Single Computer Sample Clauses

Single Computer. A computer that is owned, leased, or otherwise under the control of the Licensee.
Single Computer. The SOFTWARE PRODUCT is licensed with the COMPUTER described below as a single integrated product. This license specifically excludes any use, review, evaluation, research & development (R&D), scientific testing or analysis of the CVSA SOFTWARE PRODUCT by the user or any third parties not specifically authorized by NFS. ⮚ Rental. You may not rent, lease, assign, sub-lease, loan, sell, or otherwise transfer any rights to the SOFTWARE PRODUCT or COMPUTER under this agreement.
Single Computer. Use For each License acquired, Licensee may use one copy of the Software on a single computer. Once Licensee has run that portion of the Software called the "setup" program on a computer, Licensee may use that copy of the Software on a different computer only if Licensee first deletes the files installed by the setup program from the first computer. Licensee may not copy the software from the CD-ROM to a computer hard disk or other permanent electronic storage device (except as occurs when Licensee runs the setup program or uses the other features of the Software on a single computer).
Single Computer. Except as foreseen hereafter under paragraph 2.b. ‘Floating license’, the Software may be used only on a single computer owned, leased or otherwise controlled by Licensee. For the purpose of this Agreement, a single computer is defined as one seat with one central unit, one display and one keyboard. Neither concurrent use on two or more computers nor use in a local area network or other network is permitted without Floating license authorised and paid for, as defined below.
Single Computer. The SOFTWARE PRODUCT may only be used on a single COMPUTER at any given point in time, subject to receiving express written consent to the use of the SOFTWARE PRODUCT on multiple computers (e.g. in a terminal services environment, etc.) from MODANO PTY LTD.
Single Computer. Except as foreseen hereafter under paragraph 2.b. ‘Floating license’, the Software may be used only on a single computer owned, leased or otherwise controlled by Licensee. The single computer license is installed either physically or virtually. For the purpose of this Agreement, a single computer is defined as one seat with one central unit, one display and one keyboard. Neither concurrent use on two or more computers nor use in a local area network or other network is permitted without Floating license authorised and paid for, as defined below. It is not allowed to alter or circumvent the Software, including but not limited to the circumvention of the technical limitations or contractual usage conditions and limits of the Software, or attempt to avoid any additional license fees.
Single Computer. The SOFTWARE PRODUCT is licensed with the HARDWARE as a single integrated product. The SOFTWARE PRODUCT may only be used with the HARDWARE as set forth in this ▇▇▇▇. UPGRADE
Single Computer. The Software Product is licensed with the Hardware as a single integrated product. The Software Product may only be used with the Computer as set forth in this ▇▇▇▇.

Related to Single Computer

  • Computer The Contractor shall maintain at its office for its use a computer with, at a minimum, a 1 GHz processor and an internet connection. The Contractor shall maintain individual email accounts for each of its project managers.

  • Computers All computers, hardware, software, computer upgrades and maintenance in connection therewith shall be at Owner's expense.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Computer Tape The computer tape regarding the Receivables made available by the Seller to the Depositor is complete and accurate in all respects as of the Transfer Date.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.