Common use of Servers Clause in Contracts

Servers. On purchase order, the Vendor provides a cryptographically individual- ised installer for the Server available to the Customer. It falls to the Customer to procure licences for software deployed with but not included in the Software, e. g. operating system, database, backup or clustering software. The Vendor is entitled to forestall the illegitimate propagation of its Software by technical means, e. g cryptographic hardware or software components or online activation procedures which may be required for installing and running a Server. The deployed cryptographic mecha- nisms may also serve for secure authentication with the Subscription Store. Servers must be physically located in a way that enables the Customer to comply with its duty to take care. This prevents any placement of the Server in unprotected public networks.

Appears in 2 contracts

Samples: Software Subscription Agreement, Software Subscription Agreement

AutoNDA by SimpleDocs

Servers. On purchase order, the Vendor provides a cryptographically individual- ised ized installer for the Server available to the Customer. It falls to the Customer to procure licences licenses for software deployed with but not included in the Software, e. g. operating system, database, backup or clustering software. The Vendor is entitled to forestall the illegitimate propagation of its Software Soft- xxxx by technical means, e. g cryptographic hardware or software components com- ponents or online activation procedures which may be required for installing in- stalling and running a Server. The deployed cryptographic mecha- nisms mechanisms may also serve for secure authentication with the Subscription Store. Servers must be physically located in a way that enables the Customer to comply with its duty to take care. This prevents any placement of the Server in unprotected public networks.

Appears in 1 contract

Samples: Software Subscription Agreement

AutoNDA by SimpleDocs

Servers. On purchase order, the Vendor provides a cryptographically individual- ised ized installer for the Server available to the Customer. It falls to the Customer to procure licences licenses for software deployed with but not included in the Software, e. g. operating system, database, backup or clustering software. The Vendor is entitled to forestall the illegitimate propagation of its Software Soft- ware by technical means, e. g cryptographic hardware or software components com- ponents or online activation procedures which may be required for installing in- stalling and running a Server. The deployed cryptographic mecha- nisms mechanisms may also serve for secure authentication with the Subscription Store. Servers must be physically located in a way that enables the Customer to comply with its duty to take care. This prevents any placement of the Server in unprotected public networks.

Appears in 1 contract

Samples: Software Subscription Agreement

Time is Money Join Law Insider Premium to draft better contracts faster.