DATA COLLECTION TECHNOLOGY Sample Clauses

DATA COLLECTION TECHNOLOGY. PANDA informs the licensee that in certain programs or products it may use data collection technology to collect technical information (including suspicious files) to improve the programs or products, to provide associated services, to adapt them to user preferences and to prevent the unlicensed or illegal use of the program or product. The licensee accepts that PANDA may use such information as part of the services provided in relation to the program or product. The licensee acknowledges and accepts that PANDA may provide updates or additions to the program or product which are automatically downloaded onto his/her computer.
AutoNDA by SimpleDocs
DATA COLLECTION TECHNOLOGY. Media Metrix 2.0 features comScore’s proprietary, patent-pending proxy measurement platform. This advanced monitoring technology operates on a high-performance server network that captures usage data as it flows between each panelist’s PC and the Internet. This represents a major improvement from the older approach of collecting data through a software “meter” installed on each user’s PC. The comScore measurement platform provides uninterrupted reporting of all previously measured Internet behavior including expanded coverage of AOL and other proprietary networks. This platform also captures the details of crucial activities such as online buying, subscriptions, search engine queries, etc. Upon agreement to join the comScore panel, members’ browsers are configured to unobtrusively route their Internet activity through comScore’s network of dedicated servers. At the start of Internet activity, panelists identify themselves from a list on the User Identification Screen (allowing for measurement of user age, gender, education and other demographics). The identification screen disappears and computer usage continues as normal. If the computer is inactive for more than 30 minutes during an online session, the user is again prompted for identification, to ensure that any change in user is properly reflected. The panelist’s Internet activity is captured regardless of type of browser used. This is important since many users use multiple browser brands and versions – sometimes simultaneously – when surfing the Web. Activity is captured regardless of whether an Internet connection is established via a commercial Internet Service Provider (ISP) or an office-hosted LAN. Information that can potentially be captured on an individual member basis includes site visited, page viewed, ad seen, promotion viewed, product or service bought, price paid, and more. This contrasts to the data collection system employed prior to Media Metrix 2.0, which was limited to capturing activity via the URL window in a panelist’s browser. Data capture and reporting are conducted in adherence to strict, industry-leading privacy protection policies. Data provided by participating panel households about each Internet user’s identity are stored in an encrypted, access-controlled database. Data is reported only in aggregate form.
DATA COLLECTION TECHNOLOGY. 18.1 The Bitdefender Product may use data collection technology to collect technical information (including suspect files), to improve the Products, to provide services to you in relation to the Bitdefender Product including but not limited to technical support, to adapt them and to prevent the unlicensed or illegal use of the Bitdefender Product or the damages resulting from the malware products. The Personal Information given (including but not limited to name, email address, password), during initial setup, if collected, will be used as an account name under which You may elect to receive additional services and/or under which You may use certain features of the Bitdefender Product . 18.2 Bitdefender strongly recommends that you change the password at any time after installation of the Bitdefender Product. You accept that Bitdefender may use such information solely as part of the services provided in relation to the Bitdefender Product and to prevent and stop malware programs running on your device. By accepting this Agreement You acknowledge and agree that as per the documentation accompanying the Bitdefender Product, the security technology used can scan the traffic in an impersonal mode to detect malware and to prevent any resulting damages. 18.3 By accepting this Agreement, You agree to upload the executable files for the purpose of being scanned by the Bitdefender servers. 18.4 Bitdefender warrants and represents that it will treat Your Personal Information in accordance with U.S. federal, state and local, as well as foreign, laws and government-issued rules, regulations, guidelines, directives and requirements currently in effect and as they become effective that relate in any way to the privacy and processing of personal data (“Data Protection Laws”) including but not limited to the Data Protection Act 1998 implementing the Directive 95/46/EC on the protection of individuals with regard to the processing of personal data as enacted from time to time. and as established in its Privacy Policy. 18.5 Access to the website, the acquisition of products and services and the use of tools or content via the website implies the processing of Personal Information. Complying with legislation governing the processing of Personal Information society services and electronic commerce is of the utmost importance to Bitdefender. Bitdefender guarantees that such data will be treated confidentially and in accordance with all Data Protection Laws and all legislation ...
DATA COLLECTION TECHNOLOGY. The SC Software and SC Saas Services may use data collection technology to collect technical information (including suspect files), to improve the products, to provide related services, to adapt them and to prevent the unlicensed or illegal use of the product or the damages resulting from the malware products. All the information on how the personal data is processed during the usage of the SC Software, SC Saas Services and Maintenance and Support Services is specified in the SparkCognition Privacy Policy. By accepting this Agreement, you acknowledge and agree that the security technology used may scan the traffic in an impersonal mode to detect the malware and to prevent the damages resulting from the malware products. You acknowledge and accept that SparkCognition may provide updates or additions to the program or product which automatically download to your device. By accepting this Agreement, you agree to upload the executable files for the purpose of being scanned by the SparkCognition servers. This information from your computer may be sent to SparkCognition only with your permission and will not be sent automatically. The information is collected by SparkCognition for the purpose of improving SparkCognition's product performance or statistic information. This information will not be correlated the encountered problem and with any personally data or personal identifiable information. To improve its products, SparkCognition may also upload information periodically from installed SC Software or SC Saas Services about product usage, detected malware or potentially unwanted files and use service traffic to improve its data bases and heuristics. You agree that SparkCognition may (i) use uploaded data from installed SC Software or SC Saas Services to improve products and services; (ii) use uploaded data for analysis or reporting purposes only if any such use does not identify you or include any information that can be used to identify any individual person. SparkCognition reserves the title, ownership and all rights and interest to any Intellectual Property Rights resulting from its use and analysis of such information. By using the SC Software or SC Saas Services, you acknowledge and agree that SparkCognition may collect, disclose, store and analyze this information for the purposes above mentioned. In order to promote awareness, detection and prevention of internet security risks, SparkCognition may share certain anonymized information with research orga...
DATA COLLECTION TECHNOLOGY. The Concessionaire shall design the Communications System to include, and it shall include, Data Collection Technology. Such Technology shall comply with the Privacy Best Practices Commitment, and the other tailored requirements set out in Section 8 (Privacy). The Communications System, additionally, shall be designed to provide the MTA with access to and use of all of the Data available to the Concessionaire through the application of such Data Collection Technology, via the IMS Dashboard and the DMP or a mutually agreed to alternative.
DATA COLLECTION TECHNOLOGY. 17.1 Bitdefender informs You that in certain programs or solutions it may use data collection technology to collect technical information (including suspect files), to improve the products, to provide related services, to adapt them and to prevent the unlicensed or illegal use of the product or the damages resulting from the malware products. 17.2 All the information on how the personal data is processed during the usage of the Bitdefender Solution and services is specified in the Bitdefender Privacy Policy. By accepting this Agreement, You agree that Your personal data will be collected according to the Privacy Policy published on: xxxx://xxx.xxxxxxxxxxx.xxx/site/view/legal-privacy.html 17.3 By accepting this Agreement, You acknowledge and agree that the security technology used may scan the traffic in an impersonal mode to detect the malware and to prevent the damages resulting from the malware products. You acknowledge and accept that Bitdefender may provide updates or additions to the program or product which automatically download to Your device. By accepting this Agreement, You agree to upload the executable files for the purpose of being scanned by the Bitdefender servers. 17.4 This information from Your computer may be sent to Bitdefender only with Your permission and will not be sent automatically. The information is collected by Bitdefender for the purpose of improving Bitdefender's product performance or statistical information. This information will not be correlated with the problem encountered and with any personal data or personal identifiable information. 17.5 In addition to Bitdefender Solution registration information, Bitdefender must process and store certain information about Your network and equipment to provide Maintenance and related support services. To improve its products, Bitdefender may also upload information periodically from installed Bitdefender Solution about product usage, detected malware or potentially unwanted files and use Service traffic to improve its data bases and heuristics. You agree that Bitdefender may (i) use uploaded data from installed Bitdefender Solution to improve products and services; (ii) use uploaded data for analysis or reporting purposes only if any such use does not identify You or include any information that can be used to identify any individual person. Bitdefender reserves the title, ownership and all rights and interest to any intellectual property or work product resulting from its use and a...
DATA COLLECTION TECHNOLOGY. PANDA SOFTWARE informs the
AutoNDA by SimpleDocs

Related to DATA COLLECTION TECHNOLOGY

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Trunk Group Architecture and Traffic Routing 5.2.1 The Parties shall jointly establish Access Toll Connecting Trunks between CLEC and CBT by which they will jointly provide Tandem-transported Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic from and to CLEC's Customers. 5.2.2 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access and non-translated Toll Free traffic (e.g., 800/888) to allow CLEC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier that is connected to the CBT access Tandem. 5.2.3 The Access Toll Connecting Trunks shall be one-way or two-way trunks, as mutually agreed, connecting an End Office Switch that CLEC utilizes to provide Telephone Exchange Service and Switched Exchange Access Service in the given LATA to an access Tandem Switch CBT utilizes to provide Exchange Access in the LATA.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

  • Accessibility of Information Technology Contractor represents and warrants that any software/ hardware/ communications system/ equipment (collectively “technology”), if any, provided under this Agreement adheres to the standards and/or specifications as may be set forth in the Section 508 of the Rehabilitation Act of 1973 standards guide and is fully compliant with WCAG 2.0 AA standards for accessibility and compliant with any applicable FCC regulations. Technology that will be used on a mobile device must also be navigable with Voiceover on iOS devices in addition to meeting WCAG 2.0 level AA. If portions of the technology or user experience are alleged to be non-compliant or non- accessible at any point, District will provide Contractor with notice of such allegation and Contractor shall use its best efforts to make the technology compliant and accessible. If a state or federal department, office or regulatory agency, or if any other third party administrative agency or organization (“Claimants”), make a claim, allegation, initiates legal or regulatory process, or if a court finds or otherwise determines that technology is non-compliant or non-accessible, Contractor shall indemnify, defend and hold harmless the District from and against any and all such claims, allegations, liabilities, damages, penalties, fees, costs (including but not limited to reasonable attorneys’ fees), arising out of or related to Xxxxxxxxx’ claims. Contractor shall also fully indemnify District for the full cost of any user accommodation that is found to be necessary due to an identifiable lack of accessibility in the Contractor’s technology. If necessary, an independent 3rd party accessibility firm using POUR standards (Perceivable, Operable, Understandable and Robust) may be used to validate the accessibility of the technology.

  • Data Use Each party may use Connected Account Data in accordance with this Agreement and the consent (if any) each obtains from each Connected Account. This consent includes, as to Stripe, consent it receives via the Connected Account Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!