We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Photo Library Sample Clauses

Photo Library. When You enable iCloud Photo Library in connection with any Managed Apple ID, the photos, videos and metadata in the Photos App on the Authorized Devices (“Device Photo Library”) will be automatically sent to iCloud, stored as the End User’s Photo Library in iCloud, and then pushed to all of the End User’s other iCloud Photo Library-enabled devices and computers. If the End User later makes changes (including deletions) to the Device Photo Library on any of these devices or computers, such changes will automatically be sent to and reflected in the End User’s iCloud Photo Library. These changes will also be pushed from iCloud to, and reflected in, the Device Photo Library on all of the End User’s iCloud Photo Library-enabled devices and computers. The resolution of content in the Photo Library on Authorized Devices or computers may vary depending upon the amount of available storage and the storage management option selected for the End User’s iCloud-Photo-Library-enabled device. If You do not wish to use iCloud Photo Library, You may disable it for Your Managed Apple ID and/or on Your Authorized Devices.
AutoNDA by SimpleDocs
Photo LibraryMarket Leader may add its own stock images to be used by End Users through Image Assistant™. Imprev will load up to 200 stock photos provided by Market Leader. Additional stock images may be added per the Professional Services Fee. Ad Copy and Articles – Market Leader may add its own stock phrases and articles to be used by End Users through Phrase Assistant™. Imprev will load up to 200 stock phrases provided by Market Leader. Additional stock phrases and articles may be added per the Professional Services Fee. Audio – Market Leader may add its own stock audio to be used by End Users when audio is variable. Audio must be submitted as MP3 files, including the track name it will appear in the audio gallery. The current limit for the Audio Gallery is 30 tracks. Additional stock phrases and articles may be added per the Professional Services Fee.
Photo LibraryThe Corporation's image library consists of at least 326,938 Vector images, 249,051 Raster Images, 179,240 Photo-Objects and 95,942 Stock photos (collectively, the "PHOTO IMAGES"). The Disclosure Schedule sets forth the ownership of the content of such Photo Images.

Related to Photo Library

  • Library Borrowing privileges available without charge. Upon retirement an employee shall be issued a permanent individual library card.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • Programming Each electronic voting system used is specially pro- grammed by the firm PG Elections inc. for the munici- pality in order to recognize and tally ballot papers in accordance with this agreement.

  • Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.

  • Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.

  • Firmware 7.1 The Supplier must deliver the equipment, Goods or hardware equipped with all the firmware required to use all the Goods or hardware’s functions. Any software embedded in the equipment, Goods or hardware, including the firmware, is provided to the Local Government with a license to use this software, with all license costs and royalties being included in the Fee Schedule (Schedule C). All firmware will be the most recent version available at the time of shipping.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!