SECURITY MECHANISMS. The electronic ballot boxes used must include the following security mechanisms :
(1) a report displaying a total of “zero” must be auto- matically produced by an electronic ballot box upon being turned on on the first day of advance polling and on polling day ;
(2) a verification report must be generated on a con- tinuous basis and automatically saved on the memory card, and must record each procedural operation ;
(3) the electronic ballot box must not be placed in “end of election” mode while the poll is still under way ;
(4) the compilation of results must not be affected by any type of interference once the electronic ballot box has been placed in “election” mode ;
(5) each electronic ballot box must be equipped with a back-up power source (battery) able to operate for two to five hours, unless all the electronic ballot boxes are connected to a generator ;
(6) if a ballot box is defective, the memory card may be removed and transferred immediately into another electronic ballot box in order to allow the procedure to continue.
SECURITY MECHANISMS. DS Group Companies undertake legal measures to eliminate unauthorized use of their DS Offerings. In this context, Licensed Programs may include a security mechanism that can detect the installation or use of illegal copies of a DS Offering, and that is able to collect and transmit data about illegal copies only. Data collected will not include any data created by Customer with the Licensed Program. By using the Licensed Program, Customer consents to such detection and collection of data, as well as its transmission and use if an illegal copy is detected. DS also reserves the right to use a hardware lock device, license administration software, and/or a license authorization key to control access to, and use of, any DS Offering. Customer may not take any steps to tamper with, circumvent or disable any such measures. Use of any Licensed Program without any hardware lock device, license administration software and/or license authorization key provided by DS is prohibited.
SECURITY MECHANISMS. Each electronic voting system must include the fol- lowing security mechanisms :
(1) a report displaying a total of “zero” must be auto- matically produced by the electronic ballot box when a voting terminal is turned on on the first day of advance polling and on polling day ;
(2) a verification report must be generated on a con- tinuous basis and automatically saved on the memory card of the voting terminal, and must record each proce- dural operation ;
(3) a mechanism which prevents a voting terminal from being placed in “end of election” mode while polling is still under way, because the terminal can only be placed in “end of election” mode by the insertion of an “end of election” card ;
(4) a mechanism to ensure that the compilation of results is not affected by any type of interference once the electronic ballot box has been placed in “election” mode ;
(5) each voting terminal must be equipped with seals, two to prevent the opening of the box and one covering the screws of the voting terminal ;
(6) each voting terminal must be equipped with a back-up power source (battery) able to operate for two to five hours, unless all the terminals are connected to a generator ;
(7) if a voting terminal is defective, its internal memory card may be removed and transferred immedi- ately into another voting terminal in order to allow the procedure to continue.
SECURITY MECHANISMS. Each electronic voting system must include the fol- lowing security mechanisms :
1) a report displaying a total of “zero” must be auto- matically produced by the electronic ballot box when a voting terminal is turned on on the first day of advance polling and on polling day ;
2) a verification report must be generated on a con- tinuous basis and automatically saved on the memory card of the voting terminal, and must record each proce- dural operation ;
3) a mechanism which prevents a voting terminal from being placed in “end of election” mode while polling is still under way, because the terminal can only be placed in “end of election” mode by the insertion of an “end of election” card ;
SECURITY MECHANISMS. DS Group Companies undertake legal measures to eliminate unauthorized use of their DS Group Offerings. In this context, Licensed Programs may include a security mechanism that can detect the installation or use of illegal copies of a No Magic Offering, and that is able to collect and transmit data about illegal copies only. Data collected will not include any data created by Customer with the Licensed Program. By using the Licensed Program, Customer consents to such detection and collection of data, as well as its transmission and use if an illegal copy is detected. No Magic also reserves the right to use a hardware lock device, license administration software, and/or a license authorization key to control access to, and use of, any No Magic Offering. Customer may not take any steps to tamper with, circumvent or disable any such measures. Use of any Licensed Program without any hardware lock device, license administration software and/or license authorization key provided by No Magic is prohibited.
SECURITY MECHANISMS. Dassault Systèmes and its affiliated companies take all legal steps to eliminate piracy of their software products. In this context, the Software may include a security mechanism that can detect the installation or use of illegal copies of the Software, and collect and transmit data about those illegal copies. Data collected will not include any customer data created with the Software. By using the Software, you consent to such detection and collection of data, as well as its transmission and use if an illegal copy is detected. DS SolidWorks also reserves the right to use a hardware lock device, license administration software, and/or a license authorization key to control access to the Software. You may not take any steps to avoid or defeat the purpose of any such measures. Use of any Software without any required lock device or authorization key provided by DS SolidWorks is prohibited.
SECURITY MECHANISMS. In order to reduce the risk effects on the users and the Platform, we have taken a number of security measures. These measures are taken at different levels across the IoT Lab system.
SECURITY MECHANISMS. LICENSEE UNDERSTANDS AND AGREES THAT THE SOFTWARE MAY CONTAIN THIRD-PARTY SOFTWARE THAT MONITORS USAGE AND COMMUNICATES WITH LICENSOR'S SERVERS TO ENSURE THAT THE SOFTWARE IS LEGITIMATELY ACQUIRED AND USED UNDER LEGITMATE LICENSES. LICENSEE HEREBY EXPLICITLY CONSENTS TO THE COLLECTION AND TRANSFER OF DATA REGARDING LICENSEE'S SYSTEMS, NETWORKS, LOCATION, SOFTWARE USAGE, AND OTHER DATA USED TO DETERMINE THE LEGITIMACY OF THE SOFTWARE TO LICENSOR'S SERVERS, WHICH MAY BE LOCATED IN THE UNITED STATES, SWITZERLAND, OR OTHER JURISDICTIONS. NO DATA WILL BE TRANSFERRED AFTER LICENSOR DETERMINES THAT LICENSEE'S COPY OF THE SOFTWARE IS LEGITIMATELY OBTAINED FROM LICENSOR OR AN AUTHORIZED DISTRIBUTOR, SUBJECT TO PERIODIC REVERIFICATION. IF YOU ARE USING AN ILLEGAL COPY OF THE SOFTWARE, YOU MUST CEASE ALL USE OF THE SOFTWARE IMMEDIATELY AND CONTACT LICENSOR FOR A LEGALLY LICENSED COPY.
SECURITY MECHANISMS. AVEVA and its affiliated companies take all legal steps to eliminate piracy of their software products. In this context, the Software may include a security mechanism that can detect the installation or use of illegal copies of the Software, and collect and transmit data to AVEVA about those illegal copies. Data collected will not include any customer data created with the Software. By using the Software, you consent to such detection and collection of data, as well as its transmission and use if an illegal copy is detected.
SECURITY MECHANISMS. BIOVIA undertakes legal measures to eliminate unauthorized use of their software products. In this context, Licensed Programs may include a security mechanism that can detect the installation or use of illegal copies of a Licensed Program, and that is able to collect and transmit data about illegal copies only. Data collected will not include any data created by Customer with the Licensed Program. By using the Licensed Program, Customer consents to such detection and collection of data, as well as its transmission and use if an illegal copy is detected. BIOVIA also reserves the right to use a hardware lock device, license administration software, and/or a license authorization key to