User's Instructions

3M Confidential
3. Permitted Use and License
3.1. 3M hereby grants to User a worldwide, limited, non-exclusive, and non-transferable license to access and
use the Software in accordance with this Agreement. The Software is only licensed for use with specified Licensor-
supplied systems for the Software and, if applicable, in accordance with any authentication credentials provided by
3M to the User. User agrees not to use, or permit others to use the Software for any purposes beyond the scope of
this Agreement. Without limiting the foregoing, User shall not, nor permit others to: (a) resell, sublicense, lease, time-
share or otherwise make the Software available to any third party, including but not limited to for third-party training,
commercial time-sharing, application service provider or service bureau use; (b) transfer or copy the Software or any
component (i.e., functional software) thereof; (c) modify, adapt or make derivative works of the Software, or reverse
engineer the Software (provided that the foregoing shall not be construed to prohibit User from configuring the
Software to the extent permitted by the Software’s standard user interface); (d) remove, obscure, or alter 3M’s
proprietary notices, trademarks, or other proprietary rights notices embodied on or contained in the Software or the
documentation; (e) use the Software in contravention of any federal, state, local, foreign or other applicable law, or
rules or regulations of regulatory or administrative organizations; (f) introduce into the Software any virus or other
code or routine intended to disrupt or damage the Software or its content, or collect information about the Software;
(g) use the Software to send or store infringing or unlawful material; (h) access the Software for the purpose of
building, or assisting others to build, a competitive product or service or copying its features, content or user
interface, including without limitation by screen scraping; (i) access or use the Software by means of any interfacing
program, script, automated program, electronic agent or bot” or; (j) use the Software with any article of personal
protective equipment that is not approved or otherwise authorized for use with the Software by 3M.
3.2. Unless expressly provided herein, 3M retains all rights to all intellectual property embodied in or related to
the products and services hereunder, including the Software, except that User Data is owned by User and User grants
3M certain rights to use User Data as described in Section 9 and as otherwise specified in this Agreement. No
ownership rights in any intellectual property are transferred to User under this Agreement. User disclaims and waives
all right, title, and interest in the Software other than the license rights expressly set forth herein. To the extent that
User is ever deemed to have any right, title, or interest in the Software, or in any modification or derivative work
thereof, User agrees to assign, and hereby assigns the same to 3M in accordance with their respective ownership
interests, as determined by 3M. User shall not sublicense, rent, copy, modify, create derivative works of, reverse
engineer, decompile, disassemble or otherwise attempt to gain access to the source code for the Software, or work
with any individual or company that seeks to do any such activity.
3.3. Portions of the Software may incorporate open source software. By using the Software, User agrees to be
bound to the terms of any third-party licenses for open source software that is included in the Software.
4. Credentials
4.1. 3M may issue unique User IDs and Passwords to enable Authorized Users to use the Software. Each User ID
and Password combination is unique, confidential, and intended for use only by a single Authorized User to whom it
is assigned. User may modify the Authorized Users from time to time to substitute or delete Authorized Users by
using the functionality built into the Software if available. Authorized Users shall safeguard User ID and Password
information relating to the Software, and User bears all risk from improper access due to failures of such
safeguarding. User is responsible for all activities conducted under the accounts of its Authorized Users and for its
Authorized Users’ compliance with this Agreement. User shall be responsible for any and all use of the Software that
is made through use of such User IDs and Passwords.
4.2. If User has Administrator Privileges and creates additional Authorized Users, then User assumes all
responsibilities and liabilities for activities performed for the Software by those additional Authorized Users.
Administrator Privileges for purposes of this section are (i) granted by 3M to User through a unique combination of
User ID and Password and (ii) enable User to generate additional unique User IDs and Passwords for Authorized Users
to access and use the Software.
5. Support