USE OF WEB BEACONS OR GIF FILES Sample Clauses

USE OF WEB BEACONS OR GIF FILES. Invisalink Wireless Web pages may contain electronic images known as Web beacons – sometimes also called single-pixel gifs – that allow Invisalink Wireless to count users who have visited those pages and to deliver co- branded services. Invisalink Wireless may include Web beacons in promotional e-mail messages or newsletters in order to determine whether messages have been opened and acted upon. Some of these Web beacons may be placed by third party service providers to help determine the effectiveness of our advertising campaigns or e-mail communications. These Web beacons may be used by these service providers to place a persistent cookie on your computer. This allows the service provider to recognize your computer each time you visit certain pages or e-mails and compile anonymous information in relation to those page views, which in turn enables us and our service providers to learn which advertisements and emails bring you to our website and how you use the site. Invisalink Wireless prohibits Web beacons from being used to collect or access your personal information.
AutoNDA by SimpleDocs
USE OF WEB BEACONS OR GIF FILES. Provider’s Website and/or provider Internet Services may contain electronic images known as web beacons – sometimes also called single-pixel gifs – that allow Provider to count Members who have visited those pages and to deliver co-branded services. Provider may include web beacons in promotional e-mail messages or newsletters to determine whether messages have been opened and acted upon. Some of these web beacons may be placed by third party service providers to help determine the effectiveness of our advertising campaigns or email communications. These web beacons may be used by these service providers to place a persistent cookie on Member’s computer. This allows the service provider to recognize Member’s computer each time Member visits certain pages or emails and compile anonymous information in relation to those page views, which in turn enables Provider and our service providers to learn which advertisements and emails bring Member to Provider’s Web Site and/or Provider’s Internet Services and how Member uses the site. Provider prohibits web beacons from being used to collect or access Member’s personal information.

Related to USE OF WEB BEACONS OR GIF FILES

  • COMPUTER GRAPHICS FILES The Engineer agrees to comply with Attachment G, Computer Graphics Files for Document and Information Exchange, if determined by the State to be applicable to this contract.

  • Malicious Use of Orphan Glue Records Registry Operator shall take action to remove orphan glue records (as defined at xxxx://xxx.xxxxx.xxx/en/committees/security/sac048.pdf) when provided with evidence in written form that such records are present in connection with malicious conduct.

  • Access to Files 12.01 A copy of any completed evaluation which is to be placed in a nurse's file shall be first reviewed with the nurse. The nurse shall initial such evaluation as having been read and shall have the opportunity to add views to such evaluation prior to it being placed in a file. Each nurse shall have reasonable access to the file for the purposes of reviewing any evaluations or formal disciplinary notations contained therein in the presence of the supervisor. A copy of the evaluation will be provided to the nurse at the nurse's request.

  • Access to and Use of Content Customer has the right to access and use applicable Content subject to the terms of applicable Order Forms, this Agreement and the Documentation.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • Use of Data by User Registry Operator will permit user to use the zone file for lawful purposes; provided that (a) user takes all reasonable steps to protect against unauthorized access to and use and disclosure of the data and (b) under no circumstances will Registry Operator be required or permitted to allow user to use the data to, (i) allow, enable, or otherwise support the transmission by email, telephone, or facsimile of mass unsolicited, commercial advertising or solicitations to entities other than user’s own existing customers, or (ii) enable high volume, automated, electronic processes that send queries or data to the systems of Registry Operator or any ICANN-­‐accredited registrar.

  • Access to Public Records The Department may unilaterally cancel this Contract for refusal by the Contractor to comply with this section by not allowing public access to all documents, papers, letters or other material made or received by the Contractor in conjunction with the Contract, unless the records are exempt from section 24(a) of Article I of the State Constitution and section 119.07(1), Florida Statutes.

  • Access to File 12.01 An employee shall upon written request, made a reasonable time before the time of viewing, have an opportunity to view their personnel file in the presence of the Director of Human Resources or their designate. The information the employee may review will be:

  • Use of information, data and software In the event that you receive any data, information or software via the Trading Platform other than that which you are entitled to receive pursuant to this Client Agreement, you will immediately notify us and will not use, in any way whatsoever, such data, information or software.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.