Adobe Terms of Use
Terms of use for Adobe
Licenses
Personal licenses Each license must be assigned to a specific person.
A separate license is required for each person.
Persons who have been assigned a license can then use the software on different devices. Shared device licenses Each license is assigned to a specific device and can be used on this device by different people.
A separate license is required for each device.
To use shared device licenses, it is also necessary to log in to the software with a personal Adobe user account.
Regulations and information from the manufacturer
Adobe’s offer is subject to the provisions of the Adobe Enterprise Term License Agreement, Adobe’s General Terms of Use and product-specific requirements. The most important provisions are published by Adobe.
Supplementary regulations
Supplementary regulations are made for the information processing systems of Coburg University of Applied Sciences:
- The software is to be used exclusively for official purposes or for official projects.
- Users must keep a continuous record of every use of Adobe Stock images.
In addition, irrespective of any legal obligation, the source of the use must always be indicated.
After the end of the contract, works with Adobe Stock images may no longer be used, in particular they may not be reproduced. - The processing of sensitive personal data (such as health data) in the context of on-demand services other than for Adobe Sign and Document Cloud is not permitted, nor is the use of the service in Russia or China.
- Individual services may also be subject to Adobe’s privacy policy: https://www.adobe.com/de/privacy/policy.html
- Users must be responsible for backing up and archiving their data.
- The primary purpose is to store your own content, knowledge collections or content received in exchange via the Adobe Cloud solution.
- In general, the following applies: Unpublished personal data of persons who do not use Adobe Cloud solutions (case 1) may not be transferred unencrypted to the service’s storage offering, nor may data that is subject to special confidentiality (case 2).
- Examples of case 1 include attendance lists or lists of participants at an event, while case 2 includes sick notes and research contracts with confidentiality.
- If data is stored in encrypted form, the key must comply with the password requirements of the institution’s user regulations or be equally secure.
The encryption method used must comply with the technical guideline BSI TR-02102-1 of the Federal Office for Information Security.
- Insofar as the application processes personal data of third parties, the data protection regulations must be complied with and the fulfillment of information obligations must be ensured.
- Social data and personnel file data may not be processed with the on-demand services.