TERMS OF SERVICE

Google APIs Terms of Service

  1. The Programme, the Site, its features or sections of it may not be available in all languages or in all countries, and Apple makes no representation that the Site, its features or sections (including any products or services referenced or provided through the Programme) are appropriate or available for use in any particular location. Apple reserves the right to limit, in its sole discretion, the provision and quantity of any feature, product or service to any person or geographic area. Any offer for any feature, product or service made on the Programme or Site is void where prohibited.
  2. You agree that you will not:
    1. Attempt to gain unauthorised access to any portion or feature of the Site, or any other systems or networks connected to the Site or to any Apple server, by hacking, password “mining” or any other illegitimate means;
    2. Probe, scan or test the vulnerability of the Site or any network connected to the Site, nor breach the security or authentication measures on the Site or any network connected to the Site;
    3. Take any action that imposes an unreasonable or disproportionately large load on the infrastructure of the Site or Apple’s systems or networks, or any systems or networks connected to the Site or to Apple;
    4. Pretend to be anyone, or any entity, that you are not. You may not impersonate or misrepresent yourself as another person (including celebrities), entity, an Apple employee or a civic government leader, or otherwise misrepresent your affiliation with a person or entity (Apple reserves the right to delete any registration that could be deemed to be an impersonation or misrepresentation of your identity, or a misappropriation of another person’s name or identity);
    5. Engage in any copyright infringement or other intellectual property infringement, or disclose any trade secret or confidential information in violation of a confidentiality, employment or non-disclosure agreement;
    6. Upload, post, email, transmit, store or otherwise make available any material that contains viruses or any other computer code, files or programs designed to harm, interfere or limit the normal operation of the Site (or any part thereof), or any other computer software or hardware;
    7. Interfere with or disrupt the Site (including accessing the Site through any automated means, such as scripts or web crawlers), or any servers or networks connected to the Site, or breach any policies, requirements or regulations of networks connected to the Site (including using the Site to carry out any unauthorised access to, use or monitoring of data or traffic thereon); or
    8. Plan or engage in any illegal activity using, involving or relating to the Site or the Programme.
  3. Apple does not pre-screen information submitted by the users of the Site (“Submissions”). Apple retains the right, but not the responsibility, to edit or remove any Submission, including those deemed by Apple to violate the Agreement. Apple will make good faith efforts to investigate allegations that Submissions violate the Agreement but (a) makes no warranty to you that it will edit, remove or continue to permit the display of any specific Submission, whether or not subject to such allegations, and (b) will have no liability whatsoever for editing, removing or continuing to permit the display of any Submission whatsoever.

 

Who We Are and What This Policy Covers

Howdy! We are the folks behind a variety of products and services designed to allow anyone — from bloggers, to photographers, small business owners, and enterprises — to take full advantage of the power and promise of the open web. Our mission is to democratize publishing and commerce so that anyone with a story can tell it, and anyone can turn their great idea into a livelihood. We believe in powering the open internet with code that is open source and are proud to say that the vast majority of our work is available under the General Public License (“GPL”). Unlike most other services, because our GPL code is public, you can actually download and take a look at that code to see how it works.

This Privacy Policy applies to information that we collect about you when you use:

http://www.ticketleap.com/legal/api-terms-of-use/

This Privacy Policy also applies to information we collect when you apply for a job at Automattic or one of our subsidiaries.

Throughout this Privacy Policy we’ll refer to our websites, mobile applications, and other products and services collectively as “Services.” And if you’d like to learn more about which Automattic company is the controller of information about you, take a look at the section below on Controllers and Responsible Companies.

Please note that this Privacy Policy does not apply to any of our products or services, like Tumblr, that have a separate privacy policy.

Below we explain how we collect, use, and share information about you, along with the choices that you have with respect to that information.

Creative Commons Sharealike License

We’ve decided to make this Privacy Policy available under a Creative Commons Sharealike license. You can grab a copy of this Privacy Policy and other legal documents on GitHub. You’re more than welcome to copy it, adapt it, and repurpose it for your own use. Just make sure to revise the language so that your policy reflects your actual practices. If you do use it, we’d appreciate a credit and link to Automattic somewhere on your site.

Information We Collect

We only collect information about you if we have a reason to do so — for example, to provide our Services, to communicate with you, or to make our Services better.

We collect this information from three sources: if and when you provide information to us, automatically through operating our Services, and from outside sources. Let’s go over the information that we collect.

Information You Provide to Us

It’s probably no surprise that we collect information that you provide to us directly. Here are some examples:

  • Basic account information: We ask for basic information from you in order to set up your account. For example, we require individuals who sign up for a WordPress.com account to provide an email address and password, along with a username or name — and that’s it. You may provide us with more information — like your address and other information you want to share — but we don’t require that information to create a WordPress.com account.
  • Public profile information: If you have an account with us, we collect the information that you provide for your public profile. For example, if you have a WordPress.com account, your username is part of that public profile, along with any other information you put into your public profile, like a photo or an “About Me” description. Your public profile information is just that — public — so please keep that in mind when deciding what information you would like to include.
  • Payment and contact information: If you buy something from us or earn revenue through your site, we’ll collect information to process those payments and contact you. If you buy something from us — a subscription to a WordPress.com plan, a premium theme, a custom domain, some Longreads swag — or if you pay fees to a person or business through their WordPress.com site (for example via the Payments feature or the Pay with PayPal block), you’ll provide additional personal and payment information like your name, credit card information, and contact information. We also keep a record of the purchases you’ve made. If you use our Ecommerce Services (including Store on WordPress.com, WooCommerce Shipping & Tax, and WooCommerce Payments), you’ll have to create a WordPress.com account or connect an existing account and, for some Services, provide your site URL. You may also provide us with financial details to set up a payments integration, like the email address for your Stripe or PayPal account or your bank account information. If you participate in a revenue sharing opportunity for your site, like WordAds, you’ll provide some additional information — for example, a tax ID or other identifier so we can process payments to you.
  • Business Profile: Some of our products collect additional information from you as part of creating a user/customer profile. For example, if you are a Jetpack CRM customer we may add you to our customer relationship database (powered by Jetpack CRM!) using information you provide us including your name, your employer, your job title or role, your contact information, and your communications with us. If you are a Happy Tools user, we use information you provide us like your timezone and location information, your company and team information, and your contact information, to set up your account and power the Service’s features.
  • Content information: You might provide us with information about you in draft and published content (a blog post or comment that includes biographic information about you, or any media or files you upload).
  • Credentials: Depending on the Services you use, you may provide us with credentials for your self-hosted website (like SSH, FTP, and SFTP username and password). Jetpack and VaultPress users may provide us with these credentials in order to use our one-click restore feature if there is a problem with their site, or to allow us to troubleshoot problems more quickly.
  • Communications with us (hi there!): You may also provide us with information when you respond to surveys, communicate with our Happiness Engineers about a support question, post a question in our public forums, or sign up for a newsletter like the one we send through Longreads. When you communicate with us via form, email, phone, WordPress.com comment, or otherwise, we store a copy of our communications (including any call recordings as permitted by applicable law).
  • Job applicant information: If you apply for a job with us — awesome! You may provide us with information like your name, contact information, resume or CV, and work authorization verification as part of the application process.

Information We Collect Automatically

We also collect some information automatically:

  • Log information: Like most online service providers, we collect information that web browsers, mobile devices, and servers typically make available, including the browser type, IP address, unique device identifiers, language preference, referring site, the date and time of access, operating system, and mobile network information. We collect log information when you use our Services — for example, when you create or make changes to your website on WordPress.com.
  • Usage information: We collect information about your usage of our Services. For example, we collect information about the actions that site administrators and users perform on a site using our WordPress.com or Jetpack services — in other words, who did what and when (e.g., [WordPress.com username] deleted “[title of post]” at [time/date]). Our WooCommerce Usage Tracker also tracks information like your email address, WooCommerce settings, and PHP settings, along with information about your online store, like the aggregate number of orders and customers. We also collect information about what happens when you use our Services (e.g., page views, support document searches at en.support.wordpress.com, features enabled for your website, interactions with our Admin Bar and other parts of our Services) along with information about your device (e.g., screen size, name of cellular network, and mobile device manufacturer). We use this information to, for example, provide our Services to you, get insights on how people use our Services so we can make our Services better, and understand and make predictions about user retention.
  • Location information: We may determine the approximate location of your device from your IP address. We collect and use this information to, for example, calculate how many people visit our Services from certain geographic regions. We may also collect information about your precise location via our mobile apps (like when you post a photograph with location information) if you allow us to do so through your mobile device operating system’s permissions.
  • Stored information: We may access information stored on your mobile device via our mobile apps. We access this stored information through your device operating system’s permissions. For example, if you give us permission to access the photographs on your mobile device’s camera roll, our Services may access the photos stored on your device when you upload a really amazing photograph of the sunrise to your website.
  • Interactions with other users’ sites: We collect some information about your interactions with other users’ sites while you are logged in to your account with us, such as your “Likes” and the fact that you commented on a particular post, so that we can, for example, recommend posts we think may interest you. As another example, we collect information about the comments IntenseDebate users make while logged in and use that information to, for example, tally up statistics about your comments (check them out in your dashboard!) and display information about your comments in your IntenseDebate public profile.
  • Information from cookies & other technologies: A cookie is a string of information that a website stores on a visitor’s computer, and that the visitor’s browser provides to the website each time the visitor returns. Pixel tags (also called web beacons) are small blocks of code placed on websites and emails. Automattic uses cookies and other technologies like pixel tags to help us identify and track visitors, usage, and access preferences for our Services, as well as track and understand email campaign effectiveness and to deliver targeted ads. For more information about our use of cookies and other technologies for tracking, including how you can control the use of cookies, please see our Cookie Policy.

Information We Collect from Other Sources

We may also get information about you from other sources. For example, if you create or log in to your WordPress.com account through another service (like Google) or if you connect your website or account to a social media service (like Twitter) through our Publicize feature, we’ll receive information from that service (e.g., your username, basic profile information, friends list) via the authorization procedures for that service. As another example, if you use WooCommerce Payments, we’ll receive information relating to your Stripe account, such as your email address and phone number. The information we receive depends on which services you use or authorize and what options are available.

Third-party services may also give us information, like mailing addresses for individuals who are not yet our users (but we hope will be!). We use this information for marketing purposes like postcards and other mailers advertising our Services.

U.S. Patent and Trademark Office

PTO-1478
Approved for use through 02/28/2021. OMB 0651-0009
U.S. Patent and Trademark Office; U.S. DEPARTMENT OF COMMERCE
Under the Paperwork Reduction Act of 1995, no persons are required to respond to a collection of information unless it contains a valid OMB control number

Third-Party Infringement
• Policy: Transactions may not contain content that infringes upon or violates the intellectual property rights of any third party, including copyright or trademark.

 

PRIVACY POLICIES

Terms of Use for USPTO websites

ISO 17065 — Valid vegan certification for the world market, recognized by foreign certification bodies, and accredited by national and international institutions. The BeVeg vegan certification standard has an expressed scope aimed to satisfy the vegan consumer of products and services.

ISO 17067 — Valid vegan certification conformity assessment program for the world market, recognized by foreign certification bodies, and accredited by national and international institutions. The BeVeg certification scheme has paved the one for a singular global conformity program for vegan claims for consumer products and services.

Report Trademark Violations

At BeVeg International, we take cases of Trademark misuse very seriously as we pride ourselves in being the international gold standard in vegan labeling. Though we work hard to protect the integrity of our Trademark, we rely on the vigilance of our members and supporters acting as our eyes and ears on the ground. If you discover any misuse of the BeVeg Vegan Trademark, please help bring it to our attention using the form below or send us the product details at trademarkviolation@beveg.com

Trademark Violation Alerts

This webpage is intended to keep consumers aware of important safety alerts regarding BeVeg vegan certified products and products that are incorrectly bearing the BeVeg vegan logo. BeVeg reserves the right to withdraw the certification of any company whose vegan certified products appear on this page more than once.

The information on this page is current to the best of BeVeg’s knowledge, but may not be an up-to-date list of all incidents that may occur in the marketplace. Again, if you have questions or concerns about a specific product, you should contact BeVeg directly. You may also report vegan trademark abuses here any time. Our goal is to protect the consumer and ensure truth in labeling. Below you can find a list of companies misusing the BeVeg Vegan Trademark. No Reports found.

Scope

These Terms of Use apply to United States Patent and Trademark Office (USPTO) websites, applications, software, and services (collectively, “Services”) that are intended for public use on the uspto.gov domain, and to USPTO-branded mobile

applications and social media presences, except where superseded or modified by a separate agreement. Any separate service agreements will accompany the applicable Services or be clearly noted.

Modifications

USPTO may revise and update these Terms of Use as necessary to clarify or improve Services.

Linking policy
Links from USPTO to other websites

The USPTO provides limited external links as a service to our visitors. When you select a link to an external website, you leave the uspto.gov site and are subject to the privacy and security policies of the external website. USPTO makes use of some third-party sites to provide access to official information that is otherwise available directly from USPTO, and continually reviews these and other external links to assess their ongoing value to the public. Please note, however, that the USPTO:

  1. Does not control or guarantee the accuracy, relevance, timeliness or completeness of information contained on a linked external website;
  2. Does not endorse the organizations sponsoring linked websites or the views they express or the products and services they offer;
  3. Cannot and does not authorize the use of copyrighted materials found in linked websites (you must request authorization from the sponsor of the linked websites if you wish to use copyrighted materials from those sites – see the Copyright Information section for general guidance);
  4. Is not responsible for transmissions you may receive from external websites; and
  5. Does not guarantee that external websites comply with Section 508 (Accessibility Requirements) of the Rehabilitation Act.

Links from other websites to USPTO.gov

The USPTO does not engage in reciprocal linking arrangements. If you create a link to a USPTO website, you must do so in a manner that does not imply any affiliation with or endorsement by the USPTO for your enterprise or websites. See the Copyright Information and Editorial Guidance sections for additional information. In addition, please be aware that:

  • USPTO websites are not archival; links may change and material may be removed without warning;
  • Because deep links to pages on USPTO websites may bypass critical instructions and notices to customers, you should take care to link to

content’s parent page(s) where relevant notices and instructions may

appear; and
• The USPTO strongly encourages archival or permanent links to the USPTO

home page only.
Blogs, collaboration, and comment policy

The USPTO makes use of certain social media capabilities that permit informal, collaborative communications in a public forum. Participants who engage in such communications are expected to treat each other, as well as our agency and our employees, with respect, and are advised that:

  1. The use of vulgar, offensive, threatening or harassing language is prohibited.
  2. Comments should be related to the posted topic.
  3. Comments that make unsupported claims or accusations are not appropriate.
  4. Comments pertaining to the promotion or advertisement of a business or commercial transaction are not appropriate.
  5. Comments promoting or opposing any person campaigning for election to a political office or promoting or opposing any ballot proposition are prohibited.
  6. A comment should not be attributed to anyone other than the individual making the post, nor be presented in a way that is misleading about its origin.
  7. Comments made in a public forum on any USPTO website are considered to be public information.
  8. Comments that relate to pending applications for patents or trademarks are not appropriate for public forums.
  9. Communications made through social media sites will in no way constitute a legal or official notice or comment to the USPTO or any official or employee of the USPTO for any purpose.
  10. All comments are subject to review and removal if they fail to conform to the policy at any time.

Blogs on the USPTO websites represent official government communications, and are managed and moderated by the Office of Chief Communications Officer. The USPTO will not post blog comments that do not conform to the policy, and will not edit or alter individual blog comments to make them conform to policy.

On USPTO’s third party sites and social media channels (e.g., Twitter or Facebook), comments are reviewed and moderated following posts. Comments which do not comply with the stated policy are not allowed, and may be removed or withheld. USPTO reserves the right to use features that may restrict the ability of users who repeatedly violate the commenting policy, including limiting their ability to comment or reporting their comments as spam.

Any references to commercial entities, products, services, or other

nongovernmental organizations or individuals that are allowed are provided solely for the information of individuals using the site. These references are not intended to reflect the opinion of USPTO, the United States, or its officers or employees concerning the significance, priority, or importance to be given the referenced entity, product, service, or organization. Such references are not an official or personal endorsement of any product, person, or service, and may not be quoted or reproduced for the purpose of stating or implying USPTO endorsement or approval of any product, person, or service.

This policy is subject to amendment or modification at any time to ensure blogs, collaboration, and comments on the USPTO website are managed in a manner consistent with the intended purpose of the public forum.

Copyright information

Pursuant to federal law, most government-produced materials appearing on this website are not subject to copyright restrictions within the United States and are therefore in the public domain. Public domain information may be freely distributed and copied, but it is requested that in any subsequent use the United States Patent and Trademark Office (USPTO) be given appropriate acknowledgement (e.g., “Source: United States Patent and Trademark Office, http://www.uspto.gov”). The USPTO reserves the right to assert copyright protection internationally.

WARNING: Not all materials on the USPTO website are works of the U.S. government. When using USPTO websites, you may encounter documents, illustrations, photographs, or other informational resources contributed or licensed by private individuals, companies, or organizations that may be protected by U.S. and foreign copyright laws. Transmission or reproduction of protected items beyond that allowed by fair use as defined in the copyright laws, requires the written permission of the copyright owners. The USPTO is unable to grant or deny permission for any materials that may be posted on its website for which the copyright is owned by a third party. Should you need copyright permission, you are solely responsible for contacting the copyright owner directly.

Please contact us regarding copyright status before publishing, distributing, or reselling any documents having outside authorship or any images contained on the webpages for this site. For additional information about copyright restrictions on U.S. government works, please see guidance posted on USA.gov . See also the Editorial Guidance section of this page regarding references

to materials obtained from USPTO.gov websites, including special considerations for patents and trademarks.

Use of USPTO seal and logo

The USPTO does not authorize the use of either its seal or logo on any other websites, except where the agency maintains an official presence on that site.

Account management

USPTO websites provide access to a rich collection of information and services, including communications, forums, online filing for patents and trademarks, fee handling, data, and search. While published information is freely provided, some features may require that you log in with a dedicated account in order to access personalized content and transactions. When you complete the registration process to obtain an account, you will receive an account and password. You are responsible for maintaining the confidentiality of your account information, and for all activities that occur under your account, including any information data, software, or other materials that you may post or upload. Each practitioner will be responsible for verifying the identity of the person using any sponsored support staff account. For information on your identity verification responsibilities, please refer to the Patent Electronic System Access Document. You must log off from your account at the end of each session and must immediately notify USPTO of any unauthorized use of your account information or any other breach of security; USPTO is not liable for any loss or damage arising from your failure to perform these actions. Users accessing EFS-Web, PAIR, and Patent Center must abide by the Patent Electronic System Subscriber Agreement and PKI Subscribers Agreement. See the USPTO Privacy Policy for other important details about safeguarding your personal data.

You may terminate or deactivate your USPTO account and related access to USPTO services by submitting a termination request to USPTO. In addition, USPTO may, without prior notice, terminate, deactivate, limit your access to, or suspend your USPTO account, and related access to certain USPTO services. Cause for such action by USPTO shall include, but not be limited to, (a) breaches or violations of the Terms of Use or other incorporated agreements or guidelines, (b) requests by law enforcement or other government agencies, (c) discontinuance or material modification to the USPTO services (or any part thereof), (d) unexpected technical or security issues or problems, (e) extended periods of inactivity, (f) engagement by you in fraudulent or illegal activities, (g) nonpayment of any fees owed by you in connection with the USPTO services, and/ or (h) sharing of accounts and/or account passwords when they are intended for the sole use by the customer who registers for the account). Further, you agree that all terminations, limitations of access and suspensions for cause shall be made in USPTO’s sole discretion and that USPTO shall not be liable to you or any third party for any termination or deactivation of your account or related access to the USPTO services.

Security

This is a USPTO computer system, which may be accessed and used only for official Government business by authorized personnel. Unauthorized access, actions, use, modification, or disclosure of the data contained herein or in transit to/from this system constitutes a violation of the Computer Fraud and Abuse Act, Pub. L. No. 99-474, codified at 18 U.S.C. §1030, state criminal and civil laws, and may subject violators to criminal, civil, and/or administrative action and penalties. Unauthorized use or actions exceeding authorized use of USPTO systems will be investigated, and, when appropriate, official sanctions will be imposed. All data contained on USPTO computer systems is owned by the USPTO, and may be monitored, intercepted, recorded, read, copied, captured, and disclosed in any manner by authorized personnel. THERE IS NO RIGHT OF PRIVACY IN THIS SYSTEM. System personnel may give to law enforcement officials, for investigation and prosecution, any potential evidence of crime found on USPTO computer systems. USE OF THIS SYSTEM BY ANY USER, AUTHORIZED OR UNAUTHORIZED, CONSTITUTES CONSENT TO THIS MONITORING, INTERCEPTION, RECORDING, READING, COPYING, CAPTURING, AND DISCLOSURE.

The USPTO uses HTTPS protocol and other forms of data encryption when necessary to protect sensitive data such as financial account information.

For website security and to ensure that USPTO Web services remain available to the general public, the USPTO monitors network traffic to identify unauthorized attempts to upload or change information, deny service, otherwise cause damage or access non-public information. Unauthorized attempts to upload information or change information are strictly prohibited and may be punishable under the United States criminal code (18 U.S.C. § 1030). Information regarding possible violations of law may be provided to law enforcement officials.

This information system may contain Controlled Unclassified Information (CUI) that is subject to safeguarding or dissemination controls in accordance with law, regulation, or government-wide policy. Any activity or operation, whether generated automatically or manually, that results in or has the potential to result in denial or decrease of service for other customers may be denied access to USPTO.gov Web resources without notice. If you believe your IP address may have been blocked, you may contact the Webmaster for instructions.

Use of USPTO databases

USPTO’s online databases are not designed or intended to be a source for bulk downloads of USPTO data when accessed through the website’s interfaces. Individuals, companies, IP addresses, or blocks of IP addresses who, in effect, deny or decrease service by generating unusually high numbers of database accesses (searches, pages, or hits), whether generated manually or in an

automated fashion, may be denied access to USPTO servers without notice.

Bulk data products may be separately obtained from the USPTO, either for free or at the cost of dissemination. For details, see information on Electronic Bulk Data Products.

>> Terms of Use Statement for PAIR databases Editorial guidance
Proper citation

It is considered a good practice, both academically and editorially, to properly credit the source of any materials not authored by you. Subject to other terms described on this page, you may cite materials obtained from USPTO.gov websites using any or all of the following:

  1. The United States Patent and Trademark Office
  2. http://www.uspto.gov
  3. [system ID].uspto.gov/[specific Web page address]; for example, etas.uspto.gov/etas/guidelines.jsp

Patent information

Patents are published as part of the terms of granting the patent to the inventor. Subject to limited exceptions reflected in 37 CFR 1.71(d) & (e) and 1.84(s), the text and drawings of a patent are typically not subject to copyright restrictions. The inventors’ rights to exclude others from making, using, offering for sale, or selling the invention throughout the United States or importing the invention into the United States for a limited time is not compromised by the publication of the description of the invention. In other words, the fact that a patent’s description may have been published without copyright restrictions does not give you permission to manufacture or use the invention without permission from the inventor during the active life of the patent. See MPEP § 600 –

608.01(v) regarding the right to include a copyright or mask work notice in patents.

Trademark information

Trademark images are published by the USPTO for public information dissemination purposes in accordance with the law. If you wish to use a trademark obtained from our records, you must do so in accordance with the individual licensing policies of the marks’ owners. The USPTO will not assist in contacting trademark owners or arranging and managing licensing agreements.

CAUTION: There are instances where trademarks may be embedded in patents as part of the drawing, particularly for design patents. There are also instances

where a portion of the text or drawings of a patent may be under copyright. You should consult an attorney regarding these potential trademark and copyright issues. The USPTO will not assist in determining if a potential trademark issue or copyright issue exists for a particular patent.

Enforcement

Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at opensource@github.com. All complaints will be reviewed and investigated and will result in a response that is deemed necessary and appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.

Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project’s leadership.



This site uses Akismet to reduce spam. Learn how your comment data is processed.

Scroll back to top
Menu

NEVER CARRY ON A CARRIONER Dismiss