Unauthorized Distribution or Copying Sample Clauses

Unauthorized Distribution or Copying. OEM agrees that using, distributing, copying, duplicating or otherwise reproducing all or any part of the Software: (a) other than in conjunction with the Integrated System, (b) in excess of the Authorized Ports, or (c) otherwise than in strict accordance with this Agreement, will be considered a material breach of this Agreement.
AutoNDA by SimpleDocs
Unauthorized Distribution or Copying. VAR agrees that: (A) distributing, copying, duplicating or otherwise reproducing all or any part of the Software (except as expressly permitted by this Agreement); or (B) distributing copies of all or any portion of the Software other than in conjunction with the Integrated System and in strict accordance with this Agreement, will be considered a material breach of this Agreement. Regardless of any cure period under any other section of this Agreement, Nuance shall have the immediate right to seek injunctive relief for breach under this Section. In any event, and regardless of any other cure period under this agreement, the cure period for breach under this SECTION 7.2 shall be a maximum of ten (10) days.
Unauthorized Distribution or Copying. Other than in accordance with this Agreement, Customer shall not, and shall not knowingly permit others to: (a) lease, license, sublicense, transfer, or assign any of its rights under this Agreement; (b) sell, rent, or distribute the Software or Documentation, including providing access to the Software or Documentation or using the Software or Documentation to provide outsourced services or on a timesharing basis; or (c) use, copy, duplicate, or otherwise reproduce any part of the Software or Documentation. Any breach of this Section 2.4 is a material breach of this Agreement that is incapable of cure.
Unauthorized Distribution or Copying. Other than in strict accordance with this Agreement, Reseller will not, and will not knowingly permit others to:
Unauthorized Distribution or Copying. Customer agrees that using, distributing, copying, duplicating or otherwise reproducing all or any part of the Software except in strict accordance with this Agreement or otherwise violating the provisions of this Section 2.3 will be considered a material breach of this Agreement which is incapable of cure. 2.4 Customer Responsibilities. Customer has sole responsibility for Customer's use and operation of the Software including monitoring and verifying input and output data, back-up of input and output data, providing data for any files or tables of such Software, and for maintaining the required Software environment. Customer is responsible for installation of the Software and for converting any data files for use with the Software.
Unauthorized Distribution or Copying. OEM agrees that (a) distributing, copying, duplicating or otherwise reproducing all or any part of the Adobe Software, Other Adobe-Supplied Software, Demonstration Program(s), PostScript Product Certification Test Suite, Coded Font Programs or Documentation (except as expressly permitted by this Agreement); (b) distributing copies of all or any portion of the Adobe Software, Other Adobe-Supplied Software, Demonstration Program(s) or Coded Font Programs other than in the form of royalty-bearing End User products; (c) failing to ensure that each End User of the CPSI Application and Coded Font Programs first obtains a license and pays the appropriate royalty fee in accordance with the royalty provisions contained herein; or (d) distributing the CPSI Application Object or Coded Font Programs for use on other than a Computer System, or for use in conjunction with an output device that is not a Designated Output Device, will be considered a material breach of this Agreement.
Unauthorized Distribution or Copying. Other than in accordance with this Agreement, Customer shall not, and shall not permit others to: (a) lease, license, sublicense, transfer, or assign any of its rights under this Agreement; (b) sell, rent, lease, lend, or distribute the Software or any benchmark performance information or analysis, including providing access to the Software or using the Software to operate a service bureau or on a timesharing basis; or (c) use, copy, duplicate, or otherwise reproduce all or any part of the Software or Documentation.
AutoNDA by SimpleDocs

Related to Unauthorized Distribution or Copying

  • Unauthorized Use Licensee, the Participating Institutions, or Authorized Users shall not knowingly permit anyone other than Authorized Users to access the Licensed Materials.

  • Unauthorized Disclosure The Executive agrees and understands that in the Executive’s position with the Company, the Executive has been and will be exposed to and has and will receive information relating to the confidential affairs of the Company Group, including, without limitation, technical information, intellectual property, business and marketing plans, strategies, customer information, software, other information concerning the products, promotions, development, financing, expansion plans, business policies and practices of the Company Group and other forms of information considered by the Company Group to be confidential or in the nature of trade secrets (including, without limitation, ideas, research and development, know-how, formulas, technical data, designs, drawings, specifications, customer and supplier lists, pricing and cost information and business and marketing plans and proposals) (collectively, the “Confidential Information”). Confidential Information shall not include information that is generally known to the public or within the relevant trade or industry other than due to the Executive’s violation of this Section 4.1 or disclosure by a third party who is known by the Executive to owe the Company an obligation of confidentiality with respect to such information. The Executive agrees that at all times during the Executive’s employment with the Company and thereafter, the Executive shall not disclose such Confidential Information, either directly or indirectly, to any individual, corporation, partnership, limited liability company, association, trust or other entity or organization, including a government or political subdivision or an agency or instrumentality thereof (each a “Person”) without the prior written consent of the Company and shall not use or attempt to use any such information in any manner other than in connection with his employment with the Company, unless required by law to disclose such information, in which case the Executive shall provide the Company with written notice of such requirement as far in advance of such anticipated disclosure as possible. This confidentiality covenant has no temporal, geographical or territorial restriction. Upon termination of the Executive’s employment with the Company, the Executive shall promptly supply to the Company all property, keys, notes, memoranda, writings, lists, files, reports, customer lists, correspondence, tapes, disks, cards, surveys, maps, logs, machines, technical data and any other tangible product or document which has been produced by, received by or otherwise submitted to the Executive during or prior to the Executive’s employment with the Company, and any copies thereof in his (or reasonably capable of being reduced to his) possession; provided that nothing in this Employment Agreement or elsewhere shall prevent the Executive from retaining and utilizing: documents relating to his personal benefits, entitlements and obligations; documents relating to his personal tax obligations; his desk calendar, rolodex, and the like; and such other records and documents as may reasonably be approved by the Company.

  • No Unauthorized Use or Disclosure Executive agrees that he will not, at any time during or after Executive’s employment by Company, make any unauthorized disclosure of, and will prevent the removal from Company premises of, Confidential Information or Work Product of Company (or its affiliates), or make any use thereof, except in the carrying out of Executive’s responsibilities during the course of Executive’s employment with Company. Executive shall use commercially reasonable efforts to cause all persons or entities to whom any Confidential Information shall be disclosed by him hereunder to observe the terms and conditions set forth herein as though each such person or entity was bound hereby. Executive shall have no obligation hereunder to keep confidential any Confidential Information if and to the extent disclosure thereof is specifically required by law; provided, however, that in the event disclosure is required by applicable law, Executive shall provide Company with prompt notice of such requirement prior to making any such disclosure, so that Company may seek an appropriate protective order. At the request of Company at any time, Executive agrees to deliver to Company all Confidential Information that he may possess or control. Executive agrees that all Confidential Information of Company (whether now or hereafter existing) conceived, discovered or made by him during the period of Executive’s employment by Company exclusively belongs to Company (and not to Executive), and Executive will promptly disclose such Confidential Information to Company and perform all actions reasonably requested by Company to establish and confirm such exclusive ownership. Affiliates of Company shall be third party beneficiaries of Executive’s obligations under this Article 6. As a result of Executive’s employment by Company, Executive may also from time to time have access to, or knowledge of, Confidential Information or Work Product of third parties, such as customers, suppliers, partners, joint venturers, and the like, of Company and its affiliates. Executive also agrees to preserve and protect the confidentiality of such third party Confidential Information and Work Product to the same extent, and on the same basis, as Company’s Confidential Information and Work Product.

  • Monthly Data Download Not later than fifteen (15) days after the end of each month, beginning with the month in which the Commencement Date occurs and ending with the Final Shared-Loss Month, Assuming Institution shall provide Receiver:

  • Return or Destruction of Confidential Information If an Interconnection Party provides any Confidential Information to another Interconnection Party in the course of an audit or inspection, the providing Interconnection Party may request the other party to return or destroy such Confidential Information after the termination of the audit period and the resolution of all matters relating to that audit. Each Interconnection Party shall make Reasonable Efforts to comply with any such requests for return or destruction within ten days of receiving the request and shall certify in writing to the other Interconnection Party that it has complied with such request.

  • Security; Reliance; Unauthorized Use The Fund will cause all persons utilizing the Software and System to treat all applicable user and authorization codes, passwords and authentication keys with extreme care, and it will establish internal control and safekeeping procedures to restrict the availability of the same to persons duly authorized to give Instructions. Custodian is hereby irrevocably authorized to act in accordance with and rely on Instructions received by it through the System. The Fund acknowledges that it is its sole responsibility to assure that only persons duly authorized use the System and that Custodian shall not be responsible nor liable for any unauthorized use thereof.

  • UNAUTHORIZED DISCLOSURE OF INFORMATION If it appears that Employee has disclosed (or has threatened to disclose) Information in violation of this Agreement, Employer shall be entitled to an injunction to restrain Employee from disclosing, in whole or in part, such Information, or from providing any services to any party to whom such Information has been disclosed or may be disclosed. Employer shall not be prohibited by this provision from pursuing other remedies, including a claim for losses and damages.

  • Remittance Processing Services In order to provide a means of collection of the Receivables which will allow the Trustee to receive the proceeds of the Receivables and related security without AmeriCredit or its Affiliates having access to the funds, the parties hereto agree for the benefit of the Trustee that the processing services (the “Service(s)”) of Processor will be used for the collection and the deposit of remittances related to the Receivables and related security.

  • Improper Transfer Tenant shall assign, sublease or otherwise transfer or attempt to transfer all or any portion of Tenant’s interest in this Lease or the Premises except as expressly permitted herein, or Tenant’s interest in this Lease shall be attached, executed upon, or otherwise judicially seized and such action is not released within 90 days of the action.

Time is Money Join Law Insider Premium to draft better contracts faster.