Downloading Apps Sample Clauses

Downloading Apps. ⏹ Use the device’s official app store when adding apps. This varies based on the device’s operating system. Do not download unknown apps (apps not found in app store) because they are less regulated/accountable and more likely to compromise client data. See one caveat below regarding .apk and .ipa files. ⏹ When downloading an app, carefully review the permissions required by the app to function. These permissions may include: o Location (do not enable or allow) o Contacts o Calendar o Messages o Microphone o Camera o Photos/media/files o Change permissions at any time using the device’s settings feature ⏹ Some permissions may not be able to be changed. For example, WhatsApp does not allow the user to turn off data sharing with parent company Facebook. So, while Facebook does not receive the content of messages on WhatsApp (which are encrypted end-to-end) it does share how often you use WhatsApp, how you interact with other users, your operating system, app version, time zone, language used, and mobile network used.4 Use this knowledge to select apps that share only information you are comfortable providing. ⏹ There is one exception to the rule regarding use of the official app store. Users may download an internally approved .apk or .ipa file. These may include custom apps or software designed for case management or online outreach. The .apk or .ipa files must first be downloaded to a computer (with antivirus installed) and then transferred to the device using a USB connector cable. You may be required to temporarily disable security features that block the installation of third-party apps that are not from the app store. You must restore these permissions to their original state after installation. Note that cyber criminals may try to lure users into downloading an .apk or .ipa file for a common app by suggesting that premium features have been disabled for that version or that additional security has been added. ⏹ Reference table 1 for some recommended apps used for online HIV outreach. Table 1: Mobile applications for virtual client support TYPES OPTIONS Reaching New Audiences Use these apps to reach new audiences online with HIV prevention information and services. These apps store user information in a secured cloud space and not on the mobile devices. Accounts are password protected, so once the worker logs out of their account, the data cannot be accessed. They each allow users to start private chats, but Facebook requires the installation of the Fa...
AutoNDA by SimpleDocs
Downloading Apps k. Spamming - sending mass or inappropriate emails.

Related to Downloading Apps

  • SOURCE CODE ESCROW FOR LICENSED PRODUCT If Source Code or Source Code escrow is offered by either Contractor or Product manufacturer or developer to any other commercial customers, Contractor shall either: (i) provide Licensee with the Source Code for the Product; or (ii) place the Source Code in a third party escrow arrangement with a designated escrow agent who shall be named and identified to the State, and who shall be directed to release the deposited Source Code in accordance with a standard escrow agreement acceptable to the State; or (iii) will certify to the State that the Product manufacturer/developer has named the State, acting by and through the Authorized User, and the Licensee, as a named beneficiary of an established escrow arrangement with its designated escrow agent who shall be named and identified to the State and Licensee, and who shall be directed to release the deposited Source Code in accordance with the terms of escrow. Source Code, as well as any corrections or enhancements to such source code, shall be updated for each new release of the Product in the same manner as provided above and such updating of escrow shall be certified to the State in writing. Contractor shall identify the escrow agent upon commencement of the Contract term and shall certify annually that the escrow remains in effect in compliance with the terms of this clause. The State may release the Source Code to Licensees under this Contract who have licensed Product or obtained services, who may use such copy of the Source Code to maintain the Product.

  • End Users Customer will control access to and use of the Products by End Users and is responsible for any use of the Products that does not comply with this Agreement.

  • End User An “End User” is you, an individual or entity, which receives the Models from Licensee or Authorized Licensee User pursuant to this End User Agreement to use in the regular course of your affairs, but not for resale, modification, distribution or exploitation by third parties without AnyLogic’s prior written consent.

  • Viewing By strict appointment through the selling Agents, JD Commercial, 00 Xxxxxxxx Xxxxx, Bideford, North Devon. EX39 1TW TEL: (01237) 424053 / 07868 846357 E-MAIL: xxxxx@xx-xxxxxxxxxx.xx.xx JD COMMERCIAL, 00 XXXXXXXX XXXXX, website : xxx.xx-xxxxxxxxxx.xx.xx BIDEFORD, NORTH DEVON, EX39 1TW email : xxxxx@xx-xxxxxxxxxx.xx.xx

  • Web site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.

  • User Content Certain areas of the Platform may enable you to post comments, send messages, correspond with others and/or otherwise post content (“User Content”) in connection with various features that Spectra may elect to offer, such as information libraries, e-mail service, bulletin boards, chatrooms, electronic postcards, chats with special guests, e-mails, and forums to communicate with others (“Message Features”). You must use the Message Features in a responsible manner and you are fully responsible for all User Content that you provide to us or others. Your License to Us. By submitting User Content, you grant us and our designees a royalty-free, irrevocable, perpetual, non-exclusive, worldwide, fully sub-licensable, transferable, license to publish, reproduce, distribute, display, perform, edit, adapt, modify, translate, create derivative works, make, sell, offer for sale, export, and otherwise use and exploit your User Content (or any portion thereof) in any way that we want and in any form, media, or technology now known or later developed. You hereby waive any moral rights you may have in your User Content in favor of Spectra and any of its designees. You represent that you have obtained all necessary permissions necessary to grant us those rights, including from any person identified in or implicated by your submission (including those shown in photographic content), and, in the case of minors, also from their parents or legal guardians, as appropriate. No Obligation to Publish. We are not obligated to publish, transmit or use your User Content. Spectra is not in any manner endorsing any User Content that it may publish or post on the Platform and cannot, and will not, vouch for its reliability. Spectra is not responsible for any User Content and has no duty to monitor User Content. You use any information contained in User Content at your own risk. Spectra and its designees have the right, in their sole discretion, to monitor, review, edit, remove, delete, disable, refuse, restrict, or terminate access to your User Content or the Platform (in whole or in part) at any time, without prior notice and in our sole discretion, for any or no reason. The obligations that you have to us under these Terms shall survive termination of the Platform, any use by you of the Platform, any User Content on the Platform, or these Terms. You will not continue to post any User Content that Spectra has previously advised you not to post.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • RE-WEIGHING PRODUCT Deliveries are subject to re- weighing at the point of destination by the Authorized User. If shrinkage occurs which exceeds that normally allowable in the trade, the Authorized User shall have the option to require delivery of the difference in quantity or to reduce the payment accordingly. Such option shall be exercised in writing by the Authorized User.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Users Licensee is responsible for each User’s compliance with this XXXX. Licensee will ensure that all use of the Software by Users is in accordance with the terms of this XXXX.

Time is Money Join Law Insider Premium to draft better contracts faster.