Grant of license. The material contained in this release is licensed, not sold. Pico Technology Limited ('Pico') grants a license to the person who installs this software, subject to the conditions listed below.
Access. The licensee agrees to allow access to this software only to persons who have been informed of and agree to abide by these conditions.
Usage. The software in this release is for use only with Pico products or with data collected using Pico products.
Mission-critical applications. Because the software runs on a computer that may be running other software products, and may be subject to interference from these other products, this license specifically excludes usage in 'mission-critical' applications, for example life-support systems.
Viruses. This software was continuously monitored for viruses during production. However, the user is responsible for virus checking the software once it is installed.
Upgrades. We provide upgrades, free of charge, from our web site at www.picotech.com. We reserve the right to charge for updates or replacements sent out on physical media.
No two applications are the same, so Pico cannot guarantee that its equipment or software is suitable for a given application. It is therefore your responsibility as the user to ensure that the product is suitable for your application.
Pico Technology Limited does not accept responsibility for any loss or injury caused by the use of Pico Technology equipment or software.
It is essential that you, the user, verify that the software and product are functioning to your requirements before relying on them or the data that they generate.
No software is ever error-free, but if you are dissatisfied with the performance of this software please contact our technical support staff. If we believe that there is a problem with the software, we will try to fix the problem within a reasonable time.
The Pico Technology Network consists of numerous websites including www.picotechnology.com, www.picotechnology.co.uk, www.picotech.com, www.picotech.co.uk, www.picotech.us, www.drdaq.com, www.drdaq.co.uk and www.oscilloscope.co.uk. No warranty of any kind is provided on the information and materials on the Pico Technology websites.
Pico Technology Limited ("Pico Technology") is committed to protecting your privacy.
NOTICE: This policy only applies to the Pico Technology websites and not to the companies, individuals, organisations or other websites to which there are links.
Consent. Your use of our websites signifies your consent to us collecting and using personal information about you as specified below in accordance with this Policy. Should we choose to change our Policy for any reason, the changes will be posted here, so that you are always kept informed of how we collect and use your personal information, and when we may disclose it. Please note that the information you enter may be transferred outside the European Economic Area for the purposes of processing or electronic storage.
How do we collect information about you and how is it used ? We may collect information from you in the following ways:
Cookies. Cookies may be used to improve your viewing experience or personalise your visit to our websites. Cookies are text files that identify your computer to our servers. Cookies in themselves do not identify the individual user, just the computer used. Should you wish to you can change your browser settings so that your browser does not accept cookies.
Traffic data. Pico Technology collects limited data from you as you travel through our websites. This information is used to monitor traffic flows, provide statistics and help us to provide better websites. Pico Technology will not continue to collect data from you once you leave our websites. Any data collected in this manner cannot be used to individually identify you.
Other disclosures. Pico Technology reserves the right to access and disclose individually identifiable information to comply with applicable laws and lawful government requests, to operate its systems properly or to protect itself or its users.
Third parties. Pico Technology does not sell, trade or rent your personal information to others without your consent. We do not store credit card details nor do we share customer details with any third parties.
The information and materials on this website (including without limitation all articles, text, images, logos, software, manuals, help files, and design) are:
Copyright © 1991–2019 Pico Technology Ltd. All rights reserved.
No permission is granted to copy or redistribute the materials on this website for commercial purposes or for compensation of any kind without prior written permission from Pico Technology Ltd. If you have a query about our terms or require information about licensing materials from Pico Technology Ltd, please send an email to firstname.lastname@example.org
Pico Technology, PicoScope, PicoLog, PicoSource, ConnectDetect, HumidiProbe, EnviroMon, DrDAQ, PicoSDK, PicoVNA and PicoConnect are registered trademarks of Pico Technology Ltd.
Pico Technology acknowledges the following product names as trademarks of their respective owners: Keysight VEE, Debian, Delphi, Microsoft Excel, National Instruments LabVIEW, Linux, MacOS, MATLAB, OS X, Red Hat, Ubuntu, Visual Basic, Microsoft Windows.
It is the policy of Pico Technology to respond expeditiously to intellectual property infringement. Pico Technology will promptly process and investigate infringement and will take appropriate actions under all applicable intellectual property laws.
When Pico Technology is running giveaway competitions on social media and in the Newsletter, these Terms & Conditions will cover the competitions; specifying how to enter, eligibility, prize(s), selection method, start and end date plus additional terms.
Phishing is an attempt to extract confidential information by deception through electronic media. It is typically done through email to publicised addresses where a relationship is highly likely or implicit. For example, you might get an email that looks like it’s from a manager or accounts department asking you to engage in conversation or supply information that could be used in order to commit fraud.
Often these messages have a "From:" address or display name set to a legitimate email address or known person that is familiar to you; however, if you look at the header of the message you will see that the "Reply-To:" address is different. The fraudster will have access to this destination email account and may try to engage in further communication.
These messages may contain actions such as requesting confirmation of outstanding payments and changes to bank account details or payments. Ultimately this deception is aimed at obtaining enough information or deceiving you into making changes to allow a criminal to make a fraudulent financial gain.
If you get this type of message, do not provide the information requested or reply to the message without confirming that the email is legitimate.
Please could you forward the message as an attachment to: email@example.com where we will examine the message and reply to confirm the legitimacy of the message. We will use any fraudulent messages (excluding your email address) to update our known attempts and examples page.
If you have responded to any messages that you believe may have been illegitimate, stop any communication immediately with the third party and block or mark the sender's address as spam.