Downloading apps Sample Clauses

Downloading apps. Spamming - sending mass or inappropriate emails.
AutoNDA by SimpleDocs
Downloading apps. ⏹ Use the device’s official app store when adding apps. This varies based on the device’s operating system. Do not download unknown apps (apps not found in app store) because they are less regulated/accountable and more likely to compromise client data. See one caveat below regarding .apk and .ipa files. ⏹ When downloading an app, carefully review the permissions required by the app to function. These permissions may include: o Location (do not enable or allow) o Contacts o Calendar o Messages o Microphone o Camera o Photos/media/files o Change permissions at any time using the device’s settings feature ⏹ Some permissions may not be able to be changed. For example, WhatsApp does not allow the user to turn off data sharing with parent company Facebook. So, while Facebook does not receive the content of messages on WhatsApp (which are encrypted end-to-end) it does share how often you use WhatsApp, how you interact with other users, your operating system, app version, time zone, language used, and mobile network used.4 Use this knowledge to select apps that share only information you are comfortable providing. ⏹ There is one exception to the rule regarding use of the official app store. Users may download an internally approved .apk or .ipa file. These may include custom apps or software designed for case management or online outreach. The .apk or .ipa files must first be downloaded to a computer (with antivirus installed) and then transferred to the device using a USB connector cable. You may be required to temporarily disable security features that block the installation of third-party apps that are not from the app store. You must restore these permissions to their original state after installation. Note that cyber criminals may try to lure users into downloading an .apk or .ipa file for a common app by suggesting that premium features have been disabled for that version or that additional security has been added. Reaching New Audiences Use these apps to reach new audiences online with HIV prevention information and services. These apps store user information in a secured cloud space and not on the mobile devices. Accounts are password protected, so once the worker logs out of their account, the data cannot be accessed. They each allow users to start private chats, but Facebook requires the installation of the Facebook Messenger app for private chats on mobile devices. ⏹ Facebook ⏹ Instagram ⏹ Twitter ⏹ Tik Tok Reaching Key Populations In contexts where th...

Related to Downloading apps

  • Regulatory Applications (a) Western and PNB and their respective Subsidiaries shall cooperate and use their respective reasonable best efforts to prepare all documentation, to effect all filings and to obtain all permits, consents, approvals and authorizations of all third parties and Governmental Authorities necessary to consummate the transactions contemplated by this Agreement. Western and PNB shall use their reasonable best efforts to make all required bank regulatory filings, including the appropriate filing with the Regulatory Authorities. Each of Western and PNB shall have the right to review in advance, and to the extent practicable each will consult with the other, in each case subject to applicable laws relating to the exchange of information, with respect to all material written information submitted to any third party or any Governmental Authority in connection with the transactions contemplated by this Agreement. In exercising the foregoing right, each of the parties hereto agrees to act reasonably and as promptly as practicable. Each party hereto agrees that it will consult with the other party hereto with respect to the obtaining of all material permits, consents, approvals and authorizations of all third parties and Governmental Authorities necessary or advisable to consummate the transactions contemplated by this Agreement and each party will keep the other party appraised of the status of material matters relating to completion of the transactions contemplated hereby. (b) Each party agrees, upon request, to furnish the other party with all information concerning itself, its Subsidiaries, directors, officers and shareholders and such other matters as may be reasonably necessary or advisable in connection with any filing, notice or application made by or on behalf of such other party or any of its Subsidiaries to any third party or Governmental Authority.

  • SOURCE CODE ESCROW FOR LICENSED PRODUCT If Source Code or Source Code escrow is offered by either Contractor or Product manufacturer or developer to any other commercial customers, Contractor shall either: (i) provide Licensee with the Source Code for the Product; or (ii) place the Source Code in a third party escrow arrangement with a designated escrow agent who shall be named and identified to the State, and who shall be directed to release the deposited Source Code in accordance with a standard escrow agreement acceptable to the State; or (iii) will certify to the State that the Product manufacturer/developer has named the State, acting by and through the Authorized User, and the Licensee, as a named beneficiary of an established escrow arrangement with its designated escrow agent who shall be named and identified to the State and Licensee, and who shall be directed to release the deposited Source Code in accordance with the terms of escrow. Source Code, as well as any corrections or enhancements to such source code, shall be updated for each new release of the Product in the same manner as provided above and such updating of escrow shall be certified to the State in writing. Contractor shall identify the escrow agent upon commencement of the Contract term and shall certify annually that the escrow remains in effect in compliance with the terms of this clause. The State may release the Source Code to Licensees under this Contract who have licensed Product or obtained services, who may use such copy of the Source Code to maintain the Product.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • End User This agreement shall bind the ordering activity as end user but shall not operate to bind a Government employee or person acting on behalf of the Government in his or her personal capacity.

  • Listing Application If shares of any class of stock of the Company shall be listed on a national securities exchange, the Company shall, at its expense, include in its listing application all of the shares of the listed class then owned by any Investor.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • User Content 13.1 The Site permits the submission and posting of questions and answers in connection with Evaluation Processes and may also permit the submission and posting of other text and/or other content submitted by you and other users (all of the foregoing, collectively, “User Submissions”), and the hosting, sharing, and/or publishing of such User Submissions. You understand that whether or not such User Submissions are published, the Company does not guarantee any confidentiality with respect to any User Submissions. You acknowledge that you shall not be due any remuneration in connection with your User Submissions from the Company or from any other User. 13.2 You shall be solely responsible for your own User Submissions and the consequences of posting or publishing them. In connection with your User Submissions, you affirm, represent, and/or warrant that: (i) your submission of User Submissions and the publication and use thereof by the Company does not violate the copyrights, trade secrets rights or other intellectual property rights of any third party, nor shall it constitute or result in a breach of any duty or obligation of confidentiality owed by you to any third party, and (ii) you have the written consent, release, and/or permission of each and every identifiable individual person in the User Submission to use the name or likeness of each and every such identifiable individual person to enable inclusion and use of the User Submissions in the manner contemplated by the Company and this Agreement. 13.3 By submitting User Submissions to the Site, you hereby grant to the Company a perpetual, irrevocable, worldwide, royalty-free, transferable, sublicensable right and license to use, reproduce, modify, distribute and exploit such User Submission in any manner and in any form of media, whether currently or hereafter existing. You represent and warrant that you have all necessary right, title and interest in and to each such User Submission to validly grant such license to the Company. 13.4 In connection with User Submissions and any other transmission of messages or material facilitated by the Site, you further agree that you will not: (i) submit or transmit material that is not authorized by the copyright owner, protected by trade secret or otherwise subject to third party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from their rightful owner to post the material and grant the rights granted to the Company in Section 13.3 above; (ii) publish or transmit falsehoods or misrepresentations that could damage the Company or any third party; (iii) submit or transmit material that is unlawful, defamatory, libelous, threatening, pornographic, harassing, hateful, racially or ethnically offensive or encourages conduct that would be considered a criminal offense, give rise to civil liability, violate any law or is otherwise inappropriate; (iv) post or transmit advertisements or solicitations of business; or (v) impersonate another person. If notified by a user or a content owner of a User Submission that allegedly does not conform to this Agreement, the Company may investigate the allegation and determine in good faith and in its sole discretion whether to remove the User Submission, which it reserves the right to do at any time. Additionally, the Company may, at any time, remove any User Submission that in the sole judgment of the Company violates this Agreement. 13.5 User Submissions may be provided by (without limitation) Users who are members of a Start-Up management team, contacts referred by Start-Ups (including without limitation customers, scientific advisors, background references, suppliers and distributors), external experts referred by the Company. The insights, recommendations, views and other content reflected in a User Submission should be taken as opinion rather than statements of facts. Investors should conduct their own diligence before making an investment. Nothing contained in a User Submission constitutes tax, legal, insurance or investment advice, or the recommendation of or an offer to sell, or the solicitation of an offer to buy or invest in, any investment product, vehicle, service or instrument. Such an offer or solicitation may only be made by delivery to a prospective investor of formal offering materials, including subscription or account documents or form, which should be reviewed carefully by any such investor before making the decision to invest in any particular company issuer listed, reviewed or discussed on the Propel(x) platform. To the maximum extent permitted under applicable law, you hereby release Propel(x) (and our officers, directors, agents, investors, subsidiaries, and employees) and each other User from any and all claims, demands, liabilities, losses or damages (whether direct, indirect, consequential, incidental or otherwise) of every kind and nature, known and unknown, suspected or unsuspected, arising out of or in any way related to User Submissions (including your reliance thereon). You acknowledge that, in connection with the foregoing release, you hereby irrevocably waive all rights granted to you under Section 1542 of the California Civil Code or any analogous applicable state or federal law or regulation. Said Section 1542 of the Civil Code of the State of California reads as follows:

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • RE-WEIGHING PRODUCT Deliveries are subject to re- weighing at the point of destination by the Authorized User. If shrinkage occurs which exceeds that normally allowable in the trade, the Authorized User shall have the option to require delivery of the difference in quantity or to reduce the payment accordingly. Such option shall be exercised in writing by the Authorized User.

  • Programming Processor is not responsible for programming or reprogramming of fuel dispensers.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!