HP Scitex FB750 Legal Information - Page 21

The International Mobile Equipment Identity IMEI and International Mobile Subscriber Identity

Page 21 highlights

ENWW 17.2. Notwithstanding anything to the contrary contained in this License Agreement, if the Licensed Software is Symantec Endpoint Protection, each running instance (physical and/or virtual) of such Software must be licensed. You create an "instance" of software by executing the software's setup or install procedure. You also create an "instance" of software by duplicating an existing instance. References to software include "instances" of the software. You "run an instance" of software by loading it into memory and executing one or more of its instructions. Once running, an instance is considered to be running (whether or not its instructions continue to execute) until it is removed from memory. 17.3. Privacy; Data Protection. From time to time, the Licensed Software may collect certain information from the device on which it is installed, which may include: a. Information regarding installation of the Licensed Software. This information indicates to Symantec whether installation of the Licensed Software was successfully completed and is collected by Symantec for the purpose of evaluating and improving Symantec's product installation success rate. This information will not be correlated with any personally identifiable information. b. Information on potential security risks as well as URLs of websites visited that the Licensed Software deems potentially fraudulent. This information is collected by Symantec for the purpose of evaluating and improving the ability of Symantec's products to detect malicious behavior, potentially fraudulent websites and other Internet security risks. This information will not be correlated with any personally identifiable information. c. Portable executable files that are identified as malware. These files are submitted to Symantec using the Licensed Software's automatic submission function. The collected files could contain personally identifiable information that has been obtained by the malware without your permission. Files of this type are being collected by Symantec only for the purpose of improving the ability of Symantec's products to detect malicious behavior. Symantec will not correlate these files with any personally identifiable information. Such automatic submission function may be deactivated after installation by following the instructions in the Documentation for applicable products. d. The name given during initial setup to the device on which the Licensed Software is being installed. If collected, the name will be used by Symantec as an account name for such device under which you may elect to receive additional services and/or under which you may use certain features of the Licensed Software. You may change the account name at any time after installation of the Licensed Software (recommended). e. The International Mobile Equipment Identity (IMEI) and International Mobile Subscriber Identity (IMSI) for the mobile telecommunications device used with the Licensed Software. This information is being collected for the purpose of being able to identify the telecommunications device eligible to receive Content Updates for the Licensed Software. This information will not be correlated with any other personally identifiable information. f. Other information used for purposes of analyzing and improving the functionality of Symantec's products. This information will not be correlated with any personally identifiable information. The collected information as set out above is necessary for the purpose of optimizing the functionality of Symantec's products and may be transferred to the Symantec group in the United States or other countries that may have less protective data protection standards than the region in which You are situated (including the European Union), but Symantec has taken steps so that the collected information, if transferred, receives an adequate level of protection. Symantec may disclose the collected information if asked to do so by a law enforcement official as required or permitted by law or in response to a subpoena or other legal process. In order to promote awareness, detection and prevention of Internet security risks, Symantec may share certain information with research organizations and other security software vendors. Symantec may also use statistics derived from the 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33

17.2. Notwithstanding anything to the contrary contained in this License Agreement, if the Licensed
Software is Symantec Endpoint Protection, each running instance (physical and/or virtual) of such
Software must be licensed. You create an “instance” of software by executing the software’s setup or
install procedure. You also create an “instance” of software by duplicating an existing instance.
References to software include “instances” of the software. You “run an instance” of software by
loading it into memory and executing one or more of its instructions. Once running, an instance is
considered to be running (whether or not its instructions continue to execute) until it is removed from
memory.
17.3.
Privacy; Data Protection.
From time to time, the Licensed Software may collect certain
information from the device on which it is installed, which may include:
a.
Information regarding installation of the Licensed Software. This information indicates to
Symantec whether installation of the Licensed Software was successfully completed and is
collected by Symantec for the purpose of evaluating and improving Symantec’s product
installation success rate. This information will not be correlated with any personally identifiable
information.
b.
Information on potential security risks as well as URLs of websites visited that the Licensed
Software deems potentially fraudulent. This information is collected by Symantec for the purpose
of evaluating and improving the ability of Symantec’s products to detect malicious behavior,
potentially fraudulent websites and other Internet security risks. This information will not be
correlated with any personally identifiable information.
c.
Portable executable files that are identified as malware. These files are submitted to Symantec
using the Licensed Software’s automatic submission function. The collected files could contain
personally identifiable information that has been obtained by the malware without your
permission. Files of this type are being collected by Symantec only for the purpose of improving
the ability of Symantec’s products to detect malicious behavior. Symantec will not correlate these
files with any personally identifiable information. Such automatic submission function may be
deactivated after installation by following the instructions in the Documentation for applicable
products.
d.
The name given during initial setup to the device on which the Licensed Software is being installed.
If collected, the name will be used by Symantec as an account name for such device under which
you may elect to receive additional services and/or under which you may use certain features of
the Licensed Software. You may change the account name at any time after installation of the
Licensed Software (recommended).
e.
The International Mobile Equipment Identity (IMEI) and International Mobile Subscriber Identity
(IMSI) for the mobile telecommunications device used with the Licensed Software. This
information is being collected for the purpose of being able to identify the telecommunications
device eligible to receive Content Updates for the Licensed Software. This information will not be
correlated with any other personally identifiable information.
f.
Other information used for purposes of analyzing and improving the functionality of Symantec’s
products. This information will not be correlated with any personally identifiable information.
The collected information as set out above is necessary for the purpose of optimizing the functionality
of Symantec’s products and may be transferred to the Symantec group in the United States or other
countries that may have less protective data protection standards than the region in which You are
situated (including the European Union), but Symantec has taken steps so that the collected
information, if transferred, receives an adequate level of protection. Symantec may disclose the
collected information if asked to do so by a law enforcement official as required or permitted by law or
in response to a subpoena or other legal process. In order to promote awareness, detection and
prevention of Internet security risks, Symantec may share certain information with research
organizations and other security software vendors. Symantec may also use statistics derived from the
ENWW
17