILED? In most cases, the initial SPR needs to be filed with the other application forms. The SPR and any update must be filed with the appropriate County Department or County Division not less than seven (7) days prior to the BCC hearing date so that they may be incorporated into the BCC agenda packet. (See Section 2-354(b), Orange County Code.) When the matter is a discussion agenda item or is the subject of a public hearing, and any additional expenditure occurs less than 7 days prior to BCC meeting date or updated information is not included in the BCC agenda packet, the principal or his/her authorized agent is obligated to verbally present the updated information to the BCC when the agenda item is heard or the public hearing is held. When the matter is a consent agenda item and an update has not been made at least 7 days prior to the BCC meeting or the update is not included in the BCC agenda packet, the item will be pulled from the consent agenda to be considered at a future meeting.

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Embedded Software To the extent any goods contain Embedded Software (defined below) that is not Buyer’s Property, no title to such Embedded Software shall pass to Buyer, and Supplier shall grant Buyer, its customers and all other users a non-exclusive worldwide, irrevocable, perpetual, royalty-free right to use, load, install, execute, demonstrate, market, test, resell, sublicense and distribute such Embedded Software as an integral part of such goods or for servicing the goods (the “Buyer-Required License”). If such Embedded Software or any part thereof is owned by a third party, prior to delivery, Supplier shall obtain the Buyer-Required License from such third-party owner. “Embedded Software” means software necessary for operation of goods and embedded in and delivered as an integral part of goods.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Customer Content As part of the Services provided under this Agreement, Customer Data will be stored and processed in the data center region specified in the applicable Ordering Document. Axway shall not access Customer Content except in response to support or technical issues where Customer provides Axway with prior Customer’s written authorization required to access such Customer Content. Axway is not responsible for unauthorized access, alteration, theft or destruction of Customer Content arising from Customer’s own or its authorized users’ actions or omissions in contravention of the Documentation. Customer’s ability to recover any lost data resulting from Axway’s misconduct is limited to restoration by Axway from the most recent back-up.

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code.

Time is Money Join Law Insider Premium to draft better contracts faster.