Internet-Based Features; Privacy Sample Clauses

Internet-Based Features; Privacy. Some software features use Internet protocols, which send to Microsoft (or its suppliers or service providers) computer information, such as your Internet protocol address, the type of operating system, browser, and name and version of the software you are using, and the language code of the computer where you installed the software. Microsoft uses this information to make the Internet-based features available to you, in accordance with the Windows 8.1 Privacy Statement at ▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/?▇▇▇▇▇▇=▇▇▇▇▇▇ and information that may be presented to you in the Windows user interface. Some Internet-based features may be delivered and updated at a later date—if, for example, you acquire an application that relies on one of those services, or to help make the software safer or more reliable.
Internet-Based Features; Privacy. Some software features use Internet protocols, which send to Microsoft (or its suppliers or service providers) device information, such as your Internet protocol address, the type of operating system, browser and name and version of the software you are using, the language code of the device where you installed the software, and other information described below, in the Windows Privacy Statement at ▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/?▇▇▇▇▇▇=▇▇▇▇▇▇, or in the Windows Embedded user interface. Microsoft uses this information to make the Internet-based features available to you, in accordance with the Windows Privacy Statement at ▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/?▇▇▇▇▇▇=▇▇▇▇▇▇ and information that may be presented to you in the Windows Embedded user interface. Some Internet-based features may be delivered and updated at a later date if, for example, you acquire an application that relies on one of those services, or to help make the software safer or more reliable. Internet features include, but are not limited to the features described below, in the Windows 8.1Privacy Statement at ▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/?▇▇▇▇▇▇=▇▇▇▇▇▇ and the Windows Embedded user interface. ▇▇▇▇▇▇▇ ▇▇▇▇▇▇▇ may have elected to turn on one or more of the following features in the licensed device.
Internet-Based Features; Privacy. The following software features use Internet protocols, which send to Microsoft (or its suppliers or service providers) device information, such as your Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the device where the software is installed. Microsoft uses this information to make the Internet-based features available to you, in accordance with the Windows 8 Privacy Statement, at ▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/?▇▇▇▇▇▇=▇▇▇▇▇▇. Some Internet-based features may be delivered at a later date via Microsoft’s Windows Update service—if, for example, you acquire an application that relies on one of those services. [OEM] may have elected to turn on one or more of the following features in the licensed device.
Internet-Based Features; Privacy. Some software features use Internet protocols, which send to Microsoft (or its suppliers or service providers) device information, such as your Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the device where you installed the software. Microsoft uses this information to make the Internet-based features available to you, in accordance with the Windows Privacy Statement, at ▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/?▇▇▇▇▇▇=▇▇▇▇▇▇ and information that may be presented to you in the Windows Embedded Pro user interface. Some Internet-based features may be delivered and updated at a later date —if, for example, you acquire an application that relies on one of those services, or to help make the software safer or more reliable. Internet-based features include, but are not limited to the features described below and in the Windows Privacy Statement at ▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/?▇▇▇▇▇▇=▇▇▇▇▇▇. NUM may have elected to turn on one or more of the following features in the Windows Embedded Pro software.
Internet-Based Features; Privacy. The following software features use Internet protocols, which send to Microsoft (or its suppliers or service providers) computer information, such as your Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the computer where you installed the software. Microsoft uses this information to make the Internet-based features available to you, in accordance with the Privacy Statement, at ▇.▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇/▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇?▇▇▇▇=▇▇▇▇. Some Internet-based features may be delivered at a later date via Microsoft’s Update service. 1. Consent for Internet-Based Services. The software features described below and in the Office 2013 Privacy Statement connect to Microsoft or service provider computer systems over the Internet. In some cases, you will not receive a separate notice when they connect. In some cases, you may switch off these features or not use them. For more information about these features, see the Office 2013 Privacy Statement at ▇.▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇/▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇?▇▇▇▇=▇▇▇▇. BY USING THESE FEATURES, YOU CONSENT TO THE TRANSMISSION OF THIS INFORMATION. Microsoft does not use the information to identify or contact you. 2. Customer Experience Improvement Program (CEIP). This software uses CEIP. CEIP automatically sends Microsoft information about your hardware and how you use this software. We do not use this information to identify or contact you. CEIP will also periodically download a small file to your computer. This file helps us collect information about problems that you have while using the software. When available, new help information about the errors might also be automatically downloaded. To learn more about CEIP, see ▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇▇▇/▇▇▇▇/▇▇-▇▇/▇▇▇▇▇▇▇▇▇▇▇▇▇.▇▇▇▇. 3. Online Features and Content. Features in the software can retrieve online content from Microsoft and provide it to you. Certain features may also permit you to search for and access information online. Examples of these features include clip art, templates, online training, online assistance and help, and Outlook Weather on the Calendar. If you save a template provided by ▇▇▇▇▇▇.▇▇▇, information will be sent online to Microsoft, such as information that identifies the template, but not any specific document you have created using the template. This information is used to provide you with content you request and to improve our services. You may choose ...
Internet-Based Features; Privacy. The following software features use Internet protocols, which send to Microsoft (or its suppliers or service providers) computer information, such as your Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the computer where you installed the software. Microsoft uses this information to make the Internet-based features available to you, in accordance with the Office 2013 Privacy Statement, at ▇.▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇/▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇▇?▇▇▇▇=▇▇▇▇. Some Internet-based features may be delivered at a later date via Microsoft’s Update service.
Internet-Based Features; Privacy. The following software features use Internet protocols, which send to Microsoft (or its suppliers or service providers) device information, such as your Internet protocol address, the type of operating system, browser and name and version of the Software you are using, and the language code of the device where you installed the Software. Microsoft uses this information to make the Internet-based features available to you, in accordance with the Windows 8 Privacy Statement, at ▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/▇▇▇▇▇▇/?▇▇▇▇▇▇=▇▇▇▇▇▇. Some Internet-based features may be delivered at a later date via Microsoft’s Windows Update service—if, for example, you acquire an application that relies on one of those services. Blue Coat may have elected to turn on one or more of the following features in the licensed device.

Related to Internet-Based Features; Privacy

  • Data Privacy (a) The Grantee’s acceptance hereof shall evidence the Grantee’s explicit and unambiguous consent to the collection, use and transfer, in electronic or other form, of the Grantee’s personal data by and among, as applicable, the Grantee’s employer (the “Employer”) and the Company and its subsidiaries and affiliates for the exclusive purpose of implementing, administering and managing the Grantee’s participation in the Plan. The Grantee understands that the Company and the Employer may hold certain personal information about the Grantee, including, but not limited to, the Grantee’s name, home address and telephone number, date of birth, social insurance number or other identification number, salary, bonus and employee benefits, nationality, job title and description, any shares of stock or directorships or other positions held in the Company, its subsidiaries and affiliates, details of all options, stock appreciation rights, restricted shares, restricted share units or any other entitlement to shares of stock or other Awards granted, canceled, exercised, vested, unvested or outstanding in the Grantee’s favor, annual performance objectives, performance reviews and performance ratings, for the purpose of implementing, administering and managing Awards under the Plan (“Data”). (b) The Grantee understands that Data may be transferred to any third parties assisting in the implementation, administration and management of the Plan, that these recipients may be located in the Grantee’s country or elsewhere, and that the recipients’ country (e.g. the United States) may have different data privacy laws and protections than the Grantee’s country. The Grantee understands that the Grantee may request a list with the names and addresses of any potential recipients of the Data by contacting the Grantee’s local human resources representative. The Grantee authorizes the recipients to receive, possess, use, retain and transfer the Data, in electronic or other form, for the sole purpose of implementing, administering and managing the Grantee’s participation in the Plan, including any requisite transfer of such Data as may be required to a broker or other third party with whom the Grantee may elect to deposit any shares of stock acquired with respect to an Award. (c) The Grantee understands that Data will be held only as long as is necessary to implement, administer and manage the Grantee’s participation in the Plan. The Grantee understands that the Grantee may at any time view Data, request additional information about the storage and processing of Data, require any necessary amendments to Data or refuse or withdraw the consents herein, in any case without cost, by contacting in writing the Grantee’s local human resources representative. The Grantee understands, however, that refusing or withdrawing the Grantee’s consent may affect the Grantee’s ability to participate in the Plan. For more information on the consequences of a refusal to consent or withdrawal of consent, the Grantee may contact the Grantee’s local human resources representative.

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web. 7.2. Leaseweb is entitled to actively block ports or IP addresses for the Network, in the event that such is – in Leaseweb’s reasonable view – necessary to preserve or protect the security and performance of the Network or the Internet or the World Wide Web. An overview of the blocked ports or IP addresses may be requested in writing by Customer from Leaseweb. 7.3. Without prejudice to the generality of Clause 7.2 of the Acceptable Use Policy, Leaseweb shall in any event actively block the following ports for its Network: (i) UDP/137 – Netbios; (ii) UDP/139 – Netbios; (iii) TCP/135 till 139 – Netbios;(iv) TCP/445 – Smb; and (v) Protocol UDP port 11211 - Memcache 7.4. If Leaseweb reasonably suspects that Customer is subject to a DoS attack, DDoS attack, DRDoS attack or another attack and (in Leaseweb’s reasonable opinion) such attack negatively affects the Infrastructure, Leaseweb shall be entitled to immediately block access to Customer's Infrastructure. In the event that Customer is subject to repetitive attacks, and Customer does not successfully take measures to prevent that future attacks may negatively affect Leaseweb’s Infrastructure, then Leaseweb shall be entitled to immediately terminate theSales Contract by sending a written notice to Customer.