This End User License Agreement for Mobile Device End Users (“Agreement”) is between the Company (defined below, or “We,” “Us,” or “Our”) and the individual end user (“You” or “Your”) who installs, accesses and/or uses the Trellix Mobile Security Software on Your mobile device, and governs Your use of the Software. The Company and You may each be referred to in this Agreement as a “Party” or together as the “Parties.” Capitalized terms used in this Agreement have the meaning assigned to them in Section 16 below, or as defined elsewhere in this Agreement.
By downloading, installing, copying, accessing, or using the Software, You agree to the terms and conditions of this Agreement. If You do not agree to this Agreement, You must not download, install, copy, access or use the Software; and You must delete all copies of the Software without retaining any copies thereof.
If Your use of the Software is allowed under a separate agreement between the Company and Our customer that has licensed Software from Us (“Customer”), such other agreement governs Our relationship with the Customer, and further limits Your use of the Software.
1.1 Subject to Your compliance with the terms and conditions of this Agreement, We grant You a non-exclusive, non- transferable license to (a) install the Software on each compatible mobile device for which We or Our Customer have issued you a valid license (“Authorized Device”), and (b) use the Software on each such Authorized Device, solely for your own personal or internal business use during term of the license that We or Our Customer have issued to You. Your rights under this Agreement will expire at the end of the license term. This license may be suspended or terminated as set forth in this Agreement. You are not granted rights to any Updates or Upgrades.
You shall not, and shall not cause or allow any third-party to:
2.1 decompile, disassemble, or reverse-engineer the Software, or create or recreate the source code for the Software;
2.2 remove, erase, obscure, or tamper with any copyright or any other product identification or proprietary rights notices, seal, or instructional label printed or stamped on, affixed to, or encoded or recorded in or on any Software or Documentation; or fail to preserve all copyright and other proprietary notices in all copies You make of the Software and Documentation;
2.3 lease, lend, or use the Software for timesharing or service bureau purposes;
2.4 sell, market, license, sublicense, distribute or otherwise grant to any person or entity any right to use the Software; or use the Software to provide, alone or in combination with any other product or service, any product or service to any person or entity, whether on a fee basis or otherwise;
2.5 modify, adapt, tamper with, translate or create Derivative Works of the Software or the Documentation; combine or merge any part of the Software or Documentation with or into any other software or documentation; or refer to or otherwise use the Software as part of any effort to develop software (including any routine, script, code, or program) having any functional attributes, visual expressions, or other features similar to those of the Software to compete with Us;
2.6 except with Our prior written permission, publish any performance or benchmark tests or analysis relating to the Software;
2.7 run or operate the Software in a cloud, internet-based computing, or similar on-demand computing environment; or
2.8 attempt to do any of the activities in this Section 2.
You have no right to Technical Support or Maintenance under this Agreement. In cases where Our Customer has granted you rights to use the Software, such Customer may provide technical support or maintenance directly to You. If the Customer has purchased Support from Us related to Your use of the Software, Our Technical Support and Maintenance Terms and Conditions apply.
4.1 You may terminate Your license at any time by uninstalling the Software.
4.2 We may terminate Your license if:
4.3 In cases where Your use of the Software is allowed under a separate agreement between the Company and our Customer, Your license may be terminated under terms of such separate agreement, without notice to you.
4.4 Upon termination or expiration of a subscription license, Your right to use the license (and any applicable services in support thereof) shall automatically terminate with immediate effect. You must promptly return, destroy, or permanently delete all copies of the Software and Documentation.
4.5 End-of-Life. You have no right to receive Support for the Software, including Support following End-of-Sale or End-of-Life of the Software. In cases where Our Customer has granted you rights to use the Software and any Support, Our End-of-Life Policy will limit any such Support.
5. [Intentionally left blank]
6.1 Each Party acknowledges that it may have access to Confidential Information of the other Party in connection with this Agreement, and that each Party’s Confidential Information is of substantial value to the Disclosing Party, which could be impaired if it were improperly disclosed to third parties or used in violation of this Agreement.
6.2 Confidential Information as used in this Agreement means any information (regardless of the form of disclosure or the medium used to store or represent it) of a Party (“Disclosing Party”), including trade secrets and technical, financial, or business information, data, ideas, concepts, or know-how, that:
However, Confidential Information does not include any information that:
6.3 Restrictions. Each Recipient of Confidential Information under this Agreement must:
6.4 Notwithstanding the restrictions in Section 6.3, if the Recipient is required to disclose any of the Disclosing Party’s Confidential Information by law, such as in response to a subpoena or requirement of any regulator, court, arbitral, administrative, or legislative body, the Recipient must:
6.5 You will immediately, and at least within seventy-two (72) hours, notify Us if Confidential Information is used or disclosed in breach of this Agreement. As monetary damages may not be sufficient relief if anyone violates or threaten to violate the terms of this section, We are immediately entitled to enforce Our rights by specific performance or injunction proceedings, in addition to any other rights or remedies We may have.
6.6 Upon the Disclosing Party’s request and upon termination of this Agreement (unless agreed otherwise by the Parties at the time), each Party will return, destroy, or delete permanently (at the Disclosing Party’s election) the other Party’s Confidential Information.
6.7 On termination of this Agreement, the Recipient must continue to keep the Disclosing Party’s Confidential Information confidential for five (5) years in accordance with this Section 6.
7.1 The Software is considered Our Confidential Information, and We (or Our licensors) own exclusively and reserve all rights, title, and interest in and to the Software and Documentation, including all Intellectual Property Rights therein, as well as any Derivative Works.
7.2 You may not exercise any right, title, and interest in and to the Software or Documentation, or any related Intellectual Property Rights, except for the limited usage rights granted to You in this Agreement. You agree that You will take no action inconsistent with Our Intellectual Property Rights.
7.3 This Agreement is not an agreement of sale, and does not transfer any title, Intellectual Property Rights or ownership rights to Software or Documentation to You. All Software is licensed to You and is not sold. You acknowledge and agree that the Software, Documentation and all ideas, methods, algorithms, formula, processes and concepts used in developing or incorporated into Software or Documentation, all future Updates and Upgrades, and all other improvements, revisions, corrections, bug-fixes, hot- fixes, patches, modifications, enhancements, releases, DATs, signature sets, upgrades, and policy and database updates and other updates in, of, or to Software or Documentation, as applicable, all Derivative Works based on any of the foregoing, and all copies of the foregoing are Our trade secrets and proprietary property, having great commercial value to Us.
8.1 We warrant that, for a period of ninety (90) days from the purchase date (the “Warranty Period”), the Software licensed under this Agreement will perform substantially in accordance with the Documentation.
8.2 Exclusive Remedy. If the Software does not operate as warranted, at Our option and expense, We shall repair or replace the Software or refund You the price paid for the Software if a repair or replacement of the Software would, in Our opinion, be unreasonable. This limited warranty is conditioned upon You providing Us prompt written notice of the Software’s failure to perform substantially in accordance with the Documentation. Any replacement Software will substantially conform to the accompanying Documentation and be warranted for the remainder of the original Warranty Period. The remedy set forth in this Section 8.2 is Your exclusive remedy.
8.3 Exclusions. Sections 8.1 and 8.2 do not apply if:
Additionally, the Software may contain independent third-party software to perform certain functionality, including malware definitions or URL filters and algorithms. We make no warranty as to the operation of any third-party software or the accuracy of any third-party information.
8.4 DISCLAIMER OF WARRANTIES. EXCEPT AS SPECIFIED IN THIS SECTION 8, AND TO THE EXTENT PERMITTED BY LAW, WE PROVIDE THE SOFTWARE “AS IS”, AND MAKE NO OTHER REPRESENTATIONS OR WARRANTIES OF ANY KIND REGARDING THE SOFTWARE, AND EXPRESSLY DISCLAIM ALL OTHER OBLIGATIONS AND LIABILITIES AND EXPRESS OR IMPLIED WARRANTIES REGARDING THE SOFTWARE, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTY OF MERCHANTABILITY, QUALITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, OR MEETING ANY REQUIREMENTS OR USAGE OF TRADE, NON-INFRINGEMENT, OR SYSTEMS INTEGRATION. WE MAKE NO WARRANTY, REPRESENTATION OR GUARANTEE AS TO THE SOFTWARE’S USE OR PERFORMANCE, OR THAT THE OPERATION OF THE SOFTWARE WILL BE FAIL-SAFE, UNINTERRUPTED OR FREE FROM ERRORS OR DEFECTS, OR THAT THE SOFTWARE WILL PROTECT AGAINST ALL POSSIBLE THREATS.
8.5 HIGH-RISK SYSTEMS TERMS. THE SOFTWARE MAY FAIL AND IS NOT DESIGNED, DEVELOPED, TESTED, OR INTENDED TO BE RELIABLE IN THE CONTEXT OF HIGH-RISK SYSTEMS. WE HAVE NO RESPONSIBILITY FOR, AND YOU WILL INDEMNIFY AND HOLD US HARMLESS FROM, ALL CLAIMS, SUITS, DEMANDS AND PROCEEDINGS ALLEGING, CLAIMING, SEEKING, OR ASSERTING ANY LIABILITY, LOSS, OBLIGATION, RISK, COST, DAMAGE, AWARD, PENALTY, SETTLEMENT, JUDGMENT, FINE OR EXPENSES (INCLUDING ATTORNEY FEES) ARISING FROM OR IN CONNECTION WITH YOUR USE OF THE SOFTWARE ON OR IN A HIGH-RISK SYSTEM, INCLUDING THOSE THAT COULD HAVE BEEN PREVENTED BY DEPLOYMENT OF FAIL-SAFE OR FAULT TOLERANT FEATURES TO THE HIGH-RISK SYSTEM, OR ARE BASED ON A CLAIM, ALLEGATION, OR ASSERTION THAT THE FUNCTIONING OF HIGH-RISK SYSTEM DEPENDS OR DEPENDED ON THE FUNCTIONING OF THE SOFTWARE, OR THAT THE FAILURE OF THE SOFTWARE CAUSED A HIGH-RISK SYSTEM TO FAIL.
9. [Intentionally left blank]
10.1 EACH PARTY'S ENTIRE AGGREGATE LIABILITY TO THE OTHER PARTY FOR CLAIMS UNDER OR RELATED TO THE SUBJECT-MATTER OF THIS AGREEMENT WILL NOT EXCEED THE TOTAL FEES RECEIVED BY US FOR THE APPLICABLE SOFTWARE AND SUPPORT PURCHASED UNDER THE TERMS OF THIS AGREEMENT AND ATTRIBUTABLE TO THE TWELVE (12) MONTH PERIOD IMMEDIATELY PRECEDING THE FIRST EVENT GIVING RISE TO SUCH LIABILITY.
10.2 NEITHER PARTY WILL BE LIABLE FOR ANY INDIRECT, EXEMPLARY, SPECIAL OR CONSEQUENTIAL DAMAGES, LOSS OR CORRUPTION OF DATA OR INTERRUPTION OR LOSS OF BUSINESS, LOSS OF REVENUES, LOST PROFITS, GOODWILL OR ANTICIPATED SALES OR SAVINGS, EVEN IF THE DAMAGES WERE FORESEEABLE OR A PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF THOSE DAMAGES.
10.3 THESE LIMITATIONS OF LIABILITY DO NOT APPLY TO LIABILITY ARISING FROM (A) YOUR FAILURE TO PAY ALL AMOUNTS DUE, OR (B) YOUR BREACH OF SECTIONS 2 (USAGE RIGHTS), 6 (CONFIDENTIALITY) 7 (INTELLECTUAL PROPERTY RIGHTS) OR 14.2 AND 14.3 (COMPLIANCE WITH LAWS). THESE LIMITATIONS OF LIABILITY APPLY WHETHER SUCH CLAIMS ARISE UNDER CONTRACT, TORT (INCLUDING NEGLIGENCE), EQUITY, INFRINGEMENT, STATUTE OR OTHERWISE. NOTHING IN THIS AGREEMENT LIMITS OR EXCLUDES ANY LIABILITY THAT CANNOT BE LIMITED OR EXCLUDED UNDER APPLICABLE LAW. ALL THESE LIMITATIONS OF LIABILITY ARE CUMULATIVE AND NOT PER INCIDENT.
11.1 Your Indemnification Obligations. You shall indemnify and defend Us, Our Affiliates, and Our officers, directors, employees, contractors, and agents (each an “Indemnified Party”) against any claims, liabilities, and expenses (including court costs and reasonable attorney fees) that an Indemnified Party incurs as a result of, or in connection with:
11.3 Indemnification Procedure. The indemnified party (“Indemnitee”) will: (a) provide prompt written notice to the indemnifying party (“Indemnitor”) of the claim (provided that the failure to provide timely notice that prejudices the Indemnitor will relieve the Indemnitor of its obligations under this section to the extent the Indemnitor has been prejudiced and the failure to provide timely notice will relieve the Indemnitor of any obligation to reimburse the Indemnitee for its attorney’s fees incurred prior to notification); (b) reasonably cooperate in connection with the defense or settlement of the claim; and (c) give the Indemnitor sole control over the defense and settlement of the claim, provided that any settlement of a claim will not include a specific performance obligation or admission of liability by the Indemnitee.
11.4 Personal and Exclusive Remedy. The foregoing indemnities are personal to the Parties and may not be transferred. THIS SECTION 11 STATES EACH PARTY’S ENTIRE INDEMNIFICATION OBLIGATIONS, AND THE EXCLUSIVE REMEDY REGARDING THIRD-PARTY CLAIMS.
12.1 Evaluation, Beta and Malware Software. If We identify the Software licensed to You as Evaluation, Beta or Malware Software (collectively, “Evaluation Software”), this Section 12.1, Sections 12.2 and 12.3 shall apply and supersede any conflicting terms in this Agreement. Your royalty-free, non- transferable, limited license to use any Evaluation Software is for Your internal evaluation purposes only, and is limited to thirty (30) days, unless agreed otherwise in writing by Us. Evaluation Software may contain errors or other problems that could cause system or other failures and data loss. You have a limited license to use information You receive from Evaluation Software solely for Your internal evaluation purposes and You must not provide that information to any third parties without Our prior written consent. The General Restrictions in Section 2.6 above apply. If You fail to destroy Evaluation Software after the evaluation period has expired, We may, at Our discretion, invoice You in an amount equal to the then-current list price for the Software (excluding Beta Software) and You agree to pay such invoice upon receipt. Support is not available for Evaluation Software. For Beta Software, we have no obligation to You to further develop or publicly release any Beta Software.
12.2 Feedback. We welcome any comments, suggestions for improvements, and feedback regarding Our Software (including Evaluation Software), Products and Services (“Feedback”). You hereby agree that We own all right, title, and interest in and to the Feedback, including any and all associated Intellectual Property Rights, and that We may use, copy, modify, create Derivative Works based upon, and otherwise exploit the Feedback for any purpose, without notice or attribution to, payment to or consent from You, and You acknowledge that such Feedback will be solely Our Confidential Information.
12.3 Disclaimer of Warranties. Our indemnification obligations in Section 11 above do not apply to Evaluation, Beta or Malware Software. Evaluation, Beta, and Malware Software are provided to You solely on an “AS IS” basis; You assume all risk of use of such Software. Your access to, and use of any Evaluation, Beta and Malware Software is strictly limited for Your internal use and evaluation purposes, and shall not be subject to resale, distribution or for any other use or purposes whatsoever. If the laws in Your jurisdiction do not allow the exclusion of express or implied warranties, the disclaimer in this section may not apply and the express or implied warranties will be limited in duration to any minimum period required by applicable law, and Our aggregate liability and that of Our licensors will be limited to the sum of fifty (50) United States dollars (or the then current value in the relevant local currency) in total.
12.4 “Free” or Open-Source Software. The Software may include components (including programs, applications, tools, utilities, libraries, and other programming code) that are made available from third parties under a free or open-source software licensing model (FOSS Code). FOSS Code components included with the Software are redistributed by Us under the terms of the applicable FOSS Code license for such components. Your receipt of FOSS Code components from Us under this Agreement neither enlarges nor curtails Your rights or obligations defined by the FOSS Code license applicable to the FOSS Code component. Copies of the FOSS Code licenses for FOSS Code components included with Software are included with or referenced in the Software’s Documentation.
13.1 The Software or Support may employ applications and tools to collect Data. Our collection of Data may be necessary to provide You and End Users with the relevant Software or Support functionalities as ordered (including detecting and reporting threats and vulnerabilities on Your and End Users’ computer network), to enable Us to improve Software or Support (including content synchronization, device tracking, troubleshooting, etc.), to manage licenses to Software or Support, and to further or improve overall security. You may be required to uninstall the Software or disable Support to stop further Data collection that supports these functions.
13.2 In connection with your use of the Software, Support, Product, or Cloud Services, You and Your End Users agree to Our Privacy Policy and to the collection, processing, copying, backup, storage, transfer and use of the Data by Us and Our service providers, in, from and to the United States, Europe, or other countries or jurisdictions potentially outside of Your or End Users’ own jurisdiction as part of the Software, Support or service subscription. In addition, unless a separate data processing agreement (or similar agreement) has been executed between the parties, Your use of the Software or Support shall be deemed to be Your agreement to the Data Processing Agreement.
13.3 You grant Us a non-exclusive, irrevocable, worldwide, perpetual right and license to use, reproduce and disclose Threat Data for our business purposes including provisioning and improvement of Products and Services, and for threat identification and research purposes (e.g., to enhance the understanding of Malware, threats, and vulnerabilities). This includes without limitation compiling statistical and performance information and making such anonymized information publicly available.
13.4 You grant us all privacy-related rights and permissions as may be required by regulation, statute, or other law to disclose Your Data, to use the Software, and/or in connection with Our performance of Support or otherwise under this Agreement.
14.1 Each Party will comply with the applicable national, state, and local laws with respect to its rights and obligations under this Agreement, including applicable privacy and export control laws and regulations, and the U.S. Foreign Corrupt Practices Act (FCPA), and other applicable anti-bribery and anti-corruption laws.
14.2 You will not, directly or indirectly, export, transmit, permit access or use any of the Software or technical data (or any part of Software or technical data) or system or service incorporating any of the Software to or in any country to which export, transmission or access is restricted by regulation, statute or other law, without the authorization, if required, of the Bureau of Industry and Security of the U.S. Department of Commerce or any other competent governmental entity that may have jurisdiction over export or transmission. You will not use, transfer, or access any Software for end use relating to any nuclear, chemical, or biological weapons, or missile technology unless authorized by the U.S. Government by regulation or specific license.
14.3 You acknowledge and agree that certain Software containing encryption may require authorization from the U.S. Government and other competent authorities including the European Union, prior to export. You also acknowledge and agree that certain Software containing encryption may be subject to import or use restrictions in other countries. Additional information regarding exporting and importing Software may be found on Our Export Compliance webpage.
15.1 Relationship. The Parties are independent contractors under this Agreement and expressly disclaim any partnership, franchise, joint venture, agency, employer/employee, fiduciary, or other special relationship. Neither Party intends this Agreement to benefit or create any right or cause of action in or on behalf of, any person or entity other than the Parties and listed Affiliates. This Agreement is not intended to create a third-party beneficiary of any kind.
15.2 Severability. If a court holds that any provision of this Agreement is invalid or unenforceable under applicable law, the court will modify the provision to the minimum extent necessary to make it valid and enforceable or, if it cannot be made valid and enforceable, the court will sever and delete the provision from this Agreement. The change will affect neither the validity of the amended provision nor the validity of any other provision of this Agreement, which will continue in full force and effect.
15.3 No Waiver. A Party’s failure or delay in enforcing any provision of this Agreement will not operate as a waiver of the right to enforce that provision or any other provision of this Agreement at any time. A waiver of any provision of this Agreement must be in writing, specify the provision to be waived and signed by the Party agreeing to the waiver.
15.4 Force Majeure; Other Excusable Failures Or Delays In Performance
15.5 Governing Law and Venue. All disputes arising out of or relating to this Agreement, or its subject matter will be governed by the substantive laws of Ireland, excluding rules relating to conflict of laws. The United Nations Convention on Contracts for the International Sale of Goods and the Uniform Computer Information Transactions Act do not apply to this Agreement.
The courts of Ireland shall have exclusive jurisdiction to hear any dispute arising out of, or related to, this Agreement. Each Party agrees to the exclusive jurisdiction of such courts. Notwithstanding the foregoing, either Party may seek interim injunctive relief in any court of applicable jurisdiction with respect to any alleged breach of Intellectual Property Rights or the confidentiality terms herein.
15.6 Entire Agreement, Order Of Precedence And Amendments
This Agreement constitutes the entire understanding between the Parties relating to its subject-matter and supersedes all prior or contemporaneous oral or written communications between the Parties relating to its subject-matter.
15.7 Notices. Notices and consents required or permitted to be given under this Agreement must be in writing. Notices will be considered delivered upon the earliest of (a) when received, (b) the next business day after being sent to a domestic address by pre-paid, nationally recognized, overnight air courier with tracking capabilities, or (c) 5 business days after being sent by registered or certified airmail, domestically or internationally, return receipt required, postage prepaid. Notices to Us shall be made to the applicable address for Us provided in the “Definitions” Section16 below. Notices to You shall be made to Your designated point of contact and address, as provided to Us in connection with this Agreement.
15.8 Assignment. You may not sublicense, assign, or transfer Your rights under this Agreement without Our prior written consent. Any attempt by You to sublicense, assign, or transfer any of Your rights, duties, or obligations under this Agreement, whether directly, or indirectly by merger, acquisition or change of control, will be null and void.
15.9 Notice to U.S. Government End Users. The Software and accompanying Documentation are considered “commercial computer software” and “commercial computer software documentation,” respectively, pursuant to DFAR Section 227.7202 and FAR Section 12.212, as applicable. Any use, modification, reproduction, release, performance, display, or disclosure of the Software and accompanying Documentation by the United States Government will be governed solely by this Agreement and will be prohibited except to the extent expressly permitted by this Agreement.
15.10 Survival. The following sections, together with any other terms necessary for the interpretation or enforcement of this Agreement, will survive termination of this Agreement: 6 (Confidentiality), 7 (Intellectual Property Rights), 8 (Limited Software Warranty and Disclaimer), 9 (Limited Hardware Warranty), 10 (Limitation of Liability), 11 (Indemnification), 12.3 (Disclaimer of Warranties regarding Evaluation Software and Beta Software), 13 (Data), 15.5 (Governing Law and Venue), this Section 15.10 (Survival), and 16 (Definitions).
15.11 Third-Party Software Licenses. Use of Our Products or some features thereof may require that You have licenses for third-party software that has or has not been distributed with Our Products; in either case, You are responsible for purchasing such third-party software licenses.
Capitalized terms used in this Agreement have the following meanings:
Authorized Partner means any of Our Affiliates, Distributors, Resellers, or other business partners.
Affiliate(s) as used herein, means any entity that Controls, is Controlled by, is under common Control with a Party, or is Controlled by the same parent entity as a Party, where “Control” or “Controlled” means direct or indirect ownership, through one or more intermediaries of greater than 50% of an entity’s voting capital or other voting rights.
Beta Software means pre-general release of Software that We make available to customers for evaluation and Feedback.
Business Day means any day other than a Saturday, Sunday, statutory or public holiday in the place where Our Software is provided.
Company or We, Our, Us means:
Musarubra US LLC, with offices located at 6000 Headquarters Drive, Suite 600, Plano, Texas 75024, USA, (1) if the Software license is purchased in the United States, Canada, Mexico, Central America, South America, or the Caribbean, or (2) solely as the licensor of the Software if the Software license is purchased in Japan or in Asia Pacific (but excluding Australia and China (in RMB));
Musarubra Australia Pty Ltd., with offices at Level 19, 181 William Street, Melbourne, Vic 3000, Australia, if the Software license is purchased in Australia;
Musarubra Ireland Limited, with its office at Building 2000, City Gate, Mahon, Cork, Ireland, if the Software license is purchased in Europe, the Middle East or Africa;
Musarubra Japan KK, with its registered office at Shibuya Mark City West, 1-12- 1 Dogenzaka, Shibuya-ku, Tokyo 150-0043, Japan, with respect to the distribution of the Software license purchased in Japan;
Musarubra Singapore Pte Ltd., with a trading address at 238A Thomson Road, #12-01/05 Novena Square, Tower A, Singapore, 307684, with respect to the distribution of Software license purchased in Asia Pacific (but excluding China (in RMB) or Australia);
Trellix (Beijing) Security Software Co. Ltd, with a trading address at Regus, No. 19 Dongfangdong Orad, Tower D1, DRC Diplomatic Office Building, Chaoyang Distrivt, Beijing, China 100016, if the Software license is purchased in China (RMB); or
Trellix Public Sector LLC, with offices at 1640 Boro Place, 3rd Floor, McLean, Virginia 22102, USA, if the Software license is purchased by the U.S. Government, or state or local governments, government healthcare organizations or educational institutions within the United States.
Covered Country means any country that is a member of the Berne Convention where the Company (as defined in this Section 16) is incorporated.
Data means Personal Data, sensitive data or other information about You and End Users (including End Users’ name, address, e-mail address and payment details), their computers, files stored on their computers, or their computers’ interactions with other computers (including information regarding network, licenses used, hardware type, model, hard disk size, CPU type, disk type, RAM size, 32 or 64 bit architecture, operating system types, versions, locale, BIOS version, BIOS model, total scanners deployed, database size, system telemetry, device ID, IP address, location, content, Software installed, Our components, processes and services information, frequency and details of update of Our components, information about third-party products installed, extracts of logs created by Us, usage patterns of Software and specific features, etc.).
Data Processing Agreement means Our Customer Data Processing Agreement.
DATs means detection definition files (also referred to as signature files) that contain the codes anti-malware software uses to detect and repair viruses, Trojan horses, and potentially unwanted programs.
Derivative Work means a work that is based on one or more preexisting works (such as a revision, translation, dramatization, motion picture version, abridgment, condensation, enhancement, modification, or any other form in which preexisting work may be recast, transformed, or adapted) which, if created without the authorization of the copyright owner of the preexisting work, would constitute copyright infringement.
Documentation means any explanatory materials, such as user manuals, training materials, product descriptions, regarding the implementation and use of the Software that We make available to You. Documentation is provided in printed, electronic, or online form.
Distributor means any independent entity authorized by Us to distribute the Software and Support to Resellers or End Users.
End-of-Life Policy means Our end-of-life policies:
Skyhigh Security End-of-Life Document
End User means the end user customer organization which is licensed and authorized to use the Software under this Agreement.
Export Compliance webpage means Our Export Compliance webpage
Feedback means any suggestion, or idea for modifying or improving any of Our Products or Services, including without limitation, all intellectual property rights in any such suggestion or idea.
Force Majeure Event means any event beyond a Party’s reasonable control that, by its nature, could not have been foreseen or, if it could have been foreseen, was unavoidable, including strikes, lock-outs or other industrial disputes (whether involving its own workforce or a third parties), acts of God, war, riot, embargoes, acts of civil or military authorities, acts of terrorism or sabotage, shortage of supply or delay in delivery by Our vendors, fire, flood, earthquake, accident, radiation, inability to secure transportation, failure of communications or energy sources, malicious damage, breakdown of plant or machinery, or default of suppliers or subcontractors.
Grant Letter means any written (electronic or otherwise) confirmation notice that We issue to our Customer confirming the Software license(s) purchased and applicable Product Entitlement Definitions. The Grant Letter identifies the SKU number, quantity, Subscription Period or Support Period, and other access and use details.
Hardware means hardware equipment (together with all parts, elements, or accessories, and any combination of them) purchased during the Term from Us or an Authorized Partner, and identified in an applicable Grant Letter, excluding any Software or other intangible items (whether or not pre-loaded on hardware or subsequently loaded on hardware by You, Us, or any other person or entity).
High-Risk System means a device or system that requires extra safety functionalities such as fail-safe or fault-tolerant performance features to maintain a safe state where it is reasonably foreseeable that failure of the device or system could lead directly to death, personal injury, or catastrophic property damage. A device or system with a fail-safe feature in the event of failure may revert to a safe condition rather than break down, may include a secondary system that comes into operation to prevent a malfunction, or may operate as a backup in the event of a malfunction. A device or system with a fault-tolerant feature in the event of failure may continue its intended operation, possibly at a reduced level, rather than failing completely. Without limitation, High-Risk Systems may be required in critical infrastructure, industrial plants, manufacturing facilities, direct life support devices, aircraft, train, boat or vehicle navigation or communication systems, air traffic control, weapons systems, nuclear facilities, power plants, medical systems and facilities, and transportation facilities.
Intellectual Property Rights means all intellectual property or other proprietary rights throughout the world, whether existing under statute, at common law or in equity, now existing or created in the future, including:
Malware means applications, executable code, or malicious content that We consider be harmful.
Malware Software or Malware means harmful software code, including, but not limited to, live computer viruses, Trojan horses, and worms, that can invade and/or corrupt a computer system.
Open-Source Software means any royalty-free software that requires, as a condition of use, modification or distribution of the software or any other software incorporated into, derived from, or distributed with the software (“Derivative Software”), any of the following:
The source code of the software or any Derivative Software must be released or otherwise made available to third parties;
Permission for creating derivative works of the software or any Derivative Software must be granted to third parties; and
Changes made to the software must be documented and disclosed when the software or any Derivative Software is being distributed.
Open-Source Software includes any software that is subject to: the GNU General Public License, GNU Library General Public License, Artistic License, BSD license, Mozilla Public License, Affero GNU General Public Licenses, or any license listed on www.opensource.org/licenses.
Personal Data or Personal Information means any information relating to an identified or identifiable individual or is otherwise defined as ‘Personal Data’ under the General Data Protection Regulation or other applicable data protection laws. to the extent that the definition of ‘Personal Data’ under the applicable data protection laws is broader than the preceding definitions.
Privacy Policy means Our published privacy policy.
Product means Trellix-branded and Skyhigh Security-branded Software and/or Hardware.
Product Entitlement Definitions means the license or subscription types set forth in the Grant Letter and which are defined in the document entitled “Product Entitlement Definitions” or in the Supplement posted on the Trellix Legal Notices website.
Representatives means a Party’s Affiliates, permitted resellers, subcontractors, or authorized agents.
Reseller means an Authorized Partner who is authorized by Us to market and resell Software licenses and Support.
Software means the software program owned or licensed by Us related to Trellix Mobile Security, in object code format and applicable Documentation, which is licensed from Us and purchased directly from Us or Our Authorized Partners. Software may also include additional features or functionality that can be accessed with either a subscription or Support agreement to certain cloud Services as required by the specific offering and subject to the Cloud Services Agreement.
Supplement means the Supplement terms posted on the Trellix Legal Notices website that pertain to specific Products identified in each Supplement.
Support or Technical Support means the services that We (or an Authorized Partner) provide for the support and maintenance of the Software, as specified in the Technical Support and Maintenance Terms and Conditions. You can receive proactive Support notification by subscribing to Our Support Notification Service (SNS)
Support Period means the period for which the End User may receive Support, as specified in a Grant Letter.
Technical Support and Maintenance Terms and Conditions means Our Technical Support and Maintenance for Hardware and Software terms and conditions, available on the Trellix Legal Notices website.
Threat Data means non-personally identifying and non-Customer identifying information about Malware, threats, actual or attempted security events, including but not limited to their frequency, source, associated code, general identifiers, attacked sectors and geographies.
Trellix Legal Notices website means the Legal Notices web page.
Updates means any update to the content of the Software or cloud Services, and includes all DATs, signature sets, policy updates, database updates for the Software or cloud Services, and updates to the related Documentation that are made generally available to End Users after the date of purchase of the Software or of subscription of the cloud Services as a part of purchased Support. Updates are not separately priced or marketed by Us.
Upgrade means all improvements in the Software or cloud Services that are generally made available to End Users as a part of purchased Support. Upgrades are not separately priced or marketed by Us.
Rev. Dec 2024