| http://www.w3.org/ns/prov#value | - g our networks; (iv) use the Software to develop software or services that access the address space of the Software or that intercept the proxy; (v) attempt to gain unauthorized access to any of our services or networks; (vi) rent, lend, lease, sublicense or otherwise transfer rights to the Software; (vii) remove or alter any trademark, logo, copyright or other proprietary notices, legends, symbol
|