A TRUE COPY
<br />CERTIFICATION ON LAST PAGE
<br />RYAN L. BUTLER, CLERK
<br />j. Client may provide its consultant(s) or independent contractor(s) with access to the Software and
<br />Documentation, provided that such consultants or independent contractors are using the Software
<br />and Documentation exclusively for the benefit of the Client. Client shall be responsible for compliance
<br />by its consultants and independent contractors with the terms and conditions of this Agreement.
<br />k. If Client has subscribed to the WebEOC Enterprise Software or the WebEOC Professional Software,
<br />then Client may use the WebEOC BoardBuilder tool and, if subscribed to, the DesignStudio®
<br />solution, to copy, modify and create forms and templates ("Status Boards") and Client may distribute,
<br />in printed form or as electronic media, the Status Boards to Client's authorized users, provided that
<br />such Status Boards are used exclusively for the internal business purposes of Client. Status Boards
<br />shall be considered Derivative Work(s) of the Software and Client shall not sell, resell, license or
<br />otherwise transfer for value any Derivative Work(s) created using the WebEOC BoardBuilder tool or
<br />the DesignStudio® solution, and Client shall not distribute such Derivative Work(s) as part of any
<br />product or service for value to any third party. Any Derivative Work(s) prepared by Client shall remain
<br />subject to the terms of this Agreement and shall clearly display the following copyright notice to
<br />properly acknowledge the proprietary rights of ESi and its third -party licensors: "This work includes
<br />the intellectual property of ESi Acquisition, Inc. and its licensors and is provided under
<br />subscription/license. Copyright © 2002-2023, ESi Acquisition, Inc. and its licensors. All rights
<br />reserved."
<br />I. Client may, at its option and according to the terms of the ESi standard price list, obtain a Disaster
<br />Recovery Software Subscription to support replication of an active, source server to one or more
<br />redundant ("Target") servers which may be placed in use to support disaster recovery or fail -over
<br />activities. A Disaster Recovery Software Subscription is required for each Target server. A Disaster
<br />Recovery Software Subscription may be used to operate an "in production" instance of the Software
<br />only when the source server is inactive or inoperable; only one Instance of the Software shall be
<br />active at any one time. Client is not required to obtain additional subscriptions for Software plug -ins,
<br />modules or interfaces installed on a redundant non -production Instance.
<br />m. Permitted uses of WebEOC Fusion Software vary from the terms set forth in subsection (a) through
<br />(1) of this Section 6; in the event Client has purchased WebEOC Fusion Software, this subsection
<br />6(m) shall apply: Client may install and place in production one (1) copy of WebEOC Fusion Software
<br />on one (1) source server and one (1) target server. Client may make one (1) copy of the WebEOC
<br />Fusion Software for back-up or archival purposes, or Client may install a second copy of the WebEOC
<br />Fusion Software on a second Machine if only one (1) copy of the WebEOC Fusion software is in use
<br />at any one time. There is no limit to the number of the Subscription Instances of WebEOC Fusion
<br />Software® (or number of WebEOC Fusion Software clients) which may be connected by a single
<br />instance of WebEOC Fusion Software, provided that (i) only the Client of the WebEOC Fusion
<br />Software has administrative privileges and administrative access to the WebEOC Fusion Software
<br />and (ii) the Client has paid to ESi all applicable connection fees.
<br />n. A high-speed Internet connection is required for proper transmission of the Client Data into the
<br />Hosting Services and Software. Client, at its sole cost and expense, is solely responsible for
<br />procuring and maintaining the network connections that connect the Client network to the Hosting
<br />Services and Software, including, but not limited to, "browser" software that supports protocols used
<br />by ESi, and to follow procedures for accessing services that support such protocols. ESi is not
<br />responsible for notifying Client and its Users of any upgrades, fixes, or enhancements to any such
<br />software or for any compromise of data, including Client Data, transmitted across computer networks
<br />or telecommunications facilities (including but not limited to the Internet) which are not owned,
<br />operated, or controlled by ESi. ESi assumes no responsibility for the reliability or performance of any
<br />connections as described in this subsection.
<br />o. Client and its Users agree to not: (i) license, sublicense, sell, resell, rent, lease, transfer, assign,
<br />distribute, time share, or otherwise commercially exploit or make the Software and Hosting Services
<br />available to any third party, other than authorized Users in furtherance of Client's Internal Business
<br />Purposes as expressly permitted by this Agreement; (ii) use the Software and Hosting Services to
<br />process data on behalf of any third party other than Client; (iii) modify, adapt, or hack the Software
<br />and Hosting Services, or otherwise attempt to gain unauthorized access to the Software and Hosting
<br />Services or related systems or networks; (iv) falsely imply any sponsorship or association with ESi,
<br />(v) use the Software and Hosting Services in any unlawful manner, including but not limited to
<br />violation of any person's privacy rights; (vi) use the Software and Hosting Services to send unsolicited
<br />or unauthorized junk mail, spam, pyramid schemes, or other forms of duplicative or unsolicited
<br />messages; (vii) use the Software and Hosting Services to store or transmit files, materials, data, text,
<br />audio, video, images, or other content that infringes on any person's intellectual property rights; (viii)
<br />use the Software and Hosting Services in any manner that interferes with or disrupts the integrity or
<br />performance of the Software and Hosting Services and its components; (ix) attempt to decipher,
<br />decompile, reverse engineer, or otherwise discover the source code of any software making up the
<br />Confidential and Proprietary
<br />Indian River. ESi .EUSA.draft 9-10-24 Page 4 of 20
<br />
|