beautypg.com

Konica Minolta bizhub PRESS C8000e User Manual

Page 70

background image

bizhub PRESS C8000/C7000/C7000P/C6000/C70hc & bizhub PRO C6000L & IC-601

1-69

1.3

SOFTWARE LICENSE AGREEMENT

1

i. Right to Use and Distribute. The code and text files listed below are "Distributable Code."
- REDIST.TXT Files. You may copy and distribute the object code form of code listed in REDIST.TXT files.
- Sample Code. You may modify, copy, and distribute the source and object code form of code marked as
"sample."
- Microsoft Merge Modules. You may copy and distribute the unmodified output of Microsoft Merge Modules.
- MFCs, ATLs and CRTs. You may modify the source code form of Microsoft Foundation Classes (MFCs), Active
Template Libraries (ATLs), and C runtimes (CRTs) to design, develop and test your programs, and copy and
distribute the object code form of your modified files under a new name.
- MDAC. You may copy and distribute the object code form of the MDAC_TYP.EXE
file.
- Image Library. You may copy and distribute images and animations in the Image Library as described in the
software documentation. You may also modify that content. If you modify the content, it must be for use that is
consistent with the permitted use of the unmodified content.
- Third Party Distribution. You may permit distributors of your programs to copy and distribute the Distributable
Code as part of those programs.

ii. Distribution Requirements. For any Distributable Code you distribute, you must
- add significant primary functionality to it in your programs;
- require distributors and external end users to agree to terms that protect
it at least as much as this agreement;
- display your valid copyright notice on your programs; and
- indemnify, defend, and hold harmless Microsoft from any claims, including attorneys’ fees, related to the
distribution or use of your programs.

iii. Distribution Restrictions. You may not
- alter any copyright, trademark or patent notice in the Distributable Code;
- use Microsoft’s trademarks in your programs’ names or in a way that suggests
your programs come from or are endorsed by Microsoft;
- distribute Distributable Code, other than code listed in OTHER-DIST.TXT files, to run on a platform other than
the Windows platform;
- include Distributable Code in malicious, deceptive or unlawful programs; or
- modify or distribute the source code of any Distributable Code so that any part of it becomes subject to an
Excluded License. An Excluded License is one that requires, as a condition of use, modification or distribution, that
- the code be disclosed or distributed in source code form; or
- others have the right to modify it.

c. Additional Functionality. Microsoft may provide additional functionality for the software. Other license terms and
fees may apply.

4. INTERNET-BASED SERVICES. Microsoft provides Internet-based services with the software. It may change or
cancel them at any time.

a. Consent for Internet-Based Services. The software feature described below connects to Microsoft or service
provider computer systems over the Internet.
In some cases, you will not receive a separate notice when they connect. You may switch off this feature or not
use it. For more information about this feature, see the software documentation. BY USING THIS FEATURE, YOU
CONSENT TO THE TRANSMISSION OF THIS INFORMATION. Microsoft does not use the information to
identify or contact you.

Computer Information. The following feature uses Internet protocols, which send to the appropriate systems
computer information, such as your Internet protocol address, the type of operating system, browser and name and
version of the software you are using, and the language code of the device where you installed the software.
Microsoft uses this information to make the Internet-based service available to you.
- Digital Certificates. The software uses digital certificates. These digital certificates confirm the identity of Internet
users sending X.509 standard encrypted information. The software retrieves certificates and updates
certificate revocation lists. These security features operate only when you use the Internet.

b. Misuse of Internet-based Services. You may not use this service in any way that could harm it or impair anyone
else’s use of it. You may not use the service to try to gain unauthorized access to any service, data, account or
network by any means.

5. TIME-SENSITIVE SOFTWARE. If the version of the software is a trial version, the software will stop running either
ninety days or one hundred eighty days after you install it, depending on the trial version you have. You will receive
notice before it stops running. You may not be able to access data used with the software when it stops running.

6. PRODUCT KEYS. The software requires a key to install or access it. You are responsible for the use of keys
assigned to you. You should not share the keys with third parties.