license.rtf

(29 KB) Pobierz

MICROSOFT SOFTWARE LICENSE TERMS

WINDOWS VISTA ENTERPRISE K SERVICE PACK 2             

Your use of this software is subject to the terms and conditions of your volume license agreement.  You may not use this software under these terms if you are not a volume license customer or if you have not acquired a license for the software under your volume license agreement. 

If you receive and use this software for evaluation from Microsoft or a Microsoft authorized distributor, then the following evaluation license terms will apply.

 

MICROSOFT EVALUATION SOFTWARE LICENSE TERMS

WINDOWS VISTA ENTERPRISE K SERVICE PACK 2

These license terms are an agreement between Microsoft Corporation (or based on where you live, one of its affiliates) and you.  Please read them.  They apply to the software named above, which includes the media on which you received it, if any.  The terms also apply to any Microsoft

·              updates,

·              supplements,

·              Internet-based services, and

·              support services

for this software, unless other terms accompany those items.  If so, those terms apply. 

By using the software, you accept these terms.  If you do not accept them, do not use the software.  As described below, using the software also operates as your consent to the transmission of certain computer information during validation and for Internet-based services.

If you comply with these license terms, you have the rights below for each license you acquire.

1.              OVERVIEW.

              a.              Software.  The software includes desktop operating system software.  This software does not include Windows Live services.  Windows Live is a service available from Microsoft under a separate agreement.

              b.              License Model.  The software is licensed on a per copy per device basis.

2.              TERM.  The term of this agreement will expire 180 days after the software is installed.  You have the right to use the software for evaluation only under the license terms of this agreement during this period.    When installing or using the software for evaluation, you may not enter a product key or otherwise effectuate activation of the software. 

3.              INSTALLATION AND USE RIGHTS.  Before you use the software under a license, you must assign that license to one device (physical hardware system).  That device is the “licensed device.”  A hardware partition or blade is considered to be a separate device.

              a.              Licensed Device.  You may install one copy of the software on the licensed device.  You may use the software on up to two processors on that device at one time.  Except as provided in the Storage and Network Use sections below, you may not use the software on any other device.

              b.              Evaluation.  You may use the software only to demonstrate and internally evaluate it.  You may not use the software for commercial purposes.  You may not use the software in a live operating environment unless Microsoft permits you to do so under another agreement.

              c.              Number of Users.  Except as provided in the Device Connections and Other Access Technologies sections below, only one user may use the software at a time.

              d.              Alternative Versions.  The software may include more than one version, such as 32-bit and 64-bit.  You may use only one version at one time.

4.              ADDITIONAL LICENSING REQUIREMENTS AND/OR USE RIGHTS.

              a.              Storage.  You may store one copy of the software on a storage device, such as a network server.  You may use that copy to install the software on any other device to which a license has been assigned.

              b.              Network Use.  Instead of installing the software on the licensed device, you may install one copy on a storage device, such as a network server.  You may use that copy only to run the software on your licensed device over an internal network.

              c.              Device Connections.  You may allow up to 10 other devices to connect to the software installed on the licensed device to use File Services, Print Services, Internet Information Services and Internet Connection Sharing and Telephony Services. However, you may not exceed a total of 10 connections at one time.

              d.              Remote Access Technologies.  You may access and use the software installed on the licensed device remotely from another device using remote access technologies as follows.

·              Remote Desktop.  The single primary user of the licensed device may access a session from any other device using Remote Desktop or similar technologies.  A “session” means the experience of interacting with the software, directly or indirectly, through any combination of input, output and display peripherals.  Other users may access a session from any device using these technologies, if the remote device is separately licensed to run the software.

·              Other Access Technologies.  You may use Remote Assistance or similar technologies to share an active session.

              e.              Other Remote Uses.  You may allow any number of devices to access the software installed on the licensed device for purposes other than those described in the Device Connections and Remote Access Technologies sections above, such as to synchronize data between devices.

              f.              Use with Virtualization Technologies.                Instead of using the software directly on the licensed device, you may install and use the software within only one virtual (or otherwise emulated) hardware system on the licensed device. When used in a virtualized environment, content protected by digital rights management technology, BitLocker or any full volume disk drive encryption technology may not be as secure as protected content not in a virtualized environment. You should comply with all domestic and international laws that apply to such protected content.

              g.              Multiplexing.  Hardware or software you use to

·              pool connections, or

·              reduce the number of devices or users that directly access or use the software

                            (sometimes referred to as “multiplexing” or “pooling”), does not reduce the number of licenses you need.

              h.              Font Components.  While the software is running, you may use its fonts to display and print content.  You may only

·              embed fonts in content as permitted by the embedding restrictions in the fonts; and

·              temporarily download them to a printer or other output device to print content.

              i.              Icons, images and sounds.  While the software is running, you may use but not share its icons, images, sounds, and media.

5.              VALIDATION.

              a.              Validation verifies that the software has been activated and is properly licensed.  It also verifies that no unauthorized changes have been made to the validation, licensing, or activation functions of the software. Validation may also check for certain malicious or unauthorized software related to such unauthorized changes. A validation check confirming that you are properly licensed permits you to continue to use the software, certain features of the software or to obtain additional benefits.  You are not permitted to circumvent validation. This is to prevent unlicensed use of the software. For more information, see http://go.microsoft.com/fwlink/?Linkid=96550.

              b.              The software will from time to time perform a validation check of the software. The check may be initiated by the software or Microsoft. To enable the activation function and validation checks, the software may from time to time require updates or additional downloads of the validation, licensing or activation functions of the software. The updates or downloads are required for the proper functioning of the software and may be downloaded and installed without further notice to you. These updates and downloads may be delivered to you through the Windows Update service (if you use the service) or through other means. During or after a validation check, the software may send information about the software, the device and the results of the validation check to Microsoft.  This information includes, for example, the version and product key of the software, any unauthorized changes made to the validation, licensing or activation functions of the software, any related malicious or unauthorized software found and the Internet protocol address of the device.  Microsoft does not use the information to identify or contact you.  By using the software, you consent to the transmission of this information.  For more information about validation and what is sent during or after a validation check, see http://go.microsoft.com/fwlink/?Linkid=96551.

              c.              If, after a validation check, the software is found to be counterfeit, improperly licensed, a non-genuine Windows product, or include unauthorized changes, the functionality and experience of using the software will be affected, for example:

                            Microsoft may

×              repair the software, remove, quarantine or disable any unauthorized changes that may interfere with the proper use of the software, including circumvention of the  activation or validation functions of the software, or

×              check and remove malicious or unauthorized software known to be related to such unauthorized changes, or

×              provide notices that the software is improperly licensed or a non-genuine Windows product

                            and you may

·              receive reminders to obtain a properly licensed copy of the software, or

·              need to follow Microsoft’s instructions to be licensed to use the software and reactivate,

and you may not be able to

·              use or continue to use the software or some of the features of the software, or

·              obtain certain updates or upgrades from Microsoft

d.              You may only obtain updates or upgrades for the software from Microsoft or authorized sources.  For more information on obtaining updates from authorized sources see http://go.microsoft.com/fwlink/?Linkid=96552.

6.              POTENTIALLY UNWANTED SOFTWARE.  If turned on, Windows Defender will search your computer for “spyware,” “adware” and other potentially unwanted software.  If it finds potentially unwanted software, the software will ask you if you want to ignore, disable (quarantine) or remove it.  Any potentially unwanted software rated “high” or “severe,” will automatically be removed after scanning unless you change the default setting.  Removing or disabling potentially unwanted software may result in

              ·              other software on your computer ceasing to work, or

              ·              your breaching a license to use other software on your computer.

              By using this software, it is possible that you will also remove or disable software that is not potentially unwanted software.

7.              INTERNET-BASED SERVICES.  Microsoft provides Internet-based services with the software.  It may change or cancel them at any time.

              a.              Consent for Internet-Based Services.  The software features described below and in the Windows Vista Privacy Statement connect to Microsoft or service provider computer systems over the Internet.  In some cases, you will not receive a separate notice when they connect.  You may switch off these features or not use them.  For more information about these features, see the Windows Vista Privacy Statement at http://go.microsoft.com/fwlink/?Linkid=96553. By using these features, you consent to the transmission of this information.  Microsoft does not use the information to identify or contact you.

                            Computer Information.  The following features use Internet protocols, which send to the appropriate systems computer information, such as your Internet protocol address, the type of operating system, browser and name and version of the software you are using, and the language code of the device where you installed the software.  Microsoft uses this information to make the Internet-based services available to you.

·              Plug and Play and Plug and Play Extensions.  You may connect new hardware to your device, either directly or over a network.  Your device may not have the drivers needed to communicate with that hardware.  If so, the update feature of the software can obtain the correct driver from Microsoft and install it on your device.  An administrator can disable this update feature.

·              Windows Update.  To enable the proper functioning of the Windows Update service in the software (if you use it), updates or downloads to the Windows Update service will be required from time to time and downloaded and installed without further notice to you.

·              Web Content Features.  Features in the software can retrieve related content from Microsoft and provide it to you.  Examples of these features are clip art, templates, online training, online assistance and Appshelp.  You may choose not to use these web content features.

·              Digital Certificates.  The software uses digital certificates.  These digital certificates confirm the identity of Internet users sending X.509 standard encrypted information.  They also can be used to digitally sign files and macros, to verify the integrity and origin of the file contents.  The software retrieves certificates and updates certificate revocation lists over the Internet, when available.

·              Auto Root Update.  The Auto Root Update feature updates the list of trusted certificate authorities.  You can switch off the Auto Root Update feature.

·              Windows Media Digital Rights Management.  Content owners use Windows Media digital rights management technology (WMDRM) to protect their intellectual property, including copyrights.  This software and third party software use WMDRM to play and copy WMDRM-protected content.  If the software fails to protect the content, content owners may ask Microsoft to revoke the software’s ability to use WMDRM to play or copy protected content.  Revocation does not affect other content.  When you download licenses for protected content, you agree that Microsoft may include a revocation list with the licenses.  Content owners may require you to upgrade WMDRM to access their content.  Microsoft software that includes WMDRM will ask for your consent prior to the upgrade.  If you decline an upgrade, you will not be able to access content that requires the upgrade.  You may switch off WMDRM features that access the Internet.  When these features are off, you can still play content for which you have a valid license.

·              Windows Media Player.  When you use Windows Media Player, it checks with Microsoft for

·              compatible online music services in your region;

·              new versions of the player; and

·              codecs if your device does not have the correct ones for playing content.

You can switch off this last feature.  For more information, go to http://go.microsoft.com/fwlink/?Linkid=44073.

·              Malicious Software Removal.  During setup of the software, if you select “Get important updates for installation”, the software may check for and remove certain malicious software (“Malware”) from your device during setup.  The Malware that will be removed, if found, is listed and periodically updated at http://www.support.microsoft.com/?kbid=890830. When the software checks your device for Malware, a report will be sent to Microsoft about any Malware detected, specific information relating to the detection, errors that occurred while the software was checking for Malware, and other information about your device that will help us improve this and other Microsoft products and services. No information included in these reports will be used to identify or contact you. You may disable the software’s reporting functionality by following the instructions found at http://www.support.microsoft.com/?kbid=890830. For more information, read the Windows Malicious Software Removal Tool privacy statement at http://go.microsoft.com/fwlink/?LinkId=113995.

·              Network Awareness.  This feature determines whether a system is connected to a network by either passive monitoring of network traffic or active DNS or HTTP queries.  The query only transfers standard TCP/IP or DNS information for routing purposes.  You can switch off the active query feature through a registry setting.

·              Windows Time Service.  This service synchronizes with time.windows.com once a week to provide your computer with the correct time.  You can turn this feature off or choose your preferred tim...

Zgłoś jeśli naruszono regulamin