Desktop Use Sample Clauses

The "Desktop Use" clause defines the permitted use of software or services specifically on desktop computers. Typically, this clause restricts installation, access, or operation of the product to desktop environments, excluding other platforms such as mobile devices or servers. By clearly delineating where and how the software can be used, this clause helps prevent unauthorized deployment and ensures compliance with licensing terms.
Desktop Use. You may only install the Product on Devices that you own or control. The maximum number of simultaneous users (“Desktop Users”) of the Prod- uct installed on the Devices is 3 (three). All Desktop Users must belong to the same company or household purchas- ing the Product. You or the Desktop Users may use the Product to create documents, scalable drawings and fixed-size images on any surface (collectively: “the Images”) as set that could be used to create further Images with different text content. You may embed the Product into any document you send to third parties. long as the Images are not used as a replacement for the Product, i.e. as long as the Images do not represent a substantial subset of the Product’s character Such documents may be viewed and printed (but not edited) by the recipi- ents.
Desktop Use. This license allows you to install and use the fonts on a limited number of computers within your organization, equal to the number of users specified in your order receipt. All of these computers must be owned by you.
Desktop Use. You may not install or otherwise use the fonts on desktop or laptop computers without a Desktop Use Addendum.
Desktop Use. This section only applies to licensees whose purchased license includes desktop use. (1) The licensees may have simultaneous installations of the fonts on a maximum number of devices (“desktop users”) as specified on the invoice. If no number of desktop users is specified on the invoice, the maximum number is zero. The fonts may only be instal- led on devices that are under the ownership or exclusive control of the licensee’s business, organization, or household. (2) The licensees may use the fonts for the development, creation, and distribution of media for displaying and printing (e.g. graphics, artwork, videos, images for websites, corporate design). (3) The licensees may use the fonts for printing or manufacturing products (e.g. textiles, packaging, posters, or similar products for resale). (4) Digital media created using the fonts may be in a raster image format (e.g. PNG, MPEG) or a vector image format (e.g. SVG, EPS, created with a “Create Outlines” command). The fonts may be embedded properly in a document format (e.g. PDF, EPUB) or in application software for displaying and printing, but not for editing of the text. Information on embedding in application software that supports editing of the text using the fonts is specified in the App Use section of this license agreement. (5) The licensees may only embed the fonts in a secure manner so that the document obfuscates or protects its embedded font data from deliberate or inadvertent discovery or misuse.
Desktop Use. Standard Licence

Related to Desktop Use

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web. 7.2. Leaseweb is entitled to actively block ports or IP addresses for the Network, in the event that such is – in Leaseweb’s reasonable view – necessary to preserve or protect the security and performance of the Network or the Internet or the World Wide Web. An overview of the blocked ports or IP addresses may be requested in writing by Customer from Leaseweb. 7.3. Without prejudice to the generality of Clause 7.2 of the Acceptable Use Policy, Leaseweb shall in any event actively block the following ports for its Network: (i) UDP/137 – Netbios; (ii) UDP/139 – Netbios; (iii) TCP/135 till 139 – Netbios;(iv) TCP/445 – Smb; and (v) Protocol UDP port 11211 - Memcache 7.4. If Leaseweb reasonably suspects that Customer is subject to a DoS attack, DDoS attack, DRDoS attack or another attack and (in Leaseweb’s reasonable opinion) such attack negatively affects the Infrastructure, Leaseweb shall be entitled to immediately block access to Customer's Infrastructure. In the event that Customer is subject to repetitive attacks, and Customer does not successfully take measures to prevent that future attacks may negatively affect Leaseweb’s Infrastructure, then Leaseweb shall be entitled to immediately terminate theSales Contract by sending a written notice to Customer.

  • System Use (a) An electronic site access system may be used on site, subject to the requirements of this statement. (b) The system operates via: (i) a facial recognition device; and (ii) an electronic gate. (c) The system will be installed at the access and egress point/s of the site and will only be utilised to identify presence on site. (d) The purpose for which the electronic site access system will be implemented is to ensure: (i) avoiding unauthorised access to site; (ii) confirmation and co-ordination of effort in emergency situations; and (iii) confirmation that all entrants to site have received a site specific induction; (e) The only personal data collected by the system is a site entrant’s: (i) image; (ii) first & last name; (iii) mobile phone number; (iv) email address; and (v) employer’s name. (the Collected Data) (f) The Collected Data will only be held or used for the purposes specified above, unless otherwise by consent or required by law. (g) The Employer will not use the electronic site access control system to verify who was on a site at a particular time for the purpose of: (i) evaluating whether a variation claim regarding labour costs made by a subcontractor can be substantiated; (ii) taking disciplinary action against an Employee, or assisting a subcontractor to take disciplinary action against its own employees, regarding their start and finish times; or (iii) otherwise generally tracking a worker’s movements whilst on the site.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

  • Server Software Subject to the terms and conditions of this ▇▇▇▇, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.