Authorized Computers Clause Samples

The "Authorized Computers" clause defines which computers or devices are permitted to access, use, or interact with certain software or digital services under the agreement. Typically, this clause restricts usage to specific machines owned or controlled by the licensee, such as company-issued laptops or designated workstations, and may require registration or identification of these devices. Its core practical function is to prevent unauthorized access or distribution of the software, thereby protecting the licensor’s intellectual property and ensuring compliance with licensing terms.
Authorized Computers. When using our Online Banking, we will authorize you to use one or more computers for transmitting your ACH files to us. You are solely responsible for access by your employees or other authorized representatives to the authorized computers and to the data files maintained on the computer. Your authorized representative will be able to access the ACH system by utilizing prearranged logon procedures consisting of user identification names and passwords.
Authorized Computers. Each serial number issued by the Licensor to the Licensee will authorize the use of the Software on a fixed number of computers (“Authorized Computers”). To use the Software on additional computers will require obtaining additional serial numbers from Licensor.

Related to Authorized Computers

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Passwords Passwords are an important aspect of computer security. A poorly chosen password may result in unauthorized access and/or exploitation of Placer County’s resources. All users, including contractors and vendors with access to the County’s systems, are responsible for the creation and protection of passwords and additionally any updates to County Password policies must be followed. Users must not use the same password for Placer County accounts and personal accounts. The reliability of passwords for maintaining confidentiality cannot be guaranteed. Always assume that someone, in addition to the intended or designated recipient, may read any and all messages and files. Any user suspecting that his/her password may have been compromised must, without delay, report the incident to Placer County IT. 10.2.4.1 Passwords must never be shared or disclosed. If a password is accidentally exposed or suspected of exposure, the password should be changed immediately. 10.2.4.2 All passwords must be changed on a specified, periodic basis. 10.2.4.3 Default passwords provided by the vendor for access to applications/systems on the network must be changed to unique and secret passwords. 10.2.4.4 Immediately inform the Information Technology Service Desk when user accounts are no longer required or will not be used for a period of 30 days or more. 10.2.4.5 All accounts not used for 90 days will be automatically disabled.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Authorized Users Authorized Users" are: