Usage Tracking Sample Clauses

Usage Tracking. Licensee acknowledges that Adobe may collect information on Licensee’s usage of the Prerelease Software, and may use such information to further develop, modify, improve, support, customize or operate the Prerelease Software.
AutoNDA by SimpleDocs
Usage Tracking. (a) Starwave will track traffic in the Sports Products and shall provide ongoing access to reports on such traffic to ESPN.
Usage Tracking. (a) Starwave will track traffic in the News Products and shall provide ongoing access to reports on such traffic to ABC.
Usage Tracking. The application will provide a usage logging feature and capacity tracker for each installation available to administrators. Actions, user types accessing and times for server response are logged. The administrator may choose to view specific dates at will to compare usage over time. This enables the institution to better plan the use of an on-line tool in a network environment.
Usage Tracking. In exchange for Licensee’s use of the Prerelease Software, Licensee agrees that Adobe may collect data, including Personal Information, regarding Licensee’s use of the Prerelease Software for Adobe’s research, product development, and product improvement purposes, and to personalize Licensee’s use of the Prerelease Software. Licensee agrees that Adobe may transfer Licensee’s Personal Information across national boundaries and that this information may be stored and processed in any of the countries Adobe and its agents maintain offices. If Licensee does not wish to have Licensee’s usage tracked, Licensee must discontinue use of the Prerelease Software by uninstalling or ceasing to use the Prerelease Software.
Usage Tracking. Licensee acknowledges that Adobe may collect information on Licensee’s usage of the Prerelease Software, including Personal Information, and may use such information to modify, improve, or enhance the Prerelease Software or Licensee’s ability to access and use the Prerelease Software. The Prerelease Software provided to Licensee may have usage tracking features that are turned on by default, and Licensee’s usage may be tracked on all services, mobile apps and desktop applications offered by Adobe as Prerelease Software. “Personal Information” is hereby defined as name, address, phone number, e-mail address, IP address, other personally identifying information of the Licensee.‌
Usage Tracking. You acknowledge that we may collect information on your usage of Document Cloud SDKs or APIs, including personal information, and may use such information to maintain security, monitor performance, and otherwise improve the quality of the Document Cloud SDKs or APIs offered.
AutoNDA by SimpleDocs
Usage Tracking. Cloud usage data is polled and recorded hourly. Cloud Storage usage is averaged on a monthly basis. Cloud Compute usage is summed on a monthly basis. Monthly billing period length may vary depending on the number of days in the given month. Storage example: if Customer uploads an initial 500 GB of storage on January 1st 12:00 AM PST and adds 250 GB on January 10th 12:00 AM PST for a total of 750 GB, Customer will be billed for the average usage of 677.42 GB for the January billing period. This scenario is for illustration purposes only and does not reflect minimum billing quantities or billing period length. Compute example: if Customer creates an m1.medium instance on January 1st 12:00 AM PST and shuts it down on January 11th 12:00 AM PST, Customer will be billed for summed usage of 240 hours of the m1.medium instance for the January billing period. This scenario is for illustration purposes only and does not reflect minimum billing quantities or billing period length.

Related to Usage Tracking

  • Vending Machines Seller shall remove all monies from all vending machines, laundry machines, pay telephones and other coin-operated equipment as of the Cut-Off Time and shall retain all monies collected therefrom as of the Cut-Off Time, and Purchaser shall be entitled to any monies collected therefrom after the Cut-Off Time.

  • User 4.9.1 Not to use the Property otherwise than for the Permitted Use;

  • PFPC System PFPC shall retain title to and ownership of any and all data bases, computer programs, screen formats, report formats, interactive design techniques, derivative works, inventions, discoveries, patentable or copyrightable matters, concepts, expertise, patents, copyrights, trade secrets, and other related legal rights utilized by PFPC in connection with the services provided by PFPC to the Fund.

  • Customer will 1.1 Select and notify Boeing of the suppliers and part numbers of the following BFE items by the following dates: Galley System Complete Galley Inserts Complete Seats (passenger) Complete Cabin Systems Equipment Complete

  • Equipment, Etc Each Grantor shall, (i) within ten (10) days after a written request by the Administrative Agent, in the case of Equipment now owned, and (ii) following a request by the Administrative Agent pursuant to subclause (i) above, within ten (10) days after acquiring any other Equipment, deliver to the Administrative Agent, any and all certificates of title, and applications therefor, if any, of such Equipment and shall cause the Administrative Agent to be named as lienholder on any such certificate of title and applications. No Grantor shall permit any such items to become a fixture to real estate or an accession to other personal property unless such real estate or personal property is the subject of a fixture filing (as defined in the UCC) creating a first priority perfected Lien in favor of the Administrative Agent.

  • Customer The agency or eligible user that purchases commodities or contractual services pursuant to the Contract.

  • Monitoring System In each case in which the Custodian has exercised delegated authority to place Assets with a Foreign Custodian, the Custodian shall establish a system, to re-assess or re-evaluate selected Foreign Custodians, at least annually in accordance with Rule 17f-5(c)(3).

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Time is Money Join Law Insider Premium to draft better contracts faster.