Zebra VC80 Quick Reference Manual - page 29
Quick Reference Guide
29
can switch off the active query feature through a registry setting.
Windows Time Service. This service synchronizes with www.time.windows.com once
a week to provide your computer with the correct time. The connection uses standard
NTP protocol.
b.
Use of Information. Microsoft may use the computer information, error reports, and
Malware reports to improve our software and services. We may also share it with others,
such as hardware and software vendors. They may use the information to improve how
their products run with Microsoft software.
c.
Misuse of Internet-based Services. You may not use these services in any way that
could harm them or impair anyone else's use of them. You may not use the services to try
to gain unauthorized access to any service, data, account or network by any means.
6.
VALIDATION.
a.
Validation verifies that the software has been activated and is properly licensed. It also
verifies that no unauthorized changes have been made to the validation, licensing, or
activation functions of the software. Validation may also check for certain malicious or
unauthorized software related to such unauthorized changes. A validation check
confirming that you are properly licensed, permits you to continue to use the software,
certain features of the software or to obtain additional benefits. You are not permitted to
circumvent validation. This is to prevent unlicensed use of the software. For more
information, see go.microsoft.com/fwlink/?Linkid=104610.
b.
The software will from time to time perform a validation check of the software. The check
may be initiated by the software or Microsoft. To enable the activation function and
validation checks, the software may from time to time require updates or additional
downloads of the validation, licensing or activation functions of the software. The updates
or downloads are required for the proper functioning of the software and may be
downloaded and installed without further notice to you. During or after a validation check,
the software may send information about the software, the computer and the results of
the validation check to Microsoft. This information includes, for example, the version and
product key of the software, any unauthorized changes made to the validation, licensing
or activation functions of the software, any related malicious or unauthorized software
found and the Internet protocol address of the computer. Microsoft does not use the
information to identify or contact you. By using the software, you consent to the
transmission of this information. For more information about validation and what is sent
during or after a validation check, see go.microsoft.com/fwlink/?Linkid=104611.
c.
If, after a validation check, the software is found to be counterfeit, improperly licensed, or
a non-genuine Windows product, or if it includes unauthorized changes, then the
functionality and experience of using the software will be affected. For example:
Microsoft may
•
repair the software, and remove, quarantine or disable any unauthorized changes that
may interfere with the proper use of the software, including circumvention of the
activation or validation functions of the software; or
•
check and remove malicious or unauthorized software known to be related to such
unauthorized changes; or
•
provide notice that the software is improperly licensed or a non-genuine Windows
product;
and you may:
•
receive reminders to obtain a properly licensed copy of the software; or
•
need to follow Microsoft's instructions to be licensed to use the software and
reactivate;
and you may not be able to:
•
use or continue to use the software or some of the features of the software; or
•
obtain certain updates or upgrades from Microsoft.