F-SECURE® LICENSE TERMS
IMPORTANT – BEFORE INSTALLING OR USING THE SOFTWARE, CAREFULLY READ THE FOLLOWING LEGAL TERMS (”TERMS”) FOR THE LICENSE OF F-SECURE SOFTWARE. BY SELECTING THE ACCEPTING OPTION BELOW, OR BY INSTALLING, COPYING OR USING THE ACCOMPANYING SOFTWARE YOU (EITHER AN INDIVIDUAL OR A SINGLE ENTITY) AGREE THAT YOU HAVE READ THESE TERMS, UNDERSTAND THEM AND AGREE TO BE LEGALLY BOUNDBY THEM. IF YOU DO NOT AGREE TO ALL OF THE TERMS, SELECT THE REJECTING OPTION AND DO NOT INSTALL, USE OR COPY THE SOFTWARE. These Terms cover any and all F-Secure programs licensed by you, including related documentation and any update and upgrade of the programs delivered to you under the purchased license or any related service agreement as defined in the documentation and any copy of theseitems (together the "Software").
Subject to the payment of the applicable license fees and subject to the following terms and conditions, you have been granted a nonexclusive, non-transferable right to use the specified Software. F-Secure reserves any and all rights not expressly granted to you. You may: A) Install and use the Software only on as many units (typically handhelddevices, personal computers, servers or other hardware) as stated in the F-Secure License Certificate, applicable invoice, product packaging or agreement where these Terms have been appended. If the Software and/or its services are shared through a network or the Software is used to protect traffic from viruses or other malicious code at web and e-mail servers, firewalls or gateways, you must havea license for either scanning capacity or for the total number of users whom the Software provides services to. In such cases you may install the Software on as many units as needed. B) Create copies of the Software for installation and backup purposes only. C) Extend the number of licenses by purchasing additional licenses. You may not: A) Install and use the Software against these Terms, theF-Secure License Certificate or other related documentation. B) Distribute copies of the Software to a third party, electronically transfer the Software to a computer belonging to a third party, or permit a third party to copy the Software. C) Modify, adapt, translate, rent, lease, resell, distribute or create derivative works based upon the Software and/or related files (including but not limited tovirus definition databases, security news and descriptions) or any part thereof. D) Decompile, reverse engineer, disassemble, or otherwise reduce the Software and/or related files (including but not limited to virus definition databases, security news and descriptions) to any human-perceivable form (except to the limited extent permitted under mandatory copyright legislation) as the Softwarecontains or may contain trade secrets of F-Secure. E) Use the documentation for any purpose other than to support your use of the Software. F) Disclose the license authorization code provided for the program installation (included but not limited to key code, subscription number and registration key) to any third party. G) Use the Software or any portion thereof to implement any product or service tooperate on or in connection with the Software for any other purpose than granted herein. H) Use the Software to publish, distribute and/or obtain software or content (i) not specifically related to F-Secure products and/or services and (ii) not security-related (or any updates to any such software or content). Please contact F-Secure directly if you are interested in any other rights to theSoftware other than those granted in these Terms.
An Evaluation License is applicable when you download or install an evaluation version of the Software or you are granted a time limited, non-exclusive and non-transferable license by F-Secure or its resellers for evaluation purposes. The Software is licensed to you for the sole purpose of evaluating the Software and only for a...
Ler documento completo
Por favor, assinar para o acesso.