Recording Use of Tokens Sample Clauses

Recording Use of Tokens. (i) The AVEVA Licensing System on each server running AVEVA Software contains a Log Agent for the purposes of recording Customer’s use of the Software to assist in the calculation of Token expenditure. The Log Agent will automatically send daily Usage Logs to AVEVA containing encrypted details of this use. Customer acknowledges the presence of such Usage Logs and will comply with such procedures as AVEVA may request to enable the Log Agent to function correctly.
AutoNDA by SimpleDocs
Recording Use of Tokens b) 记录令牌的使用。

Related to Recording Use of Tokens

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • LICENSE TO USE WEBSITE The Company may provide You with certain information as a result of Your use of the Website or Services. Such information may include, but is not limited to, documentation, data, or information developed by the Company, and other materials which may assist in Your use of the Website or Services ("Company Materials"). Subject to this Agreement, the Company grants You a non-exclusive, limited, non-transferable and revocable license to use the Company Materials solely in connection with Your use of the Website and Services. The Company Materials may not be used for any other purpose, and this license terminates upon Your cessation of use of the Website or Services or at the termination of this Agreement.

  • Use of Likeness As part of the consideration for this Housing Agreement, Resident authorizes Owner and its affiliates to make photographs and video recordings of Resident in community and resident amenity areas, and irrevocably grants Owner and its affiliates a royalty-free license to use Resident’s image and likeness for all lawful purposes, including promotional purposes in advertising, video, web, social media and other formats.

  • Publicity; Use of Names and Logos Vendor may use Citizens’ name and logo in its marketing materials, website and social media to indicate that it is a participating or contracted vendor for Citizens. However, Vendor may not in any way state, imply or infer that it holds a “preferred,” “approved,” “awarded,” “selected” or otherwise special status with Citizens in any such materials. This prohibition includes, but is not limited to, the use of endorsements or quotes from Citizens officials, Citizens vendor scores, or any other Citizens-related materials that may directly or indirectly imply that Vendor enjoys a special or preferred status with Citizens. Citizens reserves the right to determine that its name and/or logo have been misused and to request that Vendor cease using its name and/or logo in any way it deems inappropriate. Failure to comply will result in corrective action, up to and including contract termination. Vendor may only use the approved Citizens logo, which may be obtained by sending a request via email to: xxxxxxxx@xxxxxxxxxxx.xxx.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Consent to Use of Data You agree that the Licensor may collect and use technical data and related information, including but not limited to technical information about your device, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services (if any) related to the Software. The Licensor may use this information, as long as it is in a form that does not personally identify you, to improve its products or to provide services or technologies.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Use of Trademarks Subject to the terms and conditions hereof, Sponsor hereby represents and warrants that it has the power and authority to grant, and does hereby grant to Show Management a non-exclusive, nontrans- ferable, royalty-free, worldwide license to reproduce and display all logos, trademarks, trade names and similar identifying material relating to Sponsor (the ”Sponsor Marks”) solely in connection with the promotion, marketing and distribution of the parties in accordance with the terms hereof, provided, however, that Show Management shall, other than as specifically provided for in this Agreement, not make any specific use of any Sponsor Mark without first submitting a sample of such use to Spon- sor and obtaining its prior consent, which consent shall not be unreasonably withheld. The foregoing license shall terminate upon the effective date of expiration of this Agreement.

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

Time is Money Join Law Insider Premium to draft better contracts faster.