Support Software Tool and Remote Access Sample Clauses

Support Software Tool and Remote Access. During a Services session, Symantec may (i) ask You to install certain support software on Your device by downloading the support software from the Site and/or (ii) ask for Your permission to use the remote assist tool through the Symantec service representative to enable Symantec to remotely access and take control of Your device; and/or (iii) utilize certain third party support software on Your device, which will be removed upon the completion of the Services session. The support software (including any third party support software) and remote assist tool are owned by Symantec or applicable third party licensors and suppliers and may be collectively referred to as the “Support Software Tool” in the Terms. The Support Software Tool will be used to analyze, diagnose, resolve more difficult problems and/or provide system optimization functions. You may use the Support Software Tool only as part of or for use with the Service and for no other purpose. By electing to receive support, You agree to allow Symantec to use whatever Support Software Tools as deemed necessary to repair Your device, including remote access. You understand that if remote access is used on Your device, there will be no residual software from the Services session; however, there may be a report created by xml or flash. You also understand that if You elect to install the Support Software Tool on Your device, by downloading the Support Software Tool, You agree to use the Support Software Tool in accordance with the Symantec Support Software Tool Usage Agreement located at xxx://xxx.xxxxxxxx.xxx/public/english_us_canada/premium_services/Support_Tool_EULA.pdf (the “Support Software Tool Usage Agreement”). In such case, You shall cease use of the Support Software Tool and remove it from Your device at the end of the Services session. Symantec may, but has no obligation to, monitor and record Services sessions, including telephone calls and online sessions for purposes of improving customer service, internal training and internal market research. You hereby grant permission to Symantec to monitor and record the Services and to use or disclose any information as necessary or appropriate to satisfy any law, regulation or other governmental request; to provide the Services to You or other users and to enhance the types of Services Symantec may provide to You in the future. You also grant Symantec permission to combine Your information with that of others in a way that does not identify You or a...
AutoNDA by SimpleDocs
Support Software Tool and Remote Access. During the Services session, Symantec may (i) ask You to install certain support software on Your personal computer by downloading the support software from the Site and/or (ii) ask for Your permission to use the remote assist tool through the Symantec service representative to enable Symantec to remotely access and take control of Your personal computer; and/or
Support Software Tool and Remote Access. During the Services session, Symantec may (i) ask You to install certain support software on Your Device by downloading the support software from a Symantec site and/or (ii) ask for Your permission to use the remote assist tool through the Symantec service representative to enable Symantec to remotely access and take control of Your Device; and/or (iii) gather system data and modify Device settings in order to diagnose or repair a problem; (iv) utilize certain third party support software on Your Device, which will be removed upon the completion of the Services session. The support software (including any third party support software) and remote assist tool are owned by Symantec or applicable third party licensors and suppliers (collectively, “Support Software Tool”). The Support Software Tool will be used to analyze, diagnose, resolve more difficult problems and/or provide system optimization functions.

Related to Support Software Tool and Remote Access

  • Remote Access Access to and use of the Data over the State Governmental Network (SGN) or Secure Access Washington (SAW) will be controlled by DSHS staff who will issue authentication credentials (e.g. a Unique User ID and Hardened Password) to Authorized Users on Contractor’s staff. Contractor will notify DSHS staff immediately whenever an Authorized User in possession of such credentials is terminated or otherwise leaves the employ of the Contractor, and whenever an Authorized User’s duties change such that the Authorized User no longer requires access to perform work for this Contract.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • SOFTWARE PIRACY PROHIBITION State or other public funds payable under this Contract shall not be used for the acquisition, operation, or maintenance of computer software in violation of federal copyright laws or applicable licensing restrictions. Contractor hereby certifies and warrants that, during the term of this Contract and any extensions, Contractor has and shall maintain in place appropriate systems and controls to prevent such improper use of public funds. If the State determines that Contractor is in violation of this provision, the State may exercise any remedy available at law or in equity or under this Contract, including, without limitation, immediate termination of this Contract and any remedy consistent with federal copyright laws or applicable licensing restrictions.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Software Transfer You may permanently transfer all of your rights under this XXXX, provided you (a) retain no copies, (b) transfer all of the SOFTWARE PRODUCT (including all component parts, the media and printed materials, any upgrades, this XXXX, and, if applicable, the Certificate of Authenticity), and (c) the recipient agrees to abide by all of the terms of this XXXX. If the SOFTWARE PRODUCT is an upgrade, any transfer must include all prior versions of the SOFTWARE PRODUCT and all of your rights therein, if any.

  • Links to Third Party Websites In your use of the Service and/or the Company’s website, you may encounter various types of links that enable you to visit websites operated or owned by third parties (“Third Party Site”). These links are provided to you as a convenience and are not under the control or ownership of the Company. The inclusion of any link to a Third Party Site is not (i) an endorsement by the Company of the Third Party Site, (ii) an acknowledgement of any affiliation with its operators or owners, or (iii) a warranty of any type regarding any information or offer on the Third Party Site. Your use of any Third Party Site is governed by the various legal agreements and policies posted at that website.

  • PROHIBITION ON CERTAIN TELECOMMUNICATIONS AND VIDEO SURVEILLANCE SERVICES OR EQUIPMENT To the extent applicable, Supplier certifies that during the term of this Contract it will comply with applicable requirements of 2 C.F.R. § 200.216.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!