Software Use Verification Sample Clauses

Software Use Verification. During the Term of this Agreement and for two years afterward, You must keep complete and accurate records of all Software copying and use. During this period, Novell will have the right, at its expense and upon no fewer than 10 working days prior written notice, to audit Your use of the Software and
AutoNDA by SimpleDocs

Related to Software Use Verification

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Software Updates XXXXX agrees to keep current with software licensed from Skyward and will install new versions on a timeline approved by XXXXX governance. This timeline will be communicated by NWRDC to the Districts. School District Workstations Configuration requirements for devices and their software that school district personnel use to access WSIPC’s software modules can be found on our website: xxxxx://xxx.xxxxx.xxx/technology‐team/. State Reports XXXXX will provide, at no additional fee, all data reports required by the state that impact 50% or more of the school districts in the state. WSIPC and NWRDC will work with state agencies to gather requirements on the required data. WSIPC will inform NWRDC staff of any mandated changes to state reports and NWRDC will communicate the information to the District. Appendix B NWRDC FTE Fees Fiscal Only NWRDC Software Support Services XXXXX Software Licensing Total FTE Fee $13.63 $20.34 $33.97 $15.56 $13.08 $28.64 $24.52 $20.34 $44.86 Student Only Full Service

  • Software Upgrades Software Upgrades consist of new product releases which are issued periodically and may include new functionality, enhancements, and bug fixes. Software Upgrades are provided only for standard hardware platforms and operating systems supported by COMSPOC as described in the Documentation. Software Upgrades will apply only to unmodified Software and commercially released updated versions of the Software. You are responsible for making or arranging for updates to interfaces for nonstandard devices or custom applications. Software Upgrades are provided subject to the terms and conditions of the then current and applicable COMSPOC Software License Agreement, available on COMSPOC’s website at xxxx://xxx.xxxxxxx.xxx/sla or with the deliverable Software or upon request. All major product releases and maintenance releases will be made available and may be shipped directly to you, upon request by contacting your COMSPOC point of contact or xxxxxxx@xxxxxxx.xxx. You may upgrade to the latest product version at any time during the term of the Annual Support and Upgrades Agreement. If you opt not to renew the Annual Support and Upgrade Agreement, You have 60 days from the end of the Annual Support and Upgrades Agreement term to upgrade to the latest product version available prior to the end of the Annual Support and Upgrades Agreement term. If You request an upgrade beyond this 60-day period, You will be required to renew the Annual Support and Upgrades Agreement in order to upgrade to the latest product version.

  • End User An “End User” is you, an individual or entity, which receives the Models from Licensee or Authorized Licensee User pursuant to this End User Agreement to use in the regular course of your affairs, but not for resale, modification, distribution or exploitation by third parties without AnyLogic’s prior written consent.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Time is Money Join Law Insider Premium to draft better contracts faster.