User guide

L I C E N S E A G R E E M E N T
189
4. Technical Support
The Technical Support described in Clause 2.5 of this Agreement is provided to You when the latest Update of the
Software is installed (except for a trial version of the Software).
5. Information Collection
5.1. Having agreed with the terms and conditions of this Agreement You consent to provide information to the
Rightholder about executable files and their checksums to improve Your security protection level.
5.2. In order to improve security awareness about new threats and their sources and in order to improve Your
security protection level the Rightholder, with your consent, that has been explicitly confirmed in the Kaspersky
Security Network Data Collection Statement, is expressly entitled to receives such information. You can
deactivate the Kaspersky Security Network service during installation. Also, You can activate and deactivate the
Kaspersky Security Network service at any time in the Software options page.
You further acknowledge and agree that any information gathered by Rightholder can be used to track and
publish reports on security risk trends in the Rightholder‟s sole and exclusive discretion.
5.3. The Software does not process any personally identifiable data and does not combine the processing data with
any personal information.
5.4. If you do not wish for the information collected by the Software to be sent to the Rightholder, You should not
activate and/or de-activate the Kaspersky Security Network service.
6. Limitations
6.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or
disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a
non-waivable right granted to You by applicable legislation, and you shall not otherwise reduce any party of the
Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor
permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable
law. Neither Software‟s binary code nor source may be used or reverse engineered to re-create the program
algorithm, which is proprietary. All rights not expressly granted herein are reserved by Rightholder and/or its
suppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatic
termination of this Agreement and the License granted hereunder and may result in criminal and/or civil
prosecution against You.
6.2. You shall not transfer the rights to use the Software to any third party except as set forth in Clause 2.4 of this
Agreement.
6.3. You shall not provide the activation code and/or license key file to third parties or allow third parties access to
the activation code and/or license key which are deemed confidential data of Rightholder and you shall exercise
reasonable care in protecting the activation code and/or license key in confidence provided that you can transfer
the activation code and/or license key to third parties as set forth in Clause 2.4 of this Agreement.
6.4. You shall not rent, lease or lend the Software to any third party.
6.5. You shall not use the Software in the creation of data or software used for detection, blocking or treating threats
described in the user manual.
6.6. The Rightholder has the right to block the key file or to terminate Your License to use the Software in the event
You breach any of the terms and conditions of this Agreement and without any refund to You.
6.7. If You are using the trial version of the Software You do not have the right to receive the Technical Support
specified in Clause 4 of this Agreement and You don‟t have the right to transfer the license or the rights to use
the Software to any third party.
7. Limited Warranty and Disclaimer
7.1. The Rightholder guarantees that the Software will substantially perform according to the specifications and
descriptions set forth in the user manual provided however that such limited warranty shall not apply to the
following: (w) Your Computer‟s deficiencies and related infringement for which Rightholder‟s expressly disclaims
any warranty responsibility; (x) malfunctions, defects, or failures resulting from misuse; abuse; accident; neglect;
improper installation, operation or maintenance; theft; vandalism; acts of God; acts of terrorism; power failures