Kaspersky endpoint security для бизнеса лицензионное соглашение

Agreements, End User License Agreements, and Kaspersky Security Network Statements for software solutions and security applications available on Kaspersky Business Hub

Kaspersky Endpoint Security END USER LICENSE AGREEMENT («LICENSE AGREEMENT»)
 
IMPORTANT LEGAL NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFORE YOU START USING THE SOFTWARE.
 
CLICKING THE BUTTON INDICATING YOUR ACCEPTANCE IN THE WINDOW CONTAINING THE LICENSE AGREEMENT, OR BY ENTERING CORRESPONDING SYMBOL(-S), YOU CONFIRM IN A LEGALLY BINDING WAY THAT YOU AS THE ORGANIZATION FOR WHICH THE SOFTWARE IS DOWNLOADED OR ACQUIRED HAVE AUTHORIZED THE NATURAL PERSON ACCEPTING THIS LICENSE AGREEMENT TO ENTER INTO THIS LICENSE AGREEMENT FOR AND ON BEHALF OF YOU. FURTHERMORE, YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS LICENSE AGREEMENT AND AGREE THAT THIS LICENSE AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT, CANCEL THE INSTALLATION OF THE SOFTWARE AND DO NOT INSTALL THE SOFTWARE.
 
IF LICENSE CONTRACT OR SIMILAR DOCUMENT ACCOMPANIES SOFTWARE, TERMS OF THE SOFTWARE USE DEFINED IN SUCH DOCUMENT PREVAIL OVER THE CURRENT LICENSE AGREEMENT.
 
AFTER CLICKING THE ACCEPT BUTTON IN THE WINDOW CONTAINING THE LICENSE AGREEMENT OR AFTER ENTERING CORRESPONDING SYMBOL(-S), YOU HAVE THE RIGHT TO USE THE SOFTWARE IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT.
 
1. Definitions
1.1. Software means software including any Updates and related materials.
1.2. Rightholder (owner of all rights, whether exclusive or otherwise, to the Software) means AO Kaspersky Lab, a company incorporated according to the laws of the Russian Federation.
1.3. Computer(s) means combination of hardware(s), including personal computers, laptops, workstations, personal digital assistants, «smart phone», hand-held devices, or other electronic devices, and operating system(s) (including system virtual machines) for which the Software was designed where the Software will be installed and/or used.
1.4. End User (You/Your) – means the organization for which the Software is downloaded or acquired and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf. For purposes hereof the term «organization», without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority.
1.5. Partner(s) means organizations or individual(s) who distributes the Software based on an agreement and license with the Rightholder.
1.6. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies, additions, or maintenance packs, etc.
1.7. User Manual means user manual, administrator guide, reference book and related explanatory or other materials.
The on-line version of the User Manual is available on the Rightholder website: https://www.kaspersky.com and may be updated when necessary.
1.8. Activation Code is a unique set of characters which can be used to activate the Software.
1.9. Key File – means a file with the extension «.key» which can be used to activate the Software.
1.10. License Certificate means a document that is given to the End User which is accompanied by a Key File and Activation Code as well as further information about the license.
1.11. Web-Portal means services provided by the Rightholder and used for management of the installed Software and granted licenses, as well as to obtain and/or store information obtained from the Software and for contacting technical support. As a Web resource, «Company Account», «Kaspersky Endpoint Security Cloud» can be used. Any other Web resource that is used for the above purposes may also be used.
 
2. Grant of license
2.1. You are granted a non-exclusive license to use the Software within the scope of the functionality described in the User Manual or on the Rightholder’s Technical Support website, provided You comply with all technical requirements described in the User Manual, as well as restrictions and terms of use specified in this License Agreement.
Trial Version. If You have received, downloaded and/or installed a trial version of the Software and are hereby granted an evaluation license for the Software, You may use the Software only for evaluation purposes and only during the single applicable evaluation period, unless otherwise indicated, from the date of the initial installation. Any use of the Software for other purposes or beyond the applicable evaluation period is strictly prohibited.
Multiple Environment Software; Multiple Language Software; Dual Media Software; Multiple Copies; Bundles. If You use different versions of the Software or different language editions of the Software, if You receive the Software on multiple media, if You otherwise receive multiple copies of the Software, or if You received the Software bundled with other software, the total permitted number of Your Computers on which all versions of the Software are installed shall correspond to the number of Computers specified in licenses You have obtained provided that unless the licensing terms provide otherwise, each acquired license entitles You to install and use the Software on such a number of Computer(s) as is specified in Clause 2.2.
2.2. You have the right to use the Software for protection of such a number of Computer(s) as is specified on the License Certificate.
2.3. You have the right to make a copy of the Software solely for back-up purposes and only to replace the legally owned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used for other purposes and must be destroyed when You lose the right to use the Software or when Your license expires or is terminated for any other reason according to the legislation in force in the country of Your principal residence or in the country where You are using the Software.
2.4. From the time of the Software activation or after license Key File installation (with the exception of a trial version of the Software) You have the right to receive the following services from the Rightholder or its Partners for the period specified in the License Certificate:
— Updates of the Software via the Internet when and as the Rightholder publishes them on its website or through other online services. Any Updates that You may receive become part of the Software and the terms and conditions of this Agreement apply to them;
— Technical Support via the Internet and Technical Support telephone hotline;
— Access to information and auxiliary resources of the Rightholder.
 
3. Activation and Term
3.1. If You modify Your Computer or make changes to other vendors’ software installed on it, You may be required by the Rightholder to repeat activation of the Software or license Key File installation.
3.2. You have the right to use a trial version of the Software as provided in Clause 2.1 without any charge for the single applicable evaluation period (30 days) from the time of the Software activation according to this Agreement provided that the trial version does not entitle You Updates and Technical support via the Internet and Technical support telephone hotline. If Rightholder sets another duration for the single applicable evaluation period You will be informed via notification.
3.3. Your license to Use the Software is limited to the period of time as specified in the License Certificate, the remaining period can be viewed via means described in the User Manual.
3.4. Software functionality depends on the type of license being used, which is specified in the License Certificate. Software functionality corresponds to the description in the User Manual.
3.5. The Rightholder reserves the right to use any means and verification procedures to verify the validity of the license and/or legality of a copy of the Software installed and/or used on Your Computer. If there is no appropriate license or verification of the license cannot be performed in a reasonable amount of time, the Software will work with limited functionality.
3.6. You agree that in using the Software and in using any report or information derived as a result of using this Software, You will comply with all applicable international, national, state, regional and local laws and regulations, including, without limitation, privacy, copyright, export control and obscenity law.
3.7. Except as otherwise specifically provided herein, You may not transfer or assign any of the rights granted to You under this Agreement or any of Your obligations pursuant hereto.
 
4. Technical Support
4.1. The Technical Support described in Clause 2.4 of this Agreement is provided to You (except for a trial version of the Software) in accordance with Technical Support rules.
Technical support service and its rules are located at: https://support.kaspersky.com.
Information about supported Software versions: https://support.kaspersky.com/corporate/lifecycle#b2b.block0.kes11.
 
5. Conditions regarding Data Processing
5.1. Under this Paragraph additional definitions are introduced:
Data Subject – means a natural person who is a representative of the End User and/or who uses the Software directly or indirectly, including a worker, contractor, employee, or client of the End User in respect of whom the data is transmitted and processed in the context of the End User’s activities, including data which could be determined as personal data under the laws of some countries. Data Subject may also include any individual who communicates and transmits his or her data to the End User.
5.2. Where the Activation Code is used to activate the Software, in order to verify legitimate use of the Software, the End User agrees to periodically provide the Rightholder the following information: the type, version and localization of the installed Software, versions of the installed Updates, the identifier of the Computer and the identifier of the Software installation on the Computer, the activation code and the unique identifier of activation of the current license, the type, version and word size of the operating system, the name of the virtual environment when the Software is installed in the virtual environment, and identifiers of the Software components that are active at the time the information is provided.
The Rightholder can use such information also for gathering statistical information about the distribution and use of the Rightholder’s Software.
By using the Activation Code, the End User gives its consent to automatically transmit the data specified in this Clause. In case the End User does not agree to provide this information to the Rightholder, the Key File should be used to activate the Software.
5.3. The Rightholder undertakes the processing of all data received from the End User in accordance with the License Agreement, in particular the provisions of Paragraph 5 «Conditions regarding Data Processing», as well as in accordance with functionality of the Software that the End User may use, unless otherwise specified in a separate written agreement between the End User and the Rightholder or its Partners.
5.4. The End User is solely responsible for acquainting itself with the User Manual, particularly in regards to data processing, with the Rightholder’s Privacy Policy, which describes data handling (https://www.kaspersky.com/Products-and-Services-Privacy-Policy) and independently determining whether they comply with the End User’s requirements.
5.5. The End User must comply with laws that apply to use of the Software, including laws on confidential information, personal data, data protection. The End User is responsible for implementing and maintaining confidentiality and security measures in respect of data when using Software components that process data without the participation of the Rightholder. The End User must determine the appropriate technical and organizational measures for the protection and confidentiality of the data during use of such components of the Software in accordance with the End User’s purposes (for example, generating reports).
5.6. In view of a clear determination of the respective responsibilities with respect to personal data of third parties, in particular natural persons, whose personal data is processed when the End User uses the Software, the Rightholder and the End User agree as follows:
The End User undertakes all necessary steps in order to enable the Data Subject to exercise his or her rights and to provide the Data Subject with the information required under applicable law, such as Article 13 and 14 of Regulation (EU) 2016/679 (General Data Protection Regulation, «GDPR») (if Data Subject is in the European Union), or other applicable laws on confidential information, personal data, data protection, or similar thereto.
5.7. During use of the Software, especially where the End User configures the Software to use the Kaspersky Security Network, the End User is fully responsible for ensuring that the processing of personal data of Data Subjects is lawful, particularly, within the meaning of Article 6 (1) (a) to (f) of Regulation (EU) 2016/679 (General Data Protection Regulation, «GDPR») (if Data Subject is in the European Union) or applicable laws on confidential information, personal data, data protection, or similar thereto.
5.8. In reference to the legal bases for data processing, in case that the End User wants to base the lawfulness of the processing on the consent of its Data Subjects, the End User must ensure that the consent which meets all requirements of the applicable laws, especially where the Data Subject is in the European Union and Article 6 (1) (a) GDPR applies, was given by each Data Subject of the End User prior to using the Software. The End User guarantees that consent of each Data Subject of the End User was obtained prior to the processing of personal data.
5.9. It is agreed between the Rightholder and End User that, in case of item 5.8 of this License Agreement, the End User is responsible for proving the existence of effective consent to the processing of personal data, especially according to Article 7 (1) GDPR where Data Subject is in the European Union. The End User guarantees that it is able to and will prove the existence of each Data Subject’s consent at any time upon request by the Rightholder within 5 business days starting with the request of the Rightholder.
5.10. Furthermore, in case of item 5.8 of this License Agreement, the End User is obliged and has the full and sole responsibility to provide each individual Data Subject with all information required by applicable law to obtain consent, especially under Article 13 GDPR (if Data Subject is in the European Union), prior to using the Software. In particular, the End User is obliged to provide each Data Subject in the European Union, or where applicable law requires, with the Rightholder’s Privacy Policy (https://www.kaspersky.com/Products-and-Services-Privacy-Policy) prior to using the Software.
5.11. The End User shall be fully liable in relation to the Rightholder for any damage resulting from a breach of this License Agreement, in particular the End User’s failure to obtain effective consent of Data Subject, where applicable, and/or from a failure to obtain sufficient effective consent and/or from the lack of proof and/or belated proof of effective consent of Data Subject and/or from any other violation of an obligation under this agreement.   
5.12. The End User shall indemnify the Rightholder in relation to third parties from the claims arising from the failure of End User to fulfill obligations under Paragraph 5 «Conditions regarding Data Processing» which third parties, especially the supervisory data protection authorities, assert against the Rightholder.
5.13. If You use the Rightholder’s update servers to download the Updates, the End User, in order to increase the efficiency of the update procedure, agrees to periodically provide the Rightholder the following information: the type and version of the installed Software, the update session ID, the current license unique ID, and the unique ID of the Software installation on the computer.
The Rightholder can use such information also for receiving statistical information about the distribution and use of the Rightholder’s Software.
By downloading the Updates from the Rightholder’s update servers, the End User gives its consent to automatically transmit the data specified in this Clause. In case the End User does not agree to provide this information to the Rightholder, the End User must obtain the Updates from a local shared folder as described in the User Manual.

6. Limitations
6.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non-waivable right granted to You by applicable legislation, and You shall not otherwise reduce any part of the Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable law. Neither Software’s binary code nor source may be used or reverse engineered to re-create the program algorithm, which is proprietary. All rights not expressly granted herein are reserved by Rightholder and/or its suppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the license granted hereunder and may result in criminal and/or civil prosecution against You.
6.2. You shall not transfer the rights to use the Software to any third party.
6.3. You shall not provide the Activation Code and/or Key File to third parties or allow third parties access to the Activation Code and/or Key File, which are deemed confidential data of Rightholder.
6.4. You shall not rent, lease or lend the Software to any third party.
6.5. You shall not use the Software in the creation of data or Software used for detection, blocking or treating threats described in the User Manual.
6.6. Your Key File can be blocked in case You breach any of the terms and conditions of this Agreement.
6.7. If You are using the trial version of the Software You do not have the right to receive the Technical Support specified in Clause 4 of this Agreement and You don’t have the right to transfer the license or the rights to use the Software to any third party.
6.8. Violation of the intellectual rights to the Software shall result in civil, administrative or criminal liability in accordance with the law.
 
7. Limited Warranty and Disclaimer
7.1. The Rightholder guarantees that the Software will substantially perform according to the specifications and descriptions set forth in the User Manual provided however that such limited warranty shall not apply to the following: (w) Your Computer’s deficiencies and related infringement for which Rightholder’s expressly disclaims any warranty responsibility; (x) malfunctions, defects, or failures resulting from misuse; abuse; accident; neglect; improper installation, operation or maintenance; theft; vandalism; acts of God; acts of terrorism; power failures or surges; casualty; alteration, non-permitted modification, or repairs by any party other than Rightholder; or any other third parties’ or Your actions or causes beyond Rightholder’s reasonable control; (y) any defect not made known by You to Rightholder as soon as practical after the defect first appears; and (z) incompatibility caused by hardware and/or Software components installed on Your Computer.
7.2. You acknowledge, accept and agree that no software is error free and You are advised to back-up the Computer, with frequency and reliability suitable for You.
7.3. The Rightholder does not provide any guarantee that the Software will work correctly in case of violations of the terms described in the User Manual or in this Agreement.
7.4. The Rightholder does not guarantee that the Software will work correctly if You do not regularly download Updates specified in Clause 2.4 of this Agreement.
7.5. The Rightholder does not guarantee protection from the threats described in the User Manual after the expiration of the period specified in the License Certificate or after the license to use the Software is terminated for any reason.
7.6. You acknowledge that the Software will be provisioned with Rightholder standard settings applied by default and that it is Your sole responsibility to configure the Software to satisfy Your own requirements.
7.7. THE SOFTWARE IS PROVIDED «AS IS» AND THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE, EXCEPT FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW. THE RIGHTHOLDER AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR TERM (EXPRESSED OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NON-INFRINGEMENT OF THIRD-PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE. YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL OF YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THE RIGHTHOLDER.
 
8. Interaction with Microsoft Windows Firewall
8.1. You acknowledge that Windows Firewall, being turned on at the time of installation of the Software, can be turned off. Settings and rules of Windows Firewall are not exported to the installed Software.
 
9. Exclusion and Limitation of Liability
9.1. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATION, SOFTWARE, AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS LICENSE AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER OR ANY OF ITS PARTNERS, EVEN IF THE RIGHTHOLDER OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
9.2. IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS LICENSE AGREEMENT CANNOT BE EXCLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY THAT DISCLAIMER, EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS, EXCLUSIONS AND LIMITATIONS. 

10. GNU and Other Third Party licenses
10.1. The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code («Open Source Software»). If such licenses require that for any Software, which is distributed to someone in an executable binary format, that the source code also be made available to those users, then the source code should be made available by sending the request to source@kaspersky.com or the source code is supplied with the Software. If any Open Source Software licenses require that the Rightholder provide rights to use, copy or modify an Open Source Software program that are broader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein.
 
11. Intellectual Property Ownership
11.1. You agree that the Software and the authorship, systems, ideas, methods of operation, documentation and other information contained in the Software, are proprietary intellectual property and/or the valuable trade secrets of the Rightholder or its Partners and that the Rightholder and its Partners, as applicable, are protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the Russian Federation, European Union and the United States, as well as other countries and international treaties. This Agreement does not grant to You any rights to the intellectual property including any the Trademarks or Service Marks of the Rightholder and/or its Partners («Trademarks»). You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice, including identification of the Trademark owner’s name. Such use of any Trademark does not give You any rights of ownership in that Trademark. The Rightholder and/or its Partners own and retain all right, title, and interest in and to the Software, including without limitation any error corrections, enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights therein. Your possession, installation or use of the Software does not transfer to You any title to the intellectual property in the Software, and You will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software. Except as stated herein, this Agreement does not grant You any intellectual property rights in the Software and You acknowledge that the license, as further defined herein, granted under this Agreement only provides You with a right of limited use under the terms and conditions of this Agreement. Rightholder reserves all rights not expressly granted to You in this Agreement.
11.2. You agree not to modify or alter the Software in any way. You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software.
 
12. Governing Law; Arbitration
12.1. This Agreement will be governed by and construed in accordance with the laws of the Russian Federation without reference to conflicts of law rules and principles. This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded. Any dispute arising out of the interpretation or application of the terms of this Agreement or any breach thereof shall, unless it is settled by direct negotiation, be settled by in the International Commercial Arbitration Court at the Russian Federation Chamber of Commerce and Industry in Moscow, the Russian Federation. Any award rendered by the arbitrator shall be final and binding on the parties and any judgment on such arbitration award may be enforced in any court of competent jurisdiction. Nothing in this Paragraph 12 shall prevent a Party from seeking or obtaining equitable relief from a court of competent jurisdiction, whether before, during or after arbitration proceedings.
 
13. Period for Bringing Actions
13.1. No action, regardless of form, arising out of the transactions under this Agreement, may be brought by either party hereto more than one (1) year after the cause of action has occurred, or was discovered to have occurred, except that an action for infringement of intellectual property rights may be brought within the maximum applicable statutory period.
 
14. Entire Agreement; Severability; No Waiver
14.1. This Agreement is the entire agreement between You and Rightholder and supersedes any other prior agreements, proposals, communications or advertising, oral or written, with respect to the Software or to subject matter of this Agreement. You acknowledge that You have read this Agreement, understand it and agree to be bound by its terms. If any provision of this Agreement is found by a court of competent jurisdiction to be invalid, void, or unenforceable for any reason, in whole or in part, such provision will be more narrowly construed so that it becomes legal and enforceable, and the entire Agreement will not fail on account thereof and the balance of the Agreement will continue in full force and effect to the maximum extent permitted by law or equity while preserving, to the fullest extent possible, its original intent. No waiver of any provision or condition herein shall be valid unless in writing and signed by You and an authorized representative of Rightholder provided that no waiver of any breach of any provisions of this Agreement will constitute a waiver of any prior, concurrent or subsequent breach. Rightholder’s failure to insist upon or enforce strict performance of any provision of this Agreement or any right shall not be construed as a waiver of any such provision or right.
 
15. Rightholder Contact Information
Should You have any questions concerning this Agreement, or if You desire to contact the Rightholder for any reason, please contact our Customer Service Department at:
 
AO Kaspersky Lab, 39A/3, Leningradskoe Shosse
Moscow, 125212
Russian Federation
E-mail: info@kaspersky.com
Web site: https://www.kaspersky.com

© 2022 AO Kaspersky Lab

Kaspersky Security Center 13 Network Agent KASPERSKY END USER LICENSE AGREEMENT

BY CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR BY USING THE SOFTWARE YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE THAT THIS AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, CANCEL THE INSTALLATION OF THE SOFTWARE AND DO NOT INSTALL THE SOFTWARE OR DO NOT USE THE SOFTWARE.

IF LICENSE CONTRACT OR SIMILAR DOCUMENT ACCOMPANIES SOFTWARE, TERMS OF THE SOFTWARE USE DEFINED IN SUCH DOCUMENT PREVAIL OVER CURRENT END USER LICENSE AGREEMENT.

1. Definitions
1.1. Software means software Kaspersky Security Center 13 Network Agent including any Updates and related materials.
1.2. Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means AO Kaspersky Lab, a company incorporated according to the laws of the Russian Federation.
1.3. Computer(s) means combination of hardware(s), including personal computers, laptops, workstations, personal digital assistants, ‘smart phones’, hand-held devices, or other electronic devices, and operating system(s) (including system virtual machines) for which the Software was designed where the Software will be installed and/or used.
1.4. End User (You/Your) means the organization for which the Software is downloaded or installed and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf. For purposes hereof the term “organization”, without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority. If the Software was downloaded or installed on behalf of individual, End User («You») further means such individual.
1.5. Partner(s) means organizations or individual(s), who distributes the Software based on an agreement and license with the Rightholder.
1.6. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies, additions or maintenance packs etc.
1.7. User Manual means user manual, administrator guide, reference book and related explanatory or other materials.

2. Grant of License
2.1. You are given a non-exclusive license to store, load, install, execute, and display (to “use”) the free of charge Software, according to the all technical requirements described in the User Manual and according to the terms and conditions of this Agreement (the “License”).
2.2. You have the right to make a copy of the Software solely for back-up purposes and only to replace the legally owned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used for other purposes and must be destroyed when you lose the right to use the Software.

3. Term and termination
3.1. The Software can be used perpetually upon your acceptance of this Agreement.
3.2. Without prejudice to any other remedy in law or in equity that the Rightholder may have, in the event of any breach by You of any of the terms and conditions of this Agreement, the Rightholder shall at any time without notice to You be entitled to terminate this License.
3.3. You agree that in using the Software and in using any report or information derived as a result of using this Software, you will comply with all applicable international, national, state, regional and local laws and regulations, including, without limitation, privacy, copyright, export control and obscenity law.

4. Technical Support
4.1. Technical Support is provided only for clients of the commercial versions of the Rightholder’s software in accordance with the Technical Support rules.
Technical support service and its rules are located at: https://support.kaspersky.com/.

5. Conditions regarding Data Processing
5.1. Under this Section additional definitions are introduced:
Data Subject – means a natural person who is a representative of the End User and/or who uses the Software directly or indirectly, including a worker, contractor, employee, or client of the End User in respect of whom the data is transmitted and processed in the context of the End User’s activities, including data which could be determined as personal data under the laws of some countries. Data Subject may also include any individual who communicates and transmits his or her data to the End User.
5.2. If You use the Rightholder’s update servers to download the Updates, the End User, in order to increase the efficiency of the update procedure, agrees to periodically provide the Rightholder the following information: Software ID derived from the license; full version of the Software; Software license ID; Software installation ID (PCID); ID of the Software update start.
The Rightholder can use such information also for receiving statistical information about the distribution and use of the Rightholder’s Software.
By downloading the Updates from the Rightholder’s update servers, the End User gives its consent to automatically transmit the data specified in this Paragraph. In case the End User does not agree to provide this information to the Rightholder, the End User must obtain the Updates from a local shared folder as described in the User Manual.
5.3. The Rightholder undertakes the processing of all data received from the End User in accordance with the License Agreement, in particular the provisions of Section 5 “Conditions regarding Data Processing,” as well as in accordance with functionality of the Software that the End User may use, unless otherwise specified in a separate written agreement between the End User and the Rightholder or its Partners.
5.4. The End User is solely responsible for acquainting itself with the User Manual, particularly in regards to data processing, with the Rightholder’s Privacy Policy, which describes data handling (https://www.kaspersky.com/Products-and-Services-Privacy-Policy) and independently determining whether they comply with the End User’s requirements.
5.5. The End User must comply with laws that apply to use of the Software, including laws on confidential information, personal data, data protection. The End User is responsible for implementing and maintaining confidentiality and security measures in respect of data when using Software components that process data without the participation of the Rightholder. The End User must determine the appropriate technical and organizational measures for the protection and confidentiality of the data during use of such components of the Software in accordance with the End User’s purposes (for example, generating reports).
5.6. In view of a clear determination of the respective responsibilities with respect to personal data of third parties, in particular natural persons, whose personal data is processed when the End User uses the Software, the Rightholder and the End User agree as follows:
The End User undertakes all necessary steps in order to enable the Data Subject to exercise his or her rights and to provide the Data Subject with the information required under applicable law, such as Article 13 and 14 of Regulation (EU) 2016/679 (General Data Protection Regulation, “GDPR”) (if Data Subject is in the European Union), or other applicable laws on confidential information, personal data, data protection, or similar thereto.
5.7. During use of the Software, especially where the End User configures the Software to use the Kaspersky Security Network, the End User is fully responsible for ensuring that the processing of personal data of Data Subjects is lawful, particularly, within the meaning of Article 6 (1) (a) to (f) of Regulation (EU) 2016/679 (General Data Protection Regulation, “GDPR”) (if Data Subject is in the European Union) or applicable laws on confidential information, personal data, data protection, or similar thereto.
5.8. In reference to the legal bases for data processing, in case that the End User wants to base the lawfulness of the processing on the consent of its Data Subjects, the End User must ensure that the consent which meets all requirements of the applicable laws, especially where the Data Subject is in the European Union and Article 6 (1) (a) GDPR applies, was given by each Data Subject of the End User prior to using the Software. The End User guarantees that consent of each Data Subject of the End User was obtained prior to the processing of personal data.
5.9. It is agreed between the Rightholder and End User that, in case of item 5.8 of this License Agreement, the End User is responsible for proving the existence of effective consent to the processing of personal data, especially according to Article 7 (1) GDPR where Data Subject is in the European Union. The End User guarantees that it is able to and will prove the existence of each Data Subject’s consent at any time upon request by the Rightholder within 5 business days starting with the request of the Rightholder.
5.10. Furthermore, in case of item 5.8 of this License Agreement, the End User is obliged and has the full and sole responsibility to provide each individual Data Subject with all information required by applicable law to obtain consent, especially under Article 13 GDPR (if Data Subject is in the European Union), prior to using the Software. In particular, the End User is obliged to provide each Data Subject in the European Union, or where applicable law requires, with the Rightholder’s Privacy Policy (https://www.kaspersky.com/Products-and-Services-Privacy-Policy) prior to using the Software.
5.11. The End User shall be fully liable in relation to the Rightholder for any damage resulting from a breach of this License Agreement, in particular the End User’s failure to obtain effective consent of Data Subject, where applicable, and/or from a failure to obtain sufficient effective consent and/or from the lack of proof and/or belated proof of effective consent of Data Subject and/or from any other violation of an obligation under this agreement.
5.12. The End User shall indemnify the Rightholder in relation to third parties from the claims arising from the failure of End User to fulfill obligations under Section 5 “Conditions regarding Data Processing” which third parties, especially the supervisory data protection authorities, assert against the Rightholder.

6. Limitations
6.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non-waivable right granted to You by applicable legislation, and you shall not otherwise reduce any part of the Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable law. Neither Software’s binary code nor source code may be used or reverse engineered to re-create the program algorithm, which is proprietary. All rights not expressly granted herein are reserved by Rightholder and/or its suppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the License granted hereunder and may result in criminal and/or civil prosecution against You.
6.2. You shall not transfer the rights to use the Software to any third party.
6.3. You shall not rent, lease or lend the Software to any third party.
6.4. You shall not use the Software in the creation of data or software used for detection, blocking or treating threats described in the User Manual.
6.5. Violation of the intellectual rights to the Software shall result in civil, administrative or criminal liability in accordance with the law.

7. Limited Warranty and Disclaimer
7.1. THE SOFTWARE IS PROVIDED «AS IS» AND AO KASPERSKY LAB MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE. EXCEPT FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW AO KASPERSKY LAB AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR TERM (EXPRESS OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE. YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, AO KASPERSKY LAB MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THE RIGHTHOLDER.

8. Exclusion and Limitation of Liability
8.1. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATON, SOFTWARE, AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER AND/OR ANY OF ITS PARTNERS, EVEN IF THE RIGHTHOLDER AND/OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

YOU AGREE THAT IN THE EVENT THE RIGHTHOLDER AND/OR ITS PARTNERS ARE FOUND LIABILE, THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS SHALL BE LIMITED BY THE COSTS OF THE SOFTWARE. IN NO CASE SHALL THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS EXCEED THE FEES PAID FOR THE SOFTWARE TO THE RIGHTHOLDER OR THE PARTNER (AS MAY BE APPLICABLE).

NOTHING IN THIS AGREEMENT EXCLUDES OR LIMITS ANY CLAIM FOR DEATH AND PERSONAL INJURY. FURTHER IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BE EXLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER, EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS, EXCLUSIONS AND LIMITATIONS.

9. GNU and Other Third-Party Licenses
9.1. The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code «Open-Source Software»). If such licenses require that for any software, which is distributed to someone in an executable binary format, that the source code also be made available to those users, then the source code should be made available by sending the request to source@kaspersky.com or the source code is supplied with the Software. If any Open-Source Software licenses require that the Rightholder provide rights to use, copy or modify an Open-Source Software program that are broader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein.

10. Intellectual Property Ownership
10.1. You agree that the Software and the authorship, systems, ideas, methods of operation, documentation and other information contained in the Software, are proprietary intellectual property and/or the valuable trade secrets of the Rightholder or its partners and that the Rightholder and its partners, as applicable, are protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the Russian Federation, European Union and the United States of America, as well as other countries and international treaties. This Agreement does not grant to You any rights to the intellectual property including any trademarks or service marks of the Rightholder and/or its partners («Trademarks»). You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice, including identification of the Trademark owner’s name. Such use of any Trademark does not give you any rights of ownership in that Trademark. The Rightholder and/or its partners own and retain all right, title, and interest in and to the Software, including without limitation any error corrections, enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights therein. Your possession, installation or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software. Except as stated herein, this Agreement does not grant you any intellectual property rights in the Software and you acknowledge that the License granted under this Agreement only provides you with a right of limited use under the terms and conditions of this Agreement. Rightholder reserves all rights not expressly granted to you in this Agreement.
10.2. You acknowledge that the source code is proprietary to the Rightholder and constitutes trade secrets of the Rightholder. You agree not to modify, adapt, translate, reverse engineer, decompile, disassemble or otherwise attempt to discover the source code of the Software in any way.
10.3. You agree not to modify or alter the Software in any way. You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software.

11. Governing Law; Arbitration
11.1. This Agreement will be governed by and construed in accordance with the laws of the Russian Federation without reference to conflicts of law rules and principles. This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded.
If you are an individual, this does not impair your rights according to the consumer protection of the country in which you are resident.
Any dispute arising out of the interpretation or application of the terms of this Agreement or any breach thereof shall, unless it is settled by direct negotiation, be settled by in the International Commercial Arbitration Court at the Russian Federation Chamber of Commerce and Industry in Moscow, the Russian Federation. Any award rendered by the arbitrator shall be final and binding on the parties and any judgment on such arbitration award may be enforced in any court of competent jurisdiction. Nothing in this Section 11 shall prevent a Party from seeking or obtaining equitable relief from a court of competent jurisdiction, whether before, during or after arbitration proceedings.

12. Period for Bringing Actions
12.1. No action, regardless of form, arising out of the transactions under this Agreement, may be brought by either party hereto more than one (1) year after the cause of action has occurred, or was discovered to have occurred, except that an action for infringement of intellectual property rights may be brought within the maximum applicable statutory period.

13. Entire Agreement; Severability; No Waiver
13.1. This Agreement is the entire agreement between you and Rightholder and supersedes any other prior agreements, proposals, communications or advertising, oral or written, with respect to the Software or to subject matter of this Agreement. You acknowledge that you have read this Agreement, understand it and agree to be bound by its terms.
13.2. If any provision of this Agreement is found by a court of competent jurisdiction to be invalid, void, or unenforceable for any reason, in whole or in part, such provision will be more narrowly construed so that it becomes legal and enforceable, and the entire Agreement will not fail on account thereof and the balance of the Agreement will continue in full force and effect to the maximum extent permitted by law or equity while preserving, to the fullest extent possible, its original intent.
13.3. No waiver of any provision or condition herein shall be valid unless in writing and signed by you and an authorized representative of Rightholder provided that no waiver of any breach of any provisions of this Agreement will constitute a waiver of any prior, concurrent or subsequent breach. Rightholder’s failure to insist upon or enforce strict performance of any provision of this Agreement or any right shall not be construed as a waiver of any such provision or right.

14. Rightholder Contact Information

Should you have any questions concerning this Agreement, or if you desire to contact the Rightholder for any reason, please contact our Customer Service Department at:

AO Kaspersky Lab, 39A/3, Leningradskoe Shosse
Moscow, 125212
Russian Federation
E-mail: info@kaspersky.com
Web site: https://www.kaspersky.com/

© 2020 AO Kaspersky Lab

SUPPLEMENTAL CLAUSES REGARDING DATA PROCESSING for Kaspersky Endpoint Security for Windows and Network Agent for Windows

These Supplemental Clauses regarding Data Processing («Supplemental Clauses») describe additional provisions on how the above designated Managed Software processes data, when it is managed by the Product. These Supplemental Clauses and the relevant terms of the Data Processing Agreement («DPA») are the authoritative statements of User Data, especially in relation to the processing of personal data included in User Data associated with the use of this Product with the Managed Software.

Capitalized terms used in these Supplemental Clauses but not defined herein have the same meaning as in the relevant DPA.

Data relating to Managed Devices through Network Agent for Windows:

1. Technical parameters of the administrated device and its components required for its identification: the device name and description, domain, Windows name of the device, domain name and IP address, OS, manufacturer, OS folder, information on whether the device is a virtual machine, and hypervisor type.
2. Technical parameters of the administrated device and its components, for example, Windows Update Agent status and operating system bit size.
3. Details of the administrated device activities: the date and time of the last update and last visible time, ‘Waiting for Reboot» status, time the device was turned on, and ‘Computer Visible on the Network’ tag.
4. Parameters of the Kaspersky Lab software installed on the administrated device: the Kaspersky Lab software status, information on whether continuous connection with the workspace is supported, real-time protection status, date and time of the last device scan, number of malicious objects detected, number of objects that have not been disinfected, tasks for managed Kaspersky Lab software, presence and operation status of the program solution components, version of the anti-virus databases, and details of the Kaspersky Lab software settings.
5. Details of the accounts of administrated device users and their sessions.
6. Data processed by the Vulnerability and Patch Management feature:
a. Details of applications and patches installed on managed devices (Applications registry). Identification of applications is possible based on information about executable files detected by the Application Control feature on managed devices:
• Application / patch ID
• Parent application ID (for a patch)
• Application / patch name and version
• Whether the application / patch is an MSI file
• Application / patch vendor
• Localization language ID
• Application / patch installation date
• Application installation path
• Technical Support website of the application / patch vendor
• Technical Support phone number
• ID of the installed application instance
• Comment
• Uninstallation key
• Key for installation in silent mode
• Patch classification
• Web address for additional information about the patch
• Registry key of the application
• Application build number
• User SID
b. Information about the hardware detected on managed devices (Hardware registry):
• Device ID
• Device type: Motherboard, CPU, RAM, Mass storage device, Video adapter, Sound card, Network interface controller, Monitor, Optical disc drive
• Device name
• Description
• Vendor
• Serial number
• Revision
• Information about the driver: developer, version, description, release date
• Information about BIOS: developer, version, serial number, release date
• Chipset
• Clock rate
• Number of CPU cores
• Number of CPU threads
• CPU platform
• Storage device rotation speed
• RAM: type and inventory number
• Video memory
• Sound card codec
c. Details of vulnerabilities in third-party software detected on managed devices:
• Vulnerability ID
• Vulnerability severity level: Warning, High, Critical
• Vulnerability type: Microsoft, Third-party developer
• Web address of the page on which the vulnerability is described
• Time the vulnerability entry was created
• Vendor name
• Vendor localized name
• Vendor ID
• Application name
• Application localized name
• Application installation code
• Application version
• Application localization language
• List of CVE identifiers from the vulnerability description
• Kaspersky protection technologies blocking the vulnerability: File Threat Protection, Behavior Detection, Web Threat Protection, Mail Threat Protection, Host Intrusion Prevention, ZETA Shield
• Path to the object file in which the vulnerability was detected
• Vulnerability detection time
• IDs of the Knowledge Base articles from the vulnerability description
• IDs of the security bulletins from the vulnerability description
• List of updates for the vulnerability
• Whether an exploit exists for the vulnerability
• Whether malware exists for the vulnerability
d. Details of updates available for third-party applications installed on managed devices:
• Application name and version
• Vendor
• Application localization language
• Operating system
• List of patches according to installation sequence
• Original version of the application to which the patch is applied
• Application version after patch installation
• Patch ID
• Build number
• Installation flags
• License Agreements for the patch
• Whether patch installation is a prerequisite for installation of other patches
• List of required installed applications and their updates
• Sources of information about the patch
• Additional information about the patch: addresses of web pages
• Web address for patch download, file name, version, revision, and SHA-256
e. Details of Microsoft updates found by the Windows Server Update Services (WSUS) feature:
• Update revision number
• Microsoft update type: Driver, Application, Category, Detectoid
• Update importance level according to the Microsoft Security Response Center (MSRC) bulletin: Low, Medium, High, Critical
• IDs of the MSRC security bulletins related to the update
• IDs of articles in the MSRC Knowledge Base
• Update name (header)
• Update description
• Whether the update installer is interactive
• Installation flags
• Update classification: Critical Updates, Definition Updates, Drivers, Feature Packs, Security Updates, Service Packs, Tools, Update Rollups, Updates, Upgrade
• Information about the application to which the update is applied
• End User License Agreement (EULA) ID
• EULA text
• Whether the EULA must be accepted for update installation
• Information about the associated updates (ID and revision number)
• Update ID (Global Microsoft Windows update identity)
• IDs of superseded updates
• Whether the update is hidden
• Whether the update is mandatory
• Update installation status: Not applicable, Not assigned for installation, Assigned, Installing, Installed, Failed, Restart is required, Not assigned for installation (new version)
• CVE IDs for the update
• Company that released the update, or the «Company missing» value
f. List of Microsoft updates found by the WSUS feature that must be installed on the device.

Data relating to Managed Devices through Kaspersky Endpoint Security for Windows:

1. Information about the anti-virus databases used in the application:
a. List of anti-virus database categories required for the application
b. Date and time the currently used anti-virus databases were released and downloaded to the application
c. Number of records in the currently used anti-virus databases
2. Information about the licenses used by the application:
a. License serial number and type
b. Validity period in days
c. Number of devices for which the license was issued
d. License generation and expiration dates
e. License status
f. Date and time the application was last successfully synchronized with the activation servers, if the application had been activated using an activation code
g. ID of the application to which the license was provided
h. Available functionality; name of the organization to which the license was provided
i. Additional information in case the subscription license is used (subscription license criterion, expiration date and number of days available for subscription license renewal, web address of the subscription license provider, current status and cause for assuming this status), date and time the application was activated on the device
j. Date and time the license is set to expire on the device
3. Criterion and cause of required device restart, as well as the time of the issue that made the restart necessary.
4. Information about application updates:
a. List of updates that must be installed or deleted; update release date and presence of Critical status
b. Name, version, and brief description of the update
c. Link to the article on the Kaspersky website with a detailed description of the update
d. Text of the EULA of the update
e. Criterion of update deletion possibility
f. Version of the application policy and plug-in
g. Web address for download of the application plug-in
h. Names of the installed application updates, their installation version and date
i. Error code and description if the update installation or deletion returned an error
j. Minimum version of Kaspersky Security Center required for proper functioning after the update is applied
5. List of tags assigned to the device.
6. List of device statuses and their causes.
7. Encryption status, as well as key length and algorithm of the currently used cryptographic module.
8. General status of the application and status of all its components; information about conformance with policy; real-time protection status; password in encrypted form (cryptocontainer) for restoring data on an encrypted device; statistics of encryption/decryption of the volume through Bitlocker; encryption progress status of the device on which the policy is applied; backup copies of the metadata required for the device decryption.
9. Date and time of the last scan of the device, number of objects scanned; number of malicious objects detected; number of objects blocked, deleted, and disinfected; number of objects that failed to be disinfected; number of scan errors; number of network attacks detected.
10. Information about currently applied application settings; current status and performance results of group and local tasks, as well as values of their settings.
11. Information about executable files detected on the device:
a. File name, path, type, and hash
b. Date and time of the first run
c. Information from the VersionInfo file: file version, application name and version, organization
d. Trust group to which the application belongs
e. List of categories to which the application belongs
f. Details of certificate with which the application was signed: serial number, thumbprint, publisher, subject, publishing date, expiration date, and public key
12. Information about external devices connected to the client devices: ID, name, class, vendor, description, serial number, and VID/PID.
13. Information about files placed in Backup and Quarantine (name, path, object size and type, object description, name of detected threat, version of the anti-virus databases with which the threat was detected, date and time of object placement in Backup), as well as the files themselves, upon a request from the administrator.
14. Information about files requested by Kaspersky experts for detailed analysis (name, path, object size and type, object description, date and time of file request processing), as well as the files themselves, upon a request from the administrator.
15. Details of the triggering of Adaptive Anomaly Control rules:
a. Rule ID and name
b. Number of rule triggers
c. Name and SID of the user on whose behalf the process was initiated
d. Description of the suspicious activity source
e. Description of the object that suspicious activity is aimed at
16. Information about the status of Adaptive Anomaly Control rules:
a. Rule ID and name
b. Number of rule triggers
c. Rule status: Off, Smart Training state, Block state, Smart Block state, Notify state
d. Training progress
17. Information about the operation of each application component and about the performance of each task presented as events:
a. Date and time when the event occurred
b. Event name and type
c. Importance level
d. Name of the task or application component in whose operation the event occurred
e. Information about the third-party application that caused the event (third-party application name, path to the file on disk, process ID, values of settings in case an event of the application startup or modification of the application settings is published, as well as information about the attacked software module in case self-defense detected an attack)
f. Name and type (System, Active, Event originator) of the user whose actions caused the event occurrence
g. Object or action processing result (description, type, name, severity level and precision, file name and type of the operation performed on the device, and the application’s decision on this operation)
h. Object details (object name and type, path to the object on disk, file version, size, as well as third-party application name and vendor name in case of Application Control events)
i. Information about the performed action
j. Description of the event occurrence origin
k. Connection details: protocol, status, remote address and port, local address and port, zone
l. Device details: vendor name, device name, path, device type, bus type, ID, VID/PID
m. Details of the category to which the object belongs and source of categorization
n. Details of the certificate with which the object has been signed: certificate publisher, subject, and fingerprint
o. Details of the triggered Application Control rule (name and type) and result of its application
p. Information about temporary access provided: provision date, time, and duration
q. Information about active and blocked connections: name, description, and type
r. Details of the requested web address
s. Data on prevention and response events (PID of the processed object, Path to the processed object, Path to the blocked document, IOC ID, Name and result of the IOC Scan task, Name of the processed object)
18. Details of the triggered Web Control rule: rule name, content category and its source, address mask
19. Release date of downloaded updates of anti-virus databases.
20. Details of the module in events related to the integrity check task operation (type, name, and path on disk) and its check results.
21. Data for building Killchain:
a. Main data (Date and time of the incident, Name of the detect, Scan mode, Status of the last action related to the detect, Failure reason, Type of the detected object, Name of the detected object, Status of the threat after the actions of anti-virus protection, Reason why the actions were not performed, Actions of Kaspersky Endpoint Security related to the rollback of changes);
b. Information about the processed object (UID of the process, parent process, and process file, Windows process ID, Command line of the process, Name of the user who started the process, ID of the logon session in which the process was started, Type of the session in which the process was started, Integrity level of the processed process, Whether the user who started the process is included in any privileged local and domain groups, ID and full name of the processed object, ID of the protected device, Date and time of the event, Full name (for a file on the hard drive) or download web address (for a file from the network), Hash of the processed object, Type of the processed object, Date the processed object was created and date it was last modified, Size of the processed object, Attributes of the processed object, Authority that signed the processed object, Result of verification of the certificate of the processed object, Security ID (SID) of the creator of the processed object, ZoneIdentifier parameter of the processed object, Web address of the download of the processed object (only for a file on the hard disk), Name and hash of the application that downloaded the file and the application that last modified the file, Number of runs of the processed object, Date and time of the first run of the processed object, UID of the file, Path to the processed register variable, Name, value, and type of the processed register variable, Whether an automatic startup location exists for the processed register key, Web address of the processed web request, HTTP referrer header of the processed web request, User-Agent header of the processed web request, Method of the processed web request, Local IP address and port of the processed web request, Remote IP address and port of the processed web request, Connection direction of the processed web request, ID of the process into which code was injected)
22. Results of the IOC Scan task (IP address and physical address from the ARP table, Name and type of DNS resource record, IP address, Record ID and name of the data source in the event log, Name of the event log, User name, Event time, Hash, full name, and size of the file, Remote IP address and port connected at the moment of scan, Local adapter IP address, Port open on local adapter, Protocol as a number, Process name, Process arguments, Path to the process file, Windows PID of the process and parent process, Name of the user in whose name the process was initiated, Date and time of process start, Service name and description, Path and name of the service DLL (for svchost), Path and name of the executable file of the service, Windows PID, type, status, and start mode of the service, User name, Volume label, letter, and type, Windows Registry value, Registry hive value, Path to the registry key, Registry parameter, Physical address of the device, Name and version of the operating system, Network name of the device, Domain or workgroup)

© 2022 AO Kaspersky Lab

Kaspersky Endpoint Security 11 for Mac END USER LICENSE AGREEMENT
 
KASPERSKY END USER LICENSE AGREEMENT («LICENSE AGREEMENT»)
 
IMPORTANT LEGAL NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFORE YOU START USING THE SOFTWARE.
 
CLICKING THE BUTTON INDICATING YOUR ACCEPTANCE IN THE WINDOW CONTAINING THE LICENSE AGREEMENT, OR BY ENTERING CORRESPONDING SYMBOL(-S), YOU CONFIRM IN A LEGALLY BINDING WAY THAT YOU AS THE ORGANIZATION FOR WHICH THE SOFTWARE IS DOWNLOADED OR ACQUIRED HAVE AUTHORIZED THE NATURAL PERSON ACCEPTING THIS LICENSE AGREEMENT TO ENTER INTO THIS LICENSE AGREEMENT FOR AND ON BEHALF OF YOU. FURTHERMORE, YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS LICENSE AGREEMENT AND AGREE THAT THIS LICENSE AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT, CANCEL THE INSTALLATION OF THE SOFTWARE AND DO NOT INSTALL THE SOFTWARE.
 
IF A LICENSE CONTRACT OR SIMILAR DOCUMENT ACCOMPANIES THE SOFTWARE, THE TERMS OF THE SOFTWARE USE DEFINED IN SUCH DOCUMENT PREVAIL OVER THE CURRENT LICENSE AGREEMENT.
 
AFTER CLICKING THE ACCEPT BUTTON IN THE WINDOW CONTAINING THE LICENSE AGREEMENT OR AFTER ENTERING CORRESPONDING SYMBOL(-S), YOU HAVE THE RIGHT TO USE THE SOFTWARE IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT.
 
1. Definitions
1.1. Software means software including any Updates and related materials.
1.2. Rightholder (owner of all rights, whether exclusive or otherwise, to the Software) means AO Kaspersky Lab, a company incorporated according to the laws of the Russian Federation.
1.3. Computer(s) means combination of hardware(s), including personal computers, laptops, workstations, personal digital assistants, «smart phones», hand-held devices, or other electronic devices, and operating system(s) (including system virtual machines) for which the Software was designed where the Software will be installed and/or used.
1.4. End User (You/Your) – means the organization for which the Software is downloaded or acquired and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf. For purposes hereof the term «organization,» without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority.
1.5. Partner(s) means organizations or individual(s) who distributes the Software based on an agreement and license with the Rightholder.
1.6. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies, additions, or maintenance packs, etc.
1.7. User Manual means user manual, administrator guide, reference book and related explanatory or other materials.
The on-line version of the User Manual is available on the Rightholder’s website: https://www.kaspersky.com and may be updated when necessary.
1.8. Activation Code is a unique set of characters which can be used to activate the Software.
1.9. Key File – means a file with the extension «.key», which can be used to activate the Software.
1.10. License Certificate means a document that is given to the End User which is accompanied by a Key File and Activation Code as well as further information about the license.
1.11. Web-Portal means services provided by the Rightholder and used for management of the installed Software and granted licenses, as well as to obtain and/or store information obtained from the Software and for contacting technical support. As a Web-Portal, «Company Account», «Kaspersky Endpoint Security Cloud» can be used. Any other web resource that is used for the above purposes may also be used.
 
2. Grant of license
2.1. You are granted a non-exclusive license to use the Software within the scope of the functionality described in the User Manual or on the Rightholder’s Technical Support website, provided You comply with all technical requirements described in the User Manual, as well as restrictions and terms of use specified in this License Agreement.
Trial Version. If You have received, downloaded and/or installed a trial version of the Software and are hereby granted an evaluation license for the Software, You may use the Software only for evaluation purposes and only during the single applicable evaluation period, unless otherwise indicated, from the date of the initial installation. Any use of the Software for other purposes or beyond the applicable evaluation period is strictly prohibited.
Multiple Environment Software; Multiple Language Software; Dual Media Software; Multiple Copies; Bundles. If You use different versions of the Software or different language editions of the Software, if You receive the Software on multiple media, if You otherwise receive multiple copies of the Software, or if You received the Software bundled with other software, the total permitted number of Your Computers on which all versions of the Software are installed shall correspond to the number of Computers specified in licenses You have obtained provided that unless the licensing terms provide otherwise, each acquired license entitles You to install and use the Software on such a number of Computer(s) as is specified in Clause 2.2.
2.2. You have the right to use the Software for protection of such a number of Computer(s) as is specified on the License Certificate.
2.3. You have the right to make a copy of the Software solely for back-up purposes and only to replace the legally owned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used for other purposes and must be destroyed when You lose the right to use the Software or when Your license expires or is terminated for any other reason according to the legislation in force in the country of Your principal residence or in the country where You are using the Software.
2.4. From the time of the Software activation or after license Key File installation (with the exception of a trial version of the Software) You have the right to receive the following services from the Rightholder or its Partners for the period specified in the License Certificate:
— Updates of the Software via the Internet when and as the Rightholder publishes them on its website or through other online services. Any Updates that You may receive become part of the Software and the terms and conditions of this Agreement apply to them;
— Technical Support via the Internet and Technical Support telephone hotline;
— Access to information and auxiliary resources of the Rightholder.
 
3. Activation and Term
3.1. If You modify Your Computer or make changes to other vendors’ software installed on it, You may be required by the Rightholder to repeat activation of the Software or license Key File installation.
3.2. You have the right to use a trial version of the Software as provided in Clause 2.1 without any charge for the single applicable evaluation period (30 days) from the time of the Software activation according to this Agreement, provided that the trial version does not entitle You to Updates and Technical support via the Internet and Technical support telephone hotline. If the Rightholder sets another duration for the single applicable evaluation period You will be informed via notification.
3.3. Your license to Use the Software is limited to the period of time as specified in the License Certificate, the remaining period can be viewed via means described in the User Manual.
3.4. Software functionality depends on the type of license being used, which is specified in the License Certificate. Software functionality corresponds to the description in the User Manual.
3.5. The Rightholder reserves the right to use any means and verification procedures to verify the validity of the license and/or legality of a copy of the Software installed and/or used on Your Computer. If there is no appropriate license or verification of the license cannot be performed in a reasonable amount of time, the Software will work with limited functionality.
3.6. You agree that in using the Software and in using any report or information derived as a result of using this Software, You will comply with all applicable international, national, state, regional and local laws and regulations, including, without limitation, privacy, copyright, export control and obscenity law.
3.7. Except as otherwise specifically provided herein, You may not transfer or assign any of the rights granted to You under this Agreement or any of Your obligations pursuant hereto.
 
4. Technical Support
4.1. The Technical Support described in Clause 2.4 of this Agreement is provided to You (except for a trial version of the Software) in accordance with Technical Support rules.
Technical support service and its rules are located at: https://support.kaspersky.com/.
 
5. Conditions regarding Data Processing
5.1. Under this Section additional definitions are introduced:
Data Subject – means a natural person who is a representative of the End User and/or who uses the Software directly or indirectly, including a worker, contractor, employee, or client of the End User in respect of whom the data is transmitted and processed in the context of the End User’s activities, including data which could be determined as personal data under the laws of some countries. Data Subject may also include any individual who communicates and transmits his or her data to the End User.
5.2. Where the Activation Code is used to activate the Software, in order to verify legitimate use of the Software, the End User agrees to periodically provide the Rightholder the following information: the type, version and localization of the installed Software, versions of the installed Updates, the identifier of the Computer and the identifier of the Software installation on the Computer, the activation code and unique activation identifier for the current license, the type, version and word size of the operating system, the name of the virtual environment when the Software is installed in a virtual environment, and identifiers of the Software components that are active at the time the information is provided, the supported data source, timeout, date and time on the user’s computer, protocol version, protocol content type, protocol content length, the type of data compression used, the type of signature on the activation ticket, Regional Activation Center identifier, activation code hash calculated using the SHA1 algorithm, ticket body hash calculated using the SHA1 algorithm, license ticket creation date and time, license activation identifier, current license ticket identifier, license ticket sequence identifier, date and time of license activation, date and time of license expiration, license status, license version, the unique identifier of the user’s computer, license ticket header version, application name, transferred data type, transferred data scheme version, the full version of the operating system, description of the used virtual machine.
The Rightholder can use such information also for gathering statistical information about the distribution and use of the Rightholder’s Software.
By using the Activation Code, the End User gives its consent to automatically transmit the data specified in this Paragraph. In case the End User does not agree to provide this information to the Rightholder, the Key File should be used to activate the Software.
5.3. The Rightholder undertakes the processing of all data received from the End User in accordance with the License Agreement, in particular the provisions of Section 5 «Conditions regarding Data Processing», as well as in accordance with functionality of the Software that the End User may use, unless otherwise specified in a separate written agreement between the End User and the Rightholder or its Partners.
5.4. The End User is solely responsible for acquainting itself with the User Manual, particularly in regards to data processing, with the Rightholder’s Privacy Policy, which describes data handling (https://www.kaspersky.com/Products-and-Services-Privacy-Policy) and independently determining whether they comply with the End User’s requirements.
5.5. The End User must comply with laws that apply to use of the Software, including laws on confidential information, personal data, data protection. The End User is responsible for implementing and maintaining confidentiality and security measures in respect of data when using Software components that process data without the participation of the Rightholder. The End User must determine the appropriate technical and organizational measures for the protection and confidentiality of the data during use of such components of the Software in accordance with the End User’s purposes (for example, generating reports).
5.6. In view of a clear determination of the respective responsibilities with respect to personal data of third parties, in particular natural persons, whose personal data is processed when the End User uses the Software, the Rightholder and the End User agree as follows:
The End User undertakes all necessary steps in order to enable the Data Subject to exercise his or her rights and to provide the Data Subject with the information required under applicable law, such as Article 13 and 14 of Regulation (EU) 2016/679 (General Data Protection Regulation, «GDPR») (if Data Subject is in the European Union), or other applicable laws on confidential information, personal data, data protection, or similar thereto.
5.7. During use of the Software, especially where the End User configures the Software to use the Kaspersky Security Network, the End User is fully responsible for ensuring that the processing of personal data of Data Subjects is lawful, particularly, within the meaning of Article 6 (1) (a) to (f) of Regulation (EU) 2016/679 (General Data Protection Regulation, «GDPR») (if Data Subject is in the European Union) or applicable laws on confidential information, personal data, data protection, or similar thereto.
5.8. In reference to the legal bases for data processing, in case that the End User wants to base the lawfulness of the processing on the consent of its Data Subjects, the End User must ensure that the consent which meets all requirements of the applicable laws, especially where the Data Subject is in the European Union and Article 6 (1) (a) GDPR applies, was given by each Data Subject of the End User prior to using the Software. The End User guarantees that consent of each Data Subject of the End User was obtained prior to the processing of personal data.
5.9. It is agreed between the Rightholder and End User that, in case of item 5.8 of this License Agreement, the End User is responsible for proving the existence of effective consent to the processing of personal data, especially according to Article 7 (1) GDPR where Data Subject is in the European Union. The End User guarantees that it is able to and will prove the existence of each Data Subject’s consent at any time upon request by the Rightholder within 5 business days starting with the request of the Rightholder.
5.10. Furthermore, in case of item 5.8 of this License Agreement, the End User is obliged and has the full and sole responsibility to provide each individual Data Subject with all information required by applicable law to obtain consent, especially under Article 13 GDPR (if Data Subject is in the European Union), prior to using the Software. In particular, the End User is obliged to provide each Data Subject in the European Union, or where applicable law requires, with the Rightholder’s Privacy Policy (https://www.kaspersky.com/Products-and-Services-Privacy-Policy) prior to using the Software.
5.11. The End User shall be fully liable in relation to the Rightholder for any damage resulting from a breach of this License Agreement, in particular the End User’s failure to obtain effective consent of Data Subject, where applicable, and/or from a failure to obtain sufficient effective consent and/or from the lack of proof and/or belated proof of effective consent of Data Subject and/or from any other violation of an obligation under this agreement.
5.12. The End User shall indemnify the Rightholder in relation to third parties from the claims arising from the failure of End User to fulfill obligations under Section 5 «Conditions regarding Data Processing» which third parties, especially the supervisory data protection authorities, assert against the Rightholder.
5.13. If You use the Rightholder’s update servers to download the Updates, the End User, in order to increase the efficiency of the update procedure, agrees to periodically provide the Rightholder the following information: Software ID (AppID), the active license ID, the unique software installation ID (InstallationID), the unique update task launch ID (SessionID), Software version (BuildInfo).
The Rightholder can use such information also for receiving statistical information about the distribution and use of the Rightholder’s Software.
By downloading the Updates from the Rightholder’s update servers, the End User gives its consent to automatically transmit the data specified in this Clause. In case the End User does not agree to provide this information to the Rightholder, the End User must obtain the Updates from a local shared folder as described in the User Manual.
 
6. Limitations
6.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non-waivable right granted to You by applicable legislation, and You shall not otherwise reduce any part of the Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable law. Neither the Software’s binary code nor source code may be used or reverse engineered to re-create the program algorithm, which is proprietary. All rights not expressly granted herein are reserved by the Rightholder and/or its suppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the license granted hereunder and may result in criminal and/or civil prosecution against You.
6.2. You shall not transfer the rights to use the Software to any third party.
6.3. You shall not provide the Activation Code and/or Key File to third parties or allow third parties access to the Activation Code and/or Key File, which are deemed confidential data of the Rightholder.
6.4. You shall not rent, lease or lend the Software to any third party.
6.5. You shall not use the Software in the creation of data or Software used for detection, blocking or treating threats described in the User Manual.
6.6. Your Key File may be blocked in case You breach any of the terms and conditions of this Agreement.
6.7. If You are using the trial version of the Software You do not have the right to receive the Technical Support specified in Clause 4 of this Agreement and You don’t have the right to transfer the license or the rights to use the Software to any third party.
6.8. Violation of the intellectual rights to the Software shall result in civil, administrative or criminal liability in accordance with the law.
 
7. Limited Warranty and Disclaimer
7.1. The Rightholder guarantees that the Software will substantially perform according to the specifications and descriptions set forth in the User Manual provided however that such limited warranty shall not apply to the following: (w) Your Computer’s deficiencies and related infringement for which the Rightholder expressly disclaims any warranty responsibility; (x) malfunctions, defects, or failures resulting from misuse; abuse; accident; neglect; improper installation, operation or maintenance; theft; vandalism; acts of God; acts of terrorism; power failures or surges; casualty; alteration, non-permitted modification, or repairs by any party other than the Rightholder; or any other third parties’ or Your actions or causes beyond the Rightholder’s reasonable control; (y) any defect not made known by You to the Rightholder as soon as practical after the defect first appears; and (z) incompatibility caused by hardware and/or Software components installed on Your Computer.
7.2. You acknowledge, accept and agree that no software is error free and You are advised to back-up the Computer, with frequency and reliability suitable for You.
7.3. The Rightholder does not provide any guarantee that the Software will work correctly in case of violations of the terms described in the User Manual or in this Agreement.
7.4. The Rightholder does not guarantee that the Software will work correctly if You do not regularly download Updates specified in Clause 2.4 of this Agreement.
7.5. The Rightholder does not guarantee protection from the threats described in the User Manual after the expiration of the period specified in the License Certificate or after the license to use the Software is terminated for any reason.
7.6. You acknowledge that the Software will be provisioned with the Rightholder’s standard settings applied by default and that it is Your sole responsibility to configure the Software to satisfy Your own requirements.
7.7. THE SOFTWARE IS PROVIDED «AS IS» AND THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE. EXCEPT FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW THE RIGHTHOLDER AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR TERM (EXPRESSED OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE. YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THE RIGHTHOLDER.
 
8. Exclusion and Limitation of Liability
8.1. You acknowledge and agree that the Software will engage in actions necessary for performance.
8.2. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATION, SOFTWARE, AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER AND/OR ANY OF ITS PARTNERS, EVEN IF THE RIGHTHOLDER AND/OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
 
YOU AGREE THAT IN THE EVENT THE RIGHTHOLDER AND/OR ITS PARTNERS ARE FOUND LIABLE, THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS SHALL BE LIMITED BY THE COSTS OF THE SOFTWARE. IN NO CASE SHALL THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS EXCEED THE FEES PAID FOR THE SOFTWARE TO THE RIGHTHOLDER OR THE PARTNER (AS MAY BE APPLICABLE).
 
NOTHING IN THIS AGREEMENT EXCLUDES OR LIMITS ANY CLAIM FOR DEATH AND PERSONAL INJURY. FURTHER IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BE EXCLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER, EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS, EXCLUSIONS AND LIMITATIONS.
 
9. GNU and Other Third Party licenses
9.1. The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code («Open Source Software»). If such licenses require that for any Software, which is distributed to someone in an executable binary format, that the source code also be made available to those users, then the source code should be made available by sending the request to source@kaspersky.com or the source code is supplied with the Software. If any Open Source Software licenses require that the Rightholder provide rights to use, copy or modify an Open Source Software program that are broader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein.
 
10. Intellectual Property Ownership
10.1. You agree that the Software and the authorship, systems, ideas, methods of operation, documentation and other information contained in the Software, are proprietary intellectual property and/or the valuable trade secrets of the Rightholder or its Partners and that the Rightholder and its Partners, as applicable, are protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the Russian Federation, European Union and the United States, as well as other countries and international treaties. This Agreement does not grant to You any rights to the intellectual property including any the Trademarks or Service Marks of the Rightholder and/or its Partners («Trademarks»). You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice, including identification of the Trademark owner’s name. Such use of any Trademark does not give You any rights of ownership in that Trademark. The Rightholder and/or its Partners own and retain all right, title, and interest in and to the Software, including without limitation any error corrections, enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights therein. Your possession, installation or use of the Software does not transfer to You any title to the intellectual property in the Software, and You will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software. Except as stated herein, this Agreement does not grant You any intellectual property rights in the Software and You acknowledge that the license, as further defined herein, granted under this Agreement only provides You with a right of limited use under the terms and conditions of this Agreement. The Rightholder reserves all rights not expressly granted to You in this Agreement.
10.2. You agree not to modify or alter the Software in any way. You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software.
 
11. Governing Law; Arbitration
11.1. This Agreement will be governed by and construed in accordance with the laws of the Russian Federation without reference to conflicts of law rules and principles. This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded. Any dispute arising out of the interpretation or application of the terms of this Agreement or any breach thereof shall, unless it is settled by direct negotiation, be settled by in the International Commercial Arbitration Court at the Russian Federation Chamber of Commerce and Industry in Moscow, the Russian Federation. Any award rendered by the arbitrator shall be final and binding on the parties and any judgment on such arbitration award may be enforced in any court of competent jurisdiction. Nothing in this Section 11 shall prevent a Party from seeking or obtaining equitable relief from a court of competent jurisdiction, whether before, during or after arbitration proceedings.
 
12. Period for Bringing Actions
12.1. No action, regardless of form, arising out of the transactions under this Agreement, may be brought by either party hereto more than one (1) year after the cause of action has occurred, or was discovered to have occurred, except that an action for infringement of intellectual property rights may be brought within the maximum applicable statutory period.
 
13. Entire Agreement; Severability; No Waiver
13.1. This Agreement is the entire agreement between You and the Rightholder and supersedes any other prior agreements, proposals, communications or advertising, oral or written, with respect to the Software or to subject matter of this Agreement. You acknowledge that You have read this Agreement, understand it and agree to be bound by its terms. If any provision of this Agreement is found by a court of competent jurisdiction to be invalid, void, or unenforceable for any reason, in whole or in part, such provision will be more narrowly construed so that it becomes legal and enforceable, and the entire Agreement will not fail on account thereof and the balance of the Agreement will continue in full force and effect to the maximum extent permitted by law or equity while preserving, to the fullest extent possible, its original intent. No waiver of any provision or condition herein shall be valid unless in writing and signed by You and an authorized representative of the Rightholder provided that no waiver of any breach of any provisions of this Agreement will constitute a waiver of any prior, concurrent or subsequent breach. The Rightholder’s failure to insist upon or enforce strict performance of any provision of this Agreement or any right shall not be construed as a waiver of any such provision or right.
 
14. Rightholder Contact Information
Should You have any questions concerning this Agreement, or if You desire to contact the Rightholder for any reason, please contact our Customer Service Department at:
 
AO Kaspersky Lab, Bldg. 3, 39A, Leningradskoe Shosse
Moscow, 125212
Russian Federation
E-mail: info@kaspersky.com
Web site: https://www.kaspersky.com/
 
© 2021 AO Kaspersky Lab

Kaspersky Security Center 13 Web Console, iOS MDM Server, Microsoft Exchange Mobile Devices Server, Administration Console, Kaspersky Security Center 13 Network Agent for Linux, Kaspersky Security Center 13 Network Agent for Mac KASPERSKY LAB END USER LICENSE AGREEMENT

BY CLICKING THE ACCEPT BUTTON IN THE LICENSE AGREEMENT WINDOW OR BY USING THE SOFTWARE YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE THAT THIS AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, CANCEL THE INSTALLATION OF THE SOFTWARE AND DO NOT INSTALL THE SOFTWARE OR DO NOT USE THE SOFTWARE.

IF LICENSE CONTRACT OR SIMILAR DOCUMENT ACCOMPANIES SOFTWARE, TERMS OF THE SOFTWARE USE DEFINED IN SUCH DOCUMENT PREVAIL OVER CURRENT END USER LICENSE AGREEMENT.

1. Definitions
1.1. Software means software Kaspersky Security Center 13 Web Console, iOS MDM Server, Microsoft Exchange Mobile Devices Server, Administration Console, Kaspersky Security Center 13 Network Agent for Linux, Kaspersky Security Center 13 Network Agent for Mac, including any Updates and related materials.
1.2. Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means AO Kaspersky Lab, a company incorporated according to the laws of the Russian Federation.
1.3. Computer(s) means combination of hardware(s), including personal computers, laptops, workstations, personal digital assistants, ‘smart phones’, hand-held devices, or other electronic devices, and operating system(s) (including system virtual machines) for which the Software was designed where the Software will be installed and/or used.
1.4. End User (You/Your) means the organization for which the Software is downloaded or installed and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf. For purposes hereof the term “organization”, without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority. If the Software was downloaded or installed on behalf of individual, End User («You») further means such individual.
1.5. Partner(s) means organizations or individual(s), who distributes the Software based on an agreement and license with the Rightholder.
1.6. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies, additions or maintenance packs etc.
1.7. User Manual means user manual, administrator guide, reference book and related explanatory or other materials.

2. Grant of License
2.1. You are given a non-exclusive license to store, load, install, execute, and display (to “use”) the free of charge Software, according to the all technical requirements described in the User Manual and according to the terms and conditions of this Agreement (the “License”).
2.2. You have the right to make a copy of the Software solely for back-up purposes and only to replace the legally owned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used for other purposes and must be destroyed when you lose the right to use the Software.

3. Term and termination
3.1. The Software can be used perpetually upon your acceptance of this Agreement.
3.2. Without prejudice to any other remedy in law or in equity that the Rightholder may have, in the event of any breach by You of any of the terms and conditions of this Agreement, the Rightholder shall at any time without notice to You be entitled to terminate this License.
3.3. You agree that in using the Software and in using any report or information derived as a result of using this Software, you will comply with all applicable international, national, state, regional and local laws and regulations, including, without limitation, privacy, copyright, export control and obscenity law.

4. Technical Support
4.1. Technical Support is provided only for clients of the commercial versions of the Rightholder’s software in accordance with the Technical Support rules.
Technical support service and its rules are located at: https://support.kaspersky.com/.

5. Limitations
5.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non-waivable right granted to You by applicable legislation, and you shall not otherwise reduce any part of the Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable law. Neither Software’s binary code nor source code may be used or reverse engineered to re-create the program algorithm, which is proprietary. All rights not expressly granted herein are reserved by Rightholder and/or its suppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the License granted hereunder and may result in criminal and/or civil prosecution against You.
5.2. You shall not transfer the rights to use the Software to any third party.
5.3. You shall not rent, lease or lend the Software to any third party.
5.4. You shall not use the Software in the creation of data or software used for detection, blocking or treating threats described in the User Manual.
5.5. Violation of the intellectual rights to the Software shall result in civil, administrative or criminal liability in accordance with the law.

6. Limited Warranty and Disclaimer
6.1. THE SOFTWARE IS PROVIDED «AS IS» AND AO KASPERSKY LAB MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE. EXCEPT FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW AO KASPERSKY LAB AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR TERM (EXPRESS OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE. YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, AO KASPERSKY LAB MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THE RIGHTHOLDER.

7. Exclusion and Limitation of Liability
7.1. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATON, SOFTWARE, AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER AND/OR ANY OF ITS PARTNERS, EVEN IF THE RIGHTHOLDER AND/OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

YOU AGREE THAT IN THE EVENT THE RIGHTHOLDER AND/OR ITS PARTNERS ARE FOUND LIABILE, THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS SHALL BE LIMITED BY THE COSTS OF THE SOFTWARE. IN NO CASE SHALL THE LIABILITY OF THE RIGHTHOLDER AND/OR ITS PARTNERS EXCEED THE FEES PAID FOR THE SOFTWARE TO THE RIGHTHOLDER OR THE PARTNER (AS MAY BE APPLICABLE).

NOTHING IN THIS AGREEMENT EXCLUDES OR LIMITS ANY CLAIM FOR DEATH AND PERSONAL INJURY. FURTHER IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS AGREEMENT CANNOT BE EXLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY SUCH DISCLAIMER, EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS, EXCLUSIONS AND LIMITATIONS.

8. GNU and Other Third-Party Licenses
8.1. The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code «Open-Source Software»). If such licenses require that for any software, which is distributed to someone in an executable binary format, that the source code also be made available to those users, then the source code should be made available by sending the request to source@kaspersky.com or the source code is supplied with the Software. If any Open-Source Software licenses require that the Rightholder provide rights to use, copy or modify an Open-Source Software program that are broader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein.

9. Intellectual Property Ownership
9.1. You agree that the Software and the authorship, systems, ideas, methods of operation, documentation and other information contained in the Software, are proprietary intellectual property and/or the valuable trade secrets of the Rightholder or its partners and that the Rightholder and its partners, as applicable, are protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the Russian Federation, European Union and the United States of America, as well as other countries and international treaties. This Agreement does not grant to You any rights to the intellectual property including any trademarks or service marks of the Rightholder and/or its partners («Trademarks»). You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice, including identification of the Trademark owner’s name. Such use of any Trademark does not give you any rights of ownership in that Trademark. The Rightholder and/or its partners own and retain all right, title, and interest in and to the Software, including without limitation any error corrections, enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights therein. Your possession, installation or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software. Except as stated herein, this Agreement does not grant you any intellectual property rights in the Software and you acknowledge that the License granted under this Agreement only provides you with a right of limited use under the terms and conditions of this Agreement. Rightholder reserves all rights not expressly granted to you in this Agreement.
9.2. You acknowledge that the source code is proprietary to the Rightholder and constitutes trade secrets of the Rightholder. You agree not to modify, adapt, translate, reverse engineer, decompile, disassemble or otherwise attempt to discover the source code of the Software in any way.
9.3. You agree not to modify or alter the Software in any way. You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software.

10. Governing Law; Arbitration
10.1. Except as provided in Clauses 10.2 and 10.3 below, this Agreement shall be governed by and construed in accordance the laws specified below for the country or territory in which you obtained the Software, without reference to or application of conflicts of laws principles:
a. Russia. If you obtained the Software in Russia, the laws of the Russian Federation.
b. United States, Puerto Rico, American Samoa, Guam, and U.S. Virginia Islands. If you obtained the Software in the United States, Puerto Rico, American Samoa, Guam or the U.S. Virgin Islands, the laws of the State of Massachusetts, USA, provided, however, that the laws of the U.S. state where you live will govern claims under state consumer protection, unfair competition, or similar laws. To the fullest extent permitted by law, the Rightholder and you expressly agree hereby to waive any right to a trial by jury.
c. Canada. If you obtained the Software in Canada, the laws of the Province of Ontario.
d. Mexico. If you obtained the Software in Mexico, the federal laws of the Republic of Mexico.
e. European Union (EU). If you obtained the Software in a member country of the EU, the laws of Germany.
f. Australia. If you obtained the Software in Australia, the laws of the State or Territory in which you obtained the license.
g. Hong Kong Special Administration Region (SAR) and Macau SAR. If you obtained the Software in Hong Kong SAR or Macau SAR, the laws of Hong Kong SAR.
h. Taiwan. If you obtained the Software in Taiwan, the laws of Taiwan.
i. Japan. If you obtained the Software in Japan, the laws of Japan.
j. Any Other Country or Territory. If you obtained the Software in any other country, the substantive laws of the country where the purchase took place would be in effect.
10.2. Notwithstanding the foregoing, if the mandatory laws or public policy of any country or territory in which this Agreement is enforced or construed prohibit the application of the law specified herein, then the laws of such country or territory shall instead apply to the extent required by such mandatory laws or public policy. Similarly, if you are an individual consumer, the provisions of Clause 10.1 shall not affect any mandatory right you may have to take action in your country of residence under the laws of that country.
10.3. This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded.
10.4. The End User is responsible for contacting only the Right Holder or their partners directly if having any problems with the product.

11. Period for Bringing Actions
11.1. No action, regardless of form, arising out of the transactions under this Agreement, may be brought by either party hereto more than one (1) year after the cause of action has occurred, or was discovered to have occurred, except that an action for infringement of intellectual property rights may be brought within the maximum applicable statutory period.

12. Entire Agreement; Severability; No Waiver
12.1. This Agreement is the entire agreement between you and Rightholder and supersedes any other prior agreements, proposals, communications or advertising, oral or written, with respect to the Software or to subject matter of this Agreement. You acknowledge that you have read this Agreement, understand it and agree to be bound by its terms.
12.2. If any provision of this Agreement is found by a court of competent jurisdiction to be invalid, void, or unenforceable for any reason, in whole or in part, such provision will be more narrowly construed so that it becomes legal and enforceable, and the entire Agreement will not fail on account thereof and the balance of the Agreement will continue in full force and effect to the maximum extent permitted by law or equity while preserving, to the fullest extent possible, its original intent.
12.3. No waiver of any provision or condition herein shall be valid unless in writing and signed by you and an authorized representative of Rightholder provided that no waiver of any breach of any provisions of this Agreement will constitute a waiver of any prior, concurrent or subsequent breach. Rightholder’s failure to insist upon or enforce strict performance of any provision of this Agreement or any right shall not be construed as a waiver of any such provision or right.

13. Rightholder Contact Information

Should you have any questions concerning this Agreement, or if you desire to contact the Rightholder for any reason, please contact our Customer Service Department at:

AO Kaspersky Lab, 39A/3, Leningradskoe Shosse
Moscow, 125212
Russian Federation
E-mail: info@kaspersky.com
Web site: https://www.kaspersky.com/

© 2018 AO Kaspersky Lab

Kaspersky Security for Mobile END USER LICENSE AGREEMENT

KASPERSKY END USER LICENSE AGREEMENT (“LICENSE AGREEMENT”)
 
IMPORTANT LEGAL NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFORE YOU START USING THE SOFTWARE.
 
CLICKING THE BUTTON INDICATING YOUR ACCEPTANCE IN THE WINDOW CONTAINING THE LICENSE AGREEMENT, OR BY ENTERING CORRESPONDING SYMBOL(-S), YOU CONFIRM IN A LEGALLY BINDING WAY THAT YOU AS THE ORGANIZATION FOR WHICH THE SOFTWARE IS DOWNLOADED OR ACQUIRED HAVE AUTHORIZED THE NATURAL PERSON ACCEPTING THIS LICENSE AGREEMENT TO ENTER INTO THIS LICENSE AGREEMENT FOR AND ON BEHALF OF YOU. FURTHERMORE, YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS LICENSE AGREEMENT AND AGREE THAT THIS LICENSE AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT, CANCEL THE INSTALLATION OF THE SOFTWARE AND DO NOT INSTALL THE SOFTWARE.
 
IF LICENSE CONTRACT OR SIMILAR DOCUMENT ACCOMPANIES SOFTWARE, TERMS OF THE SOFTWARE USE DEFINED IN SUCH DOCUMENT PREVAIL OVER THE CURRENT LICENSE AGREEMENT.
 
AFTER CLICKING THE ACCEPT BUTTON IN THE WINDOW CONTAINING THE LICENSE AGREEMENT OR AFTER ENTERING CORRESPONDING SYMBOL(-S), YOU HAVE THE RIGHT TO USE THE SOFTWARE IN ACCORDANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT.

1. Definitions
1.1. Software means software including any Updates and related materials.
1.2. Rightholder (owner of all rights, whether exclusive or otherwise to the Software) means AO Kaspersky Lab, a company incorporated according to the laws of the Russian Federation.
1.3 Object of protection means operating system(s) and system virtual machines and hardware(s) including workstation, the mobile device and server for which the Software was designed and/or where the Software can be installed and/or used as well as email boxes and other objects protected or controlled by the Software.
1.4. Computer(s) means combination of hardware(s), including personal computers, laptops, workstations, personal digital assistants, ‘smart phones’, hand-held devices, or other electronic devices, and operating system(s) (including system virtual machines) for which the Software was designed where the Software will be installed and/or used.
1.5. Standard version of the Software means free of charge version of the Software.
1.6. Extended version of the Software means version of the Software with functionality available only after activation.
1.7. End User (You/Your) means individual(s) installing or using the Software on his or her own behalf or who is legally using a copy of the Software; or, if the Software is being downloaded or installed on behalf of an organization, such as an employer. “You” further means the organization for which the Software is downloaded or installed and it is represented hereby that such organization has authorized the person accepting this agreement to do so on its behalf. For purposes hereof the term “organization,” without limitation, includes any partnership, limited liability company, corporation, association, joint stock company, trust, joint venture, labor organization, unincorporated organization, or governmental authority.
1.8. Administration Console is a functionality provided by Kaspersky Security Center — and the dedicated web portal (if available) — used to manage the Software installed and to issue licenses, as well as to store and display information obtained from the Software described in Section 4.
1.9. Partner(s) means organizations or individual(s), who distributes the Software based on an agreement and license with the Rightholder.
1.10. Update(s) means all upgrades, revisions, patches, enhancements, fixes, modifications, copies, additions or maintenance packs etc.
1.11. User Manual means user manual, administrator guide, reference book and related explanatory or other materials.
1.12. The activation code is a unique set of 20 characters, which can be used for activation the Software.
1.13. License Certificate means a document that is given to the User which is accompanied by a license key and activation code as well as further information about the license.

2. Grant of License
2.1. You are given a non-exclusive license to store, load, install, execute, and display (to “use”) the Software for a specified number of Objects of protection according to all technical requirements described in the User Manual and according to the terms and conditions of this Agreement (the “License”) and you accept this License:
Trial Version. If you have received, downloaded and/or installed a trial version of the Extended version of the Software and are hereby granted an evaluation license for the Extended version of the Software, you may use the Extended version of the Software only for evaluation purposes and only during the single applicable evaluation period, unless otherwise indicated, from the date of the initial installation. Any use of the Extended version of the Software for other purposes or beyond the applicable evaluation period is strictly prohibited.
Multiple Environment Software; Multiple Language Software; Dual Media Software; Multiple Copies; Bundles. If you use different versions of the Software or different language editions of the Software, if you receive the Software on multiple media, if you otherwise receive multiple copies of the Software, or if you received the Software bundled with other software, the total permitted number of your Objects of protection for which all versions of the Software are installed shall correspond to the number of Objects of protection specified in licenses you have obtained provided that, unless the licensing terms provide otherwise, each acquired license entitles you to install and use the Software for such a number of Object(s) of protection as is specified in Clause 2.2.
2.2. You have the right to use the Extended version of the Software for protection of such a number of Object(s) of protection as is specified on the License Certificate.
2.3. You have the right to make a copy of the Software solely for back-up purposes and only to replace the legally owned copy if such copy is lost, destroyed or becomes unusable. This back-up copy cannot be used for other purposes and must be destroyed when you lose the right to use the Software or when Your license expires or is terminated for any other reason according to the legislation in force in the country of your principal residence or in the country where You are using the Software.
2.4. From the time of the Extended version of the Software activation or after license key file installation You have the right to receive the following services from the Rightholder or its Partners for the period specified in the License Certificate:
— Updates of the Software via the Internet when and as the Rightholder publishes them on its website or through other online services. Аny Updates that you may receive become part of the Software and the terms and conditions of this Agreement apply to them;
— Technical Support via the Internet and Technical Support telephone hotline;
— Access to information and auxiliary resources of the Rightholder.

3. Term and termination
3.1. If You modify Your Computer or make changes to other vendors’ software installed on it, You may be required by the Rightholder to repeat activation of the Software or license key file installation. The Rightholder reserves the right to use any means and verification procedures to verify the validity of the License and/or legality of a copy of the Software installed and/or used on Your Computer.
3.2. You have the right to use a trial version of the Extended version of the Software as provided in Clause 2.1 without any charge for the single applicable evaluation period (30 days) from the time of the Extended version of the Software activation according to this Agreement provided that the trial version does not entitle You to Updates and Technical support via the Internet and Technical support via telephone hotline. If Rightholder sets another duration for the single applicable evaluation period You will be informed via notification.
3.3. Your License to Use the Extended version of the Software is limited to the period of time as specified in the License Certificate, the remaining period can be viewed via means described in the User Manual.
3.4. The functionality the Extended version of Software depends on the type of license being used, which is specified in the License Certificate. Software functionality corresponds to the description in the User Manual.
3.5. After expiration of license period of the Extended version as is specified in Clauses 2.2 or 3.3, the functionality of the Extended version of the Software is limited to the functionality of the Standard version of the Software.
3.6. The period of use of the Standard version of the Software is not limited by the Rightholder.
3.7. Without prejudice to any other remedy in law or in equity that the Rightholder may have, in the event of any breach by You of any of the terms and conditions of this Agreement, the Rightholder shall at any time without notice to You be entitled to terminate this License without refunding the purchase price or any part thereof.
3.8. To check the legitimacy of the Software use the Rightholder reserves the right to use means to verify that You have licensed copy of the Software.
3.9. You agree that when using the Software, or when using a report or information obtained as a result of using the Software, You shall comply with all international, national, state, regional and local laws and agreements, including (but not limited to) laws pertaining to privacy, copyright, export control and indecent behavior.
3.10. In case of using VMWare AirWatch service for the Software installation, You may need to provide code 6e72ac372e87335636c103b6b6a22d04 to confirm reading, understanding and acceptance of this License Agreement.

4. Using Administration Console and providing information for Administration Console
4.1. As described in the User Guide, the User of Administration Console can obtain information from the Software to track the location of the computer on which the Software is being used, to capture images from the computer’s camera (if available), and to block (unlock) access to information and (or) to the computer on which the Software is installed.
4.2. The Rightholder shall not be liable for delays or failures in the operation of the Software resulting from the service provided by Internet service providers and/or mobile communications providers.
4.3. The Software may not be used to carry out illegal activities, including for the purpose of tracking.

5. Technical Support
5.1. The Technical Support described in Clause 2.4 of this Agreement is provided only for Corporate Customers when the latest Update of the Software is installed in accordance with Technical Support rules.
Technical support service and its rules are located at: http://support.kaspersky.com.

6. Conditions regarding Data Processing
6.1. Under this Section additional definitions are introduced:
Data Subject – means a natural person who is a representative of the End User and/or who uses the Software directly or indirectly, including a worker, contractor, employee, or client of the End User in respect of whom the data is transmitted and processed in the context of the End User’s activities, including data which could be determined as personal data under the laws of some countries. Data Subject may also include any individual who communicates and transmits his or her data to the End User.
6.2. Where the Activation Code is used to activate the Software, in order to verify legitimate use of the Software, the End User agrees to periodically provide the Rightholder the following information: format of the data in the request to Rightholder infrastructure; accessed IPv4 address of the web service; size of the content of the request to Rightholder infrastructure; protocol ID; Software activation code; data compression type; Software ID; set of IDs of Software that can be activated on the user’s device; Software localization; full version of the Software; unique device ID; date and time on the user’s device; Software installation ID (PCID); OS version, OS build number, OS update number, OS edition, extended information about the OS edition; device model; operating system family; format of the data in the request to Rightholder infrastructure; checksum type for the object being processed; Software license header; ID of a regional activation center; Software license key creation date and time; Software license ID; ID of the information model used to provide the Software license; Software license expiration date and time; current status of the Software license key; type of Software license used; type of the license used to activate the Software; Software ID derived from the license.
The Rightholder can use such information also for gathering statistical information about the distribution and use of the Rightholder’s Software.
By using the Activation Code, the End User gives its consent to automatically transmit the data specified in this Clause. In case the End User does not agree to provide this information to the Rightholder, the Key File should be used to activate the Software.
6.3. In order to protect the Computer against information security threats, the End User agrees to periodically provide the Rightholder the following information:
• checksum type for the object being processed; checksum of the object being processed; the Software component ID;
• ID of the triggered record in the Software’s anti-virus databases; timestamp of the triggered record in the Software’s anti-virus databases; type of the triggered record in the Software’s anti-virus databases; name of the detected malware or legitimate software that can be used to damage the user’s device or data;
• name of store from which the application was installed; application package name; public key used to sign the APK file; checksum of the certificate used to sign the APK file; digital certificate timestamp;
• full version of the Software; Software update ID; type of installed Software; the config identifier; the result of the Software action; error code.
By using the Software, the End User gives its consent to automatically transmit the data specified in this Clause. In case the End User does not agree to provide this information to the Rightholder, the End User must cancel the installation of the Software and must not install the Software.
6.4. The Rightholder undertakes the processing of all data received from the End User in accordance with the License Agreement, in particular the provisions of Section 6 “Conditions regarding Data Processing,” as well as in accordance with functionality of the Software that the End User may use, unless otherwise specified in a separate written agreement between the End User and the Rightholder or its Partners.
6.5. The End User is solely responsible for acquainting itself with the User Manual, particularly in regards to data processing, with the Rightholder’s Privacy Policy, which describes data handling (https://www.kaspersky.com/Products-and-Services-Privacy-Policy) and independently determining whether they comply with the End User’s requirements.
6.6. The End User must comply with laws that apply to use of the Software, including laws on confidential information, personal data, data protection. The End User is responsible for implementing and maintaining confidentiality and security measures in respect of data when using Software components that process data without the participation of the Rightholder. The End User must determine the appropriate technical and organizational measures for the protection and confidentiality of the data during use of such components of the Software in accordance with the End User’s purposes (for example, generating reports).
6.7. In view of a clear determination of the respective responsibilities with respect to personal data of third parties, in particular natural persons, whose personal data is processed when the End User uses the Software, the Rightholder and the End User agree as follows:
The End User undertakes all necessary steps in order to enable the Data Subject to exercise his or her rights and to provide the Data Subject with the information required under applicable law, such as Article 13 and 14 of Regulation (EU) 2016/679 (General Data Protection Regulation, “GDPR”) (if Data Subject is in the European Union), or other applicable laws on confidential information, personal data, data protection, or similar thereto.
6.8. During use of the Software, especially where the End User configures the Software to use the Kaspersky Security Network, the End User is fully responsible for ensuring that the processing of personal data of Data Subjects is lawful, particularly, within the meaning of Article 6 (1) (a) to (f) of Regulation (EU) 2016/679 (General Data Protection Regulation, “GDPR”) (if Data Subject is in the European Union) or applicable laws on confidential information, personal data, data protection, or similar thereto.
6.9. In reference to the legal bases for data processing, in case that the End User wants to base the lawfulness of the processing on the consent of its Data Subjects, the End User must ensure that the consent which meets all requirements of the applicable laws, especially where the Data Subject is in the European Union and Article 6 (1) (a) GDPR applies, was given by each Data Subject of the End User prior to using the Software. The End User guarantees that consent of each Data Subject of the End User was obtained prior to the processing of personal data.
6.10. It is agreed between the Rightholder and End User that, in case of item 6.9 of this License Agreement, the End User is responsible for proving the existence of effective consent to the processing of personal data, especially according to Article 7 (1) GDPR where Data Subject is in the European Union. The End User guarantees that it is able to and will prove the existence of each Data Subject’s consent at any time upon request by the Rightholder within 5 business days starting with the request of the Rightholder.
6.11. Furthermore, in case of item 6.9 of this License Agreement, the End User is obliged and has the full and sole responsibility to provide each individual Data Subject with all information required by applicable law to obtain consent, especially under Article 13 GDPR (if Data Subject is in the European Union), prior to using the Software. In particular, the End User is obliged to provide each Data Subject in the European Union, or where applicable law requires, with the Rightholder’s Privacy Policy (https://www.kaspersky.com/Products-and-Services-Privacy-Policy) prior to using the Software.
6.12. The End User shall be fully liable in relation to the Rightholder for any damage resulting from a breach of this License Agreement, in particular the End User’s failure to obtain effective consent of Data Subject, where applicable, and/or from a failure to obtain sufficient effective consent and/or from the lack of proof and/or belated proof of effective consent of Data Subject and/or from any other violation of an obligation under this agreement.
6.13. The End User shall indemnify the Rightholder in relation to third parties from the claims arising from the failure of End User to fulfill obligations under Section 6 “Conditions regarding Data Processing” which third parties, especially the supervisory data protection authorities, assert against the Rightholder.
6.14. If You use the Rightholder’s update servers to download the Updates, the End User, in order to increase the efficiency of the update procedure, agrees to periodically provide the Rightholder the following information: Software ID derived from the license; full version of the Software; Software license ID; type of Software license used; Software installation ID (PCID); ID of the Software update start; web address being processed.
The Rightholder can use such information also for receiving statistical information about the distribution and use of the Rightholder’s Software.
By downloading the Updates from the Rightholder’s update servers, the End User gives its consent to automatically transmit the data specified in this Clause. In case the End User does not agree to provide this information to the Rightholder, the End User must obtain the Updates from another update source as described in the User Manual.
6.15. On devices with the operating system Android 10 or higher version, a unique device ID may be generated using the hash sum of the Advertising ID and the device model. In case where a user has reset the value of the Advertising ID, new and old values will be provided from the device immediately after the reset.

7. Limitations
7.1. You shall not emulate, clone, rent, lend, lease, sell, modify, decompile, or reverse engineer the Software or disassemble or create derivative works based on the Software or any portion thereof with the sole exception of a non-waivable right granted to You by applicable legislation, and you shall not otherwise reduce any part of the Software to human readable form or transfer the licensed Software, or any subset of the licensed Software, nor permit any third party to do so, except to the extent the foregoing restriction is expressly prohibited by applicable law. Neither Software’s binary code nor source may be used or reverse engineered to re-create the program algorithm, which is proprietary. All rights not expressly granted herein are reserved by Rightholder and/or its suppliers, as applicable. Any such unauthorized use of the Software shall result in immediate and automatic termination of this Agreement and the License granted hereunder and may result in criminal and/or civil prosecution against You.
7.2. You shall not transfer the rights to use the Software to any third party.
7.3. You shall not provide the activation code and/or license key file to third parties or allow third parties access to the activation code and/or license key which are deemed confidential data of Rightholder.
7.4. You shall not rent, lease or lend the Software to any third party.
7.5. You shall not use the Software in the creation of data or software used for detection, blocking or treating threats described in the User Manual.
7.6. Your key file can be blocked in case You breach any of the terms and conditions of this Agreement.
7.7. If You are using the trial version of the Software You do not have the right to receive the Technical Support specified in Paragraph 5 of this Agreement and You don’t have the right to transfer the license or the rights to use the Software to any third party.
7.8. Violation of the intellectual rights to the Software shall result in civil, administrative or criminal liability in accordance with the law.

8. Limited Warranty and Disclaimer
8.1. The Rightholder guarantees that the Software will substantially perform according to the specifications and descriptions set forth in the User Manual provided however that such limited warranty shall not apply to the following: (w) Your Computer’s deficiencies and related infringement for which Rightholder’s expressly disclaims any warranty responsibility; (x) malfunctions, defects, or failures resulting from misuse; abuse; accident; neglect; improper installation, operation or maintenance; theft; vandalism; acts of God; acts of terrorism; power failures or surges; casualty; alteration, non-permitted modification, or repairs by any party other than Rightholder; or any other third parties’ or Your actions or causes beyond Rightholder’s reasonable control; (y) any defect not made known by You to Rightholder as soon as practical after the defect first appears; and (z) incompatibility caused by hardware and/or software components installed on Your Computer.
8.2. You acknowledge, accept and agree that no software is error-free and You are advised to back up the Computer with the frequency and reliability suitable for You.
8.3. The Rightholder does not provide any guarantee that the Software will work correctly in case of violations of the terms described in the User Manual or in this Agreement.
8.4. The Rightholder does not guarantee that the Software will work correctly if You do not regularly download Updates specified in Clause 2.4 of this Agreement.
8.5. The Rightholder does not guarantee protection from the threats described in the User Manual after the expiration of the period specified in the License Certificate or after the License to use the Software is terminated for any reason.
8.6. You acknowledge that the Software will be provisioned with Kaspersky standard settings applied by default and that it is Your sole responsibility to configure the Software to satisfy Your own requirements.
8.7. THE SOFTWARE IS PROVIDED «AS IS» AND THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY AS TO ITS USE OR PERFORMANCE. EXCEPT FOR ANY WARRANTY, CONDITION, REPRESENTATION OR TERM THE EXTENT TO WHICH CANNOT BE EXCLUDED OR LIMITED BY APPLICABLE LAW. THE RIGHTHOLDER AND ITS PARTNERS MAKE NO WARRANTY, CONDITION, REPRESENTATION, OR TERM (EXPRESSED OR IMPLIED, WHETHER BY STATUTE, COMMON LAW, CUSTOM, USAGE OR OTHERWISE) AS TO ANY MATTER INCLUDING, WITHOUT LIMITATION, NON-INFRINGEMENT OF THIRD-PARTY RIGHTS, MERCHANTABILITY, SATISFACTORY QUALITY, INTEGRATION, OR APPLICABILITY FOR A PARTICULAR PURPOSE. YOU ASSUME ALL FAULTS, AND THE ENTIRE RISK AS TO PERFORMANCE AND RESPONSIBILITY FOR SELECTING THE SOFTWARE TO ACHIEVE YOUR INTENDED RESULTS, AND FOR THE INSTALLATION OF, USE OF, AND RESULTS OBTAINED FROM THE SOFTWARE. WITHOUT LIMITING THE FOREGOING PROVISIONS, THE RIGHTHOLDER MAKES NO REPRESENTATION AND GIVES NO WARRANTY THAT THE SOFTWARE WILL BE ERROR-FREE OR FREE FROM INTERRUPTIONS OR OTHER FAILURES OR THAT THE SOFTWARE WILL MEET ANY OR ALL OF YOUR REQUIREMENTS WHETHER OR NOT DISCLOSED TO THE RIGHTHOLDER.

9. Exclusion and Limitation of Liability
9.1. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL THE RIGHTHOLDER OR ITS PARTNERS BE LIABLE FOR ANY SPECIAL, INCIDENTAL, PUNITIVE, INDIRECT, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING, BUT NOT LIMITED TO, DAMAGES FOR LOSS OF PROFITS OR CONFIDENTIAL OR OTHER INFORMATION, FOR BUSINESS INTERRUPTION, FOR LOSS OF PRIVACY, FOR CORRUPTION, DAMAGE AND LOSS OF DATA OR PROGRAMS, FOR FAILURE TO MEET ANY DUTY INCLUDING ANY STATUTORY DUTY, DUTY OF GOOD FAITH OR DUTY OF REASONABLE CARE, FOR NEGLIGENCE, FOR ECONOMIC LOSS, AND FOR ANY OTHER PECUNIARY OR OTHER LOSS WHATSOEVER) ARISING OUT OF OR IN ANY WAY RELATED TO THE USE OF OR INABILITY TO USE THE SOFTWARE, THE PROVISION OF OR FAILURE TO PROVIDE SUPPORT OR OTHER SERVICES, INFORMATION, SOFTWARE, AND RELATED CONTENT THROUGH THE SOFTWARE OR OTHERWISE ARISING OUT OF THE USE OF THE SOFTWARE, OR OTHERWISE UNDER OR IN CONNECTION WITH ANY PROVISION OF THIS LICENSE AGREEMENT, OR ARISING OUT OF ANY BREACH OF CONTRACT OR ANY TORT (INCLUDING NEGLIGENCE, MISREPRESENTATION, ANY STRICT LIABILITY OBLIGATION OR DUTY), OR ANY BREACH OF STATUTORY DUTY, OR ANY BREACH OF WARRANTY OF THE RIGHTHOLDER OR ANY OF ITS PARTNERS, EVEN IF THE RIGHTHOLDER OR ANY PARTNER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

9.2. IN THE EVENT ANY DISCLAIMER, EXCLUSION OR LIMITATION IN THIS LICENSE AGREEMENT CANNOT BE EXCLUDED OR LIMITED ACCORDING TO APPLICABLE LAW THEN ONLY THAT DISCLAIMER, EXCLUSION OR LIMITATION SHALL NOT APPLY TO YOU AND YOU CONTINUE TO BE BOUND BY ALL THE REMAINING DISCLAIMERS, EXCLUSIONS AND LIMITATIONS.

10. GNU and Other Third Party Licenses
10.1. The Software may include some software programs that are licensed (or sublicensed) to the user under the GNU General Public License (GPL) or other similar free software licenses which, among other rights, permit the user to copy, modify and redistribute certain programs, or portions thereof, and have access to the source code (“Open Source Software”). If such licenses require that for any software, which is distributed to someone in an executable binary format, the source code also be made available to those users, then the source code should be made available by sending the request to source@kaspersky.com or the source code is supplied with the Software. If any Open Source Software licenses require that the Rightholder provide rights to use, copy or modify an Open Source Software program that are broader than the rights granted in this Agreement, then such rights shall take precedence over the rights and restrictions herein.

11. Intellectual Property Ownership
11.1. You agree that the Software and the authorship, systems, ideas, methods of operation, documentation and other information contained in the Software, are proprietary intellectual property and/or the valuable trade secrets of the Rightholder or its partners and that the Rightholder and its partners, as applicable, are protected by civil and criminal law, and by the law of copyright, trade secret, trademark and patent of the Russian Federation, European Union and the United States of America, as well as other countries and international treaties. This Agreement does not grant to You any rights to the intellectual property including any trademarks or service marks of the Rightholder and/or its partners (“Trademarks”). You may use the Trademarks only insofar as to identify printed output produced by the Software in accordance with accepted trademark practice, including identification of the Trademark owner’s name. Such use of any Trademark does not give you any rights of ownership in that Trademark. The Rightholder and/or its partners own and retain all right, title, and interest in and to the Software, including without limitation any error corrections, enhancements, Updates or other modifications to the Software, whether made by the Rightholder or any third party, and all copyrights, patents, trade secret rights, trademarks, and other intellectual property rights therein. Your possession, installation or use of the Software does not transfer to you any title to the intellectual property in the Software, and you will not acquire any rights to the Software except as expressly set forth in this Agreement. All copies of the Software made hereunder must contain the same proprietary notices that appear on and in the Software. Except as stated herein, this Agreement does not grant you any intellectual property rights in the Software and you acknowledge that the License granted under this Agreement only provides you with a right of limited use under the terms and conditions of this Agreement. Rightholder reserves all rights not expressly granted to you in this Agreement.
11.2. You agree not to modify or alter the Software in any way. You may not remove or alter any copyright notices or other proprietary notices on any copies of the Software.

12. Governing Law; Arbitration
12.1. This Agreement will be governed by and construed in accordance with the laws of the Russian Federation without reference to conflicts of law rules and principles. This Agreement shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded. Any dispute arising out of the interpretation or application of the terms of this Agreement or any breach thereof shall, unless it is settled by direct negotiation, be settled by International Commercial Arbitration Court at the Russian Federation Chamber of Commerce and Industry in Moscow, the Russian Federation. Any award rendered by the arbitrator shall be final and binding on the parties and any judgment on such arbitration award may be enforced in any court of competent jurisdiction. Nothing in this Section 12 shall prevent a Party from seeking or obtaining equitable relief from a court of competent jurisdiction, whether before, during or after arbitration proceedings.

13. Period for Bringing Actions
13.1. No action, regardless of form, arising out of the transactions under this Agreement, may be brought by either party hereto more than one (1) year after the cause of action has occurred, or was discovered to have occurred, except that an action for infringement of intellectual property rights may be brought within the maximum applicable statutory period.

14. Entire Agreement; Severability; No Waiver
14.1. This Agreement is the entire agreement between you and Rightholder and supersedes any other prior agreements, proposals, communications or advertising, oral or written, with respect to the Software or to subject matter of this Agreement. You acknowledge that you have read this Agreement, understand it and agree to be bound by its terms. If any provision of this Agreement is found by a court of competent jurisdiction to be invalid, void, or unenforceable for any reason, in whole or in part, such provision will be more narrowly construed so that it becomes legal and enforceable, and the entire Agreement will not fail on account thereof and the balance of the Agreement will continue in full force and effect to the maximum extent permitted by law or equity while preserving, to the fullest extent possible, its original intent. No waiver of any provision or condition herein shall be valid unless in writing and signed by you and an authorized representative of Rightholder provided that no waiver of any breach of any provisions of this Agreement will constitute a waiver of any prior, concurrent or subsequent breach. Rightholder’s failure to insist upon or enforce strict performance of any provision of this Agreement or any right shall not be construed as a waiver of any such provision or right.

15. Rightholder Contact Information
Should you have any questions concerning this Agreement, or if you desire to contact the Rightholder for any reason, please contact our Customer Service Department at:

AO Kaspersky Lab, Bldg. 3, 39A, Leningradskoe Shosse
Moscow, 125212 Russian Federation
E-mail: info@kaspersky.com
Web site: www.kaspersky.com

© 2021 AO Kaspersky Lab

STATEMENT REGARDING DATA PROCESSING FOR WEB PROTECTION (hereinafter «Web Protection Statement»)

Web Protection Statement relates to Kaspersky Security for Mobile (hereinafter “Software”).

All terms used in Web Protection have the same meaning defined in the End User License Agreement (EULA) under the clause »Definitions».

Please carefully read the terms of Web Protection Statement, as well as all documents referred to in Web Protection Statement, before accepting it. If the Software is used within a legal entity or on the Computer used by several individuals, You must ensure that they have understood and accepted the conditions of the Web Protection Statement before data processing begins.

When the End User activates the functionality of Web Protection, the End User is fully responsible for ensuring that the processing of personal data of Data Subjects is lawful, particularly, within the meaning of Article 6 (1) (a) to (1) (f) of Regulation (EU) 2016/679 (General Data Protection Regulation, “GDPR”) if Data Subject is in the European Union, or applicable laws on confidential information, personal data, data protection, or similar thereto.

Data Protection and Processing
The Rightholder handles the data it receives from the End User under Web Protection Statement in accordance with the Rightholder’s Privacy Policy published at: www.kaspersky.com/products-and-services-privacy-policy.

Purposes of Data Processing
In according to Web Protection Statement the Rightholder processes data in order for Web Protection functionality. The stated purpose includes detecting web threats and determining the categories of visited websites using the cloud service Kaspersky Security Network (KSN).

Processed Data
With Your consent, the following data will be automatically sent on a regular basis to the Rightholder under t Web Protection Statement:
• Product version; Unique device identifier; Installation ID; Product type
• URL address of the page, port number, URL protocol, URL, which refers to the requested information.

Your Choice to Participate
It is entirely Your choice to automatically send data on a regular basis to the Rightholder under Web Protection Statement. You can at any time withdraw Your consent from within the settings of the Software as described in the User Manual.

© 2019 AO Kaspersky Lab. All Rights Reserved.

IMPORTANT LEGAL NOTICE TO ALL USERS: CAREFULLY READ THE FOLLOWING LEGAL AGREEMENT BEFORE YOU START USING THE FUNCTIONALITY OF THE COMPONENT DATA DISCOVERY.

BY USING THE FUNCTIONALITY OF THE COMPONENT DATA DISCOVERY (HEREINAFTER THE «FEATURE»), YOU CONSENT TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. SUCH ACTION IS A SYMBOL OF YOUR SIGNATURE AND YOU ARE CONSENTING TO BE BOUND BY AND ARE BECOMING A PARTY TO THIS AGREEMENT AND AGREE THAT THIS AGREEMENT IS ENFORCEABLE LIKE ANY WRITTEN NEGOTIATED AGREEMENT SIGNED BY YOU. IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, DO NOT USE THE FEATURE.

CONDITIONS REGARDING DATA PROCESSING

If the Software is used within a legal entity or on the Computer used by several individuals, You must ensure that they have understood and accepted the conditions of the Section «Conditions regarding data processing» before they use the Feature.

1. Data protection and processing

The Rightholder processes the data received from the End User and the Employees of the End User, in accordance with the conditions of this Section and in accordance with Rightholder’s Privacy Policy published at www.kaspersky.com/Product-and-Services-Privacy-Policy.

2. Information provision

It is entirely Your choice to automatically send data on a regular basis to the Rightholder for the entire duration of the use of the Feature. You can at any time withdraw Your consent by discontinuing the use of the Feature within the settings of the Software as described in the User Manual.

3. Data to be processed

With your consent, the following data will be automatically and regularly sent to the Rightholder for processing.

3.1. The purpose of processing the following personal data is to provide the operation of the Feature. You agree to provide the Rightholder with the following data:

1. Information about the files that are scanned:
a. Information about where the file is stored in Office 365.
b. File contents.
c. Information about the last edit of the file: Date and time, ID of the user, Office 365 service.
d. File name.
e. File URL.
f. File size.
g. Information about shared access to the file: Information about the access type, about users and groups of users who have access to the file.
2. Information about the SharePoint sites and OneDrive drives where the scanned files are stored:
a. Tenant ID.
b. Site/drive ID.
c. Site/drive name.
d. Site/drive URL.
e. Host name.
f. Information about the site/drive creation: Date and time, ID of the created user, ID of the owning user.
g. Information about the last edit of the site/drive: Date and time, ID of the user.
h. Site/drive description.
i. Information about the use of drive space.
j. Information about lists of the site:
i. List ID.
ii. Displayed name of the list.
iii. «Content types are used» flag.
iv. Flag of a hidden list.
v. Name of the template on which the list is based.
3. Information about users:
a. User ID.
b. User alias.
c. User display name.
d. User email address.
e. Information about the user’s licenses.
f. «Is administrator» flag.

© 2021 AO Kaspersky Lab

Преимущества

Возможности

Акции

Системные требования

Состав продукта

Сравнение

Артикулы

Kaspersky Endpoint Security для бизнеса Стандартный 11

Современное ведение бизнеса любого уровня не обходится без обеспечения кибербезопасности. Развитие интернет пространства неукоснительно ведет к появлению новых внешних угроз для бизнеса. Шифровальщики, фишеры, спамеры – малая часть того, что угрожает комфортному развитию. Решение позволяет пользователю не тратить критически важного времени на обнаружение и устранение неполадок.

Защита-ПК.jpgЗащита рабочих станций Windows, Linux и Mac

Защищает от атак любого уровня, а также имеет ряд ключевых функций, благодаря которым Kaspersky Endpoint Security стал одним из лидеров рынка антивирусных решений.

Сервера.jpgЗащита серверов

Продукт надежно защищает сервер и позволяет администратору использовать службы предоставления отчетности о работе программного обеспечения. Например, отчеты о:

  • Запрещенных программах;
  • Шифровании данных;
  • Работе компонента «Контроля программ».

Мобильные-устройства.jpgЗащита мобильных устройств

Использование Kaspersky Security защищает мобильные устройства от специализированных угроз, направленных на конфиденциальные данные. Решение пресекает любые попытки проникновения в устройство через уязвимости в системе. Если у Вас имеются EMM-решения для развертывания и настройки средств защиты мобильных устройств, то возможно совместное использование с актуальными бизнес-процессами в компании.

Вымогатели.jpgЗащита от всех видов угроз

Kaspersky Endpoint Security для бизнеса – Стандартный обеспечивает защиту от всех известных видов угроз. Его базы знания насчитывают более 50 ТБ данных и более 4 миллиардов хешей. Несмотря на огромные объемы, аналитические данные не снижают ресурсы пользователя. В состав решения входит уникальный облачный режим, позволяющий защищать различные компоненты инфраструктуры, при использовании минимальных ресурсов рабочих станций.

Единая-консоль.jpgЕдиная консоль управления

Наличие единой веб-консоли обеспечивает абсолютный контроль над всеми рабочими станциями, мобильными устройствами и серверами, независимо от их местоположения и состояния. Продукт отлично масштабируется на любое количество рабочих станций и позволяет получить доступ к лицензиям и средствам устранения неполадок удаленно. Функция централизованного управления усовершенствована интеграцией с Active Directory, которая управляет доступом на основе ролей и встроенными функциями мониторинга.

Облачная-аналитика.jpgКонтроль устройств и веб-трафика

Благодаря функции контроля устройств, администратор вправе определить доступ пользователей к установленным или подключенным устройствам к рабочей станции. Например, жесткие диски, принтеры, веб-камеры. Это обеспечивает защиту от заражения при подключении внешних устройств и предотвращает потерю или утечку данных.

При передаче или получении данных по протоколам HTTP и FTP, компонент защиты от web-угроз использует различные уровни безопасности. Kaspersky Endpoint Security обладает тремя уровнями защиты: Высоким, Рекомендуемым и Низким. Параметр уровня безопасности web-трафика Рекомендуемый считается оптимальным и устанавливается автоматически, он рекомендован специалистами «Лаборатории Касперского». Однако, администратор вправе самостоятельно изменить уровень безопасности.

контроль-программ-для-пк.jpgКонтроль программ для компьютеров

Ежедневное совершенствование защиты всех объектов корпоративной сети «Лабораторией Касперского» позволило развить алгоритмы поиска, выявления и пресечения заражения нежелательным ПО. Постоянное пополнение реестра известных угроз, обеспечивает надежную защиту для бизнеса.

Вымогатели.jpgЗащита от программ-вымогателей

Комплексная защита бизнеса оснащена поведенческим анализом с механизмом защиты памяти, который следит за самыми важными процессами системы и предотвращает утечку идентификационной информации пользователей и администраторов. Этот вид контроля оберегает систему и данные от всех видов угроз и программ-вымогателей.

Доступ.jpgРолевое управление доступом (базовое)

Комплексное решение для защиты предусматривает возможность распределения полномочий в соответствии с обозначенными уровнями надежности, контролируя доступ к зашифрованным данным. Постоянная сверка с физическими и облачными базами данных предотвращает вторжения на уровне хоста, ограничивает запрещенные приложения и контролирует доступ к критически важным ресурсам компании. Для экономии интернет-трафика и собственного времени, администратор может использовать функцию удаленной загрузки обновлений, что запустит автоматическую установку обновлений на все подключенные ПК, мобильные устройства и серверы.

Kaspersky Endpoint Security для бизнеса – Стандартный – надежное средство безопасности, защиты и контроля Рабочих Станций, Смартфонов и Файловых Серверов. Включает в себя средство централизованного управления безопасностью предприятия Kаspersky Security Center. Общее количество защищаемых устройств не должно быть выше количества купленных Вами лицензий.

Если Вы покупаете базовую лицензию (первый год защиты) или переходите на наш продукт с антивирусов других производителей, то Вы получаете сертификаты Ozon номиналом 10% от суммы покупки и уникальные сувениры «Лаборатории Касперского».

Kaspersky Endpoint Security для бизнеса Стандартный базовая лицензия

Лицензируется по общему количеству рабочих станций, файловых/терминальных серверов и мобильных устройств. Программное обеспечение предназначено для коммерческих, муниципальных, государственных, образовательных, научных и медицинских учреждений с количеством защищаемых узлов от 10 до 499 штук. Условия приобретения большего количества лицензий и получения специальной льготной цены Вы можете узнать у консультантов в диалоговом окне или по контактному номеру 8-800-250-16-03.

Kaspersky Endpoint Security для бизнеса Стандартный продление лицензии

При окончании действующего срока лицензионного соглашения, пользователь имеет возможность продлить использование KES – Стандартный, путем приобретения новой лицензии на льготных условиях. Конечный пользователь получает новый ключевой файл и новый лицензионный договор.

Особенности продления:
— Продление лицензии допустимо в случаях, если после истечения предыдущей лицензии прошло не более 1 года. 
— Возможен переход при продлении с KES для бизнеса Стандартный на KES Cloud/Cloud Plus по цене продления;
— Продление возможно на любое количество лицензий сроком от 1 года;
— Продление по истечении 1 года с момента окончания действия лицензии не предусмотрено;

Своевременное обновление лицензии – это необходимое требование для защиты от злоумышленников, которые могут воспользоваться паузой в использовании ПО.

ЛИЦЕНЗИОННОЕ СОГЛАШЕНИЕ АО «ЛАБОРАТОРИЯ КАСПЕРСКОГО»

ЛИЦЕНЗИОННЫЕ СОГЛАШЕНИЯ для Kaspersky Endpoint Security и AES Модуль Шифрования; И ПОЛИТИКА КОНФИДЕЦИАЛЬНОСТИ для Продуктов и Сервисов

ЛИЦЕНЗИОННОЕ СОГЛАШЕНИЕ АО «ЛАБОРАТОРИЯ КАСПЕРСКОГО», ОПРЕДЕЛЯЮЩЕЕ УСЛОВИЯ ИСПОЛЬЗОВАНИЯ KASPERSKY ENDPOINT SECURITY (ПО)

ВНИМАНИЕ! ВНИМАТЕЛЬНО ОЗНАКОМЬТЕСЬ С УСЛОВИЯМИ ЛИЦЕНЗИОННОГО СОГЛАШЕНИЯ ПЕРЕД НАЧАЛОМ РАБОТЫ С ПРОГРАММНЫМ ОБЕСПЕЧЕНИЕМ.

НАЖАТИЕ ВАМИ КНОПКИ ПОДТВЕРЖДЕНИЯ СОГЛАСИЯ В ОКНЕ С ТЕКСТОМ ЛИЦЕНЗИОННОГО СОГЛАШЕНИЯ ПРИ УСТАНОВКЕ ПО ИЛИ ВВОД СООТВЕТСТВУЮЩЕГО СИМВОЛА(-ОВ) ОЗНАЧАЕТ ВАШЕ БЕЗОГОВОРОЧНОЕ СОГЛАСИЕ С УСЛОВИЯМИ НАСТОЯЩЕГО ЛИЦЕНЗИОННОГО СОГЛАШЕНИЯ. ЕСЛИ ВЫ НЕ СОГЛАСНЫ С УСЛОВИЯМИ НАСТОЯЩЕГО ЛИЦЕНЗИОННОГО СОГЛАШЕНИЯ, ВЫ ДОЛЖНЫ ПРЕРВАТЬ УСТАНОВКУ ПО.

В СЛУЧАЕ НАЛИЧИЯ ЛИЦЕНЗИОННОГО ДОГОВОРА ИЛИ ПОДОБНОГО ДОКУМЕНТА, УСЛОВИЯ ИСПОЛЬЗОВАНИЯ ПО, ИЗЛОЖЕННЫЕ В ТАКОМ ДОГОВОРЕ, ЯВЛЯЮТСЯ ПРЕВАЛИРУЮЩИМИ НАД УСЛОВИЯМИ НАСТОЯЩЕГО ЛИЦЕНЗИОННОГО СОГЛАШЕНИЯ.

 

1. Определения
1.1. ПО — программное обеспечение, сопроводительные материалы, обновления, описанные в Руководстве Пользователя, Правообладателем которых является АО «Лаборатория Касперского».
1.2. Правообладатель (обладатель исключительного права на ПО) — АО «Лаборатория Касперского».
1.3. Компьютер(ы) — операционная система, виртуальная машина или оборудование, для работы на котором предназначено ПО, на которое устанавливается ПО и/или на котором используется ПО.
1.4. Пользователь (Вы) — юридическое лицо, для которого ПО было загружено или приобретено, и которое поручило отдельному физическому лицу принять данное соглашение от своего имени.
1.5. Партнеры — организации или отдельные лица, осуществляющие распространение ПО на основании лицензии и, в некоторых случаях, договора с Правообладателем.
1.6. Обновление(-я) — все улучшения, исправления, расширения, пакеты обновлений, копии и/или модификации ПО.
1.7. Руководство Пользователя — сопроводительные печатные и иные материалы, руководство пользователя, руководство администратора, справочник, файл справки и аналогичные им печатные и электронные документы.
Электронная версия Руководства Пользователя доступна на веб-сайте Правообладателя:

www.kaspersky.ru

. Правообладатель оставляет за собой право обновлять электронную версию Руководства Пользователя на вышеуказанном сайте в случае необходимости.
1.8. Код активации — уникальный набор символов, с помощью которого может быть выполнена активация ПО.
1.9. Файл ключа — файл с расширением «.key», который  предназначен для активации ПО.
1.10. Лицензионный Сертификат — документ, передаваемый Пользователю вместе с Файлом ключа или Кодом активации и содержащий информацию о предоставляемой лицензии.
1.11. Веб-портал — веб-ресурс Правообладателя, используемый для управления установленным ПО и лицензиями, а также для получения и/или хранения информации от ПО, для обращения в Службу поддержки. В качестве веб-ресурса может использоваться «Kaspersky Protection Center», «Kaspersky Endpoint Security Cloud», либо другой веб-ресурс, используемый для указанных выше целей.

2. Предоставление лицензии
2.1. Вам предоставляется неисключительная лицензия на использование ПО в пределах функциональности, описанной в Руководстве Пользователя или на сайте Службы технической поддержки Правообладателя, при условии соблюдения Вами всех технических требований, описанных в Руководстве Пользователя, а также всех ограничений и условий использования ПО, указанных в настоящем Лицензионном соглашении.
В случае если Вы получили, загрузили и/или установили ПО, предназначенное для ознакомительных целей, Вы имеете право использовать ПО только в целях ознакомления и только в течение одного ознакомительного периода, если не прописано иначе, начиная с даты начальной установки ПО. Любое использование ПО для других целей или по завершении ознакомительного периода запрещено.
Если Вы используете ПО разных версий или версии для разных языков, если Вы получили ПО на нескольких носителях, если Вы иным способом получили несколько копий ПО или получили ПО в составе пакета другого программного обеспечения, то общее количество Ваших компьютеров, на которых установлены и/или используются все версии ПО, должно соответствовать количеству компьютеров, в полученных Вами лицензиях в том случае, если условия лицензий не утверждают иное; каждая приобретенная лицензия дает Вам право установить и использовать ПО на таком количестве компьютеров, которое указано в п.2.2.
2.2. Вы имеете право использовать ПО для защиты такого количества компьютеров, которое указано в Лицензионном Сертификате.
2.3. Вы имеете право изготовить копию ПО, при условии, что эта копия предназначена только для целей резервного копирования и для замены правомерно приобретенного экземпляра в случаях, когда оригинал утерян, уничтожен или стал непригоден для использования. Такая копия не может быть использована для иных целей и должна быть уничтожена в случае потери права использования ПО или если Ваша лицензия прекращается по истечении срока действия или по любой другой причине в соответствии с законодательством, действующим в стране Вашего места жительства или в стране, где Вы используете ПО. 
2.4. После активации ПО или выполнения процедуры установки Файла ключа (за исключением ПО, предназначенного для ознакомительных целей) Вам предоставляется возможность в течение срока, указанного в Лицензионном Сертификате, получать от Правообладателя или его Партнеров:
— новые версии ПО по мере их выхода (через Интернет). Все получаемые Вами обновления становятся частью ПО, и к ним применяются положения и условия настоящего Соглашения;
— техническую поддержку (по телефону и/или через Интернет);
— доступ к информационным и вспомогательным ресурсам Правообладателя.

3. Активация и сроки
3.1. Если Вы модифицируете свой компьютер или вносите изменения в программное обеспечение других правообладателей, установленное на компьютере, то может потребоваться повторная активация ПО или повторная процедура установки Файла ключа.
3.2. Вы имеете право использовать ПО, предназначенное для ознакомительных целей и распространяемое без выплаты вознаграждения, как указано в п.2.1, в течение 30 (тридцати) дней с момента активации ПО в соответствии с условиями настоящего Лицензионного соглашения. В случае если Правообладателем устанавливается иной срок использования ПО, предназначенного для ознакомительных целей и распространяемого без выплаты вознаграждения, Пользователь извещается об этом посредством информационного уведомления.
3.3. Срок полезного использования ограничивается сроком использования ПО, указанным в Лицензионном Сертификате; информацию о сроке использования ПО можно проверить с помощью средств, указанных в Руководстве Пользователя.
3.4. Функционал ПО зависит от типа используемой лицензии, который указан в Лицензионном Сертификате, и соответствует описанию в Руководстве Пользователя.
3.5. Правообладатель оставляет за собой право использовать средства и процедуры для проверки правомочности лицензии и/или копии ПО, установленной и/или используемой на Вашем компьютере. Если соответствующая лицензия отсутствует, или проверка лицензии не может быть выполнена в течение разумного промежутка времени, ПО будет работать с ограниченной функциональностью.
3.6. Вы соглашаетесь с тем, что при использовании ПО и любого результата или информации, полученных в результате использования этого ПО, Вы будете соблюдать все применимые международные, национальные, государственные, региональные и местные законы и правила, включая, без ограничений, законы о конфиденциальности, авторском праве, экспортном контроле и ответственности за непристойное поведение.
3.7. За исключением случаев, специально оговоренных в настоящем Соглашении, Вы не можете передавать какие-либо права, предоставленные Вам в соответствии с настоящим Соглашением, или свои обязательства, вытекающие из настоящего Соглашения.

4. Техническая поддержка
4.1. Техническая поддержка, указанная в п. 2.4 настоящего Лицензионного соглашения, предоставляется (за исключением ПО, предназначенного для ознакомительных целей) в соответствии с правилами оказания Технической поддержки.
Адрес службы технической поддержки и правила ее оказания: support.kaspersky.com.

5. Условия обработки данных
5.1. В рамках данного Раздела вводятся дополнительные определения:
Субъект данных — физическое лицо, которое использует или будет использовать ПО напрямую или косвенно при осуществлении Пользователем своей деятельности, в том числе работник, подрядчик, сотрудник, клиент или представитель Пользователя, и в отношении которого осуществляется передача и обработка данных, включая данные, имеющие статус персональных по законодательству некоторых стран. Субъектами данных могут также выступать любые физические лица, которые сообщают или передают свои данные Пользователю. 
5.2. Если для активации ПО применяется Код активации, с целью проверки  правомерности  использования ПО Пользователь соглашается периодически предоставлять Правообладателю следующую информацию: тип, версию и локализацию установленного ПО, версии установленных Обновлений ПО, идентификатор Компьютера и идентификатор установки ПО на Компьютере, код активации и уникальный идентификатор активации текущей лицензии, тип, версию и разрядность операционной системы, название виртуальной среды, если ПО установлено в виртуальной среде, идентификаторы компонентов ПО, активных на момент предоставления информации.
Правообладатель может также использовать такую информацию для сбора статистической информации о распространении и использовании программного обеспечения Правообладателя.
Используя Код активации, Пользователь дает свое согласие на автоматическую передачу данных, указанных в настоящем пункте. В случае, если Пользователь отказывается предоставлять такую информацию Правообладателю, для активации ПО следует использовать Файл ключа.
5.3. Правообладатель осуществляет обработку всех полученных от Пользователя данных в соответствии с инструкциями, передаваемыми Пользователем. Лицензионное соглашение, в частности положения раздела 5 «Условия обработки данных», а также использование функциональности ПО, описанной в Руководстве пользователя, и настройки ПО, выставляемые Пользователем, представляют собой инструкции, передаваемые Пользователем Правообладателю в отношении обработки данных, если иное не указано в отдельном письменном соглашении между Пользователем и Правообладателем или его Партнерами.
5.4. Пользователь принимает на себя обязательство за полное ознакомление с Руководством пользователя, особенно в отношении обработки данных, с Политикой конфиденциальности Правообладателя, которая описывает обработку данных (

www.kaspersky.com/Products-and-Services-Privacy-Policy

), и принятие решения о соответствии ПО требованиям Пользователя.
5.5. При использовании ПО Пользователь должен соблюдать применимые законы, включая законы о конфиденциальной информации, персональных данных и о защите данных. При использовании компонентов ПО, которые обрабатывают данные без их передачи Правообладателю, Пользователь несет ответственность за обеспечение и поддержание конфиденциальности и мер безопасности в отношении данных. Пользователь должен определить соответствующие технические и организационные меры для защиты данных и обеспечения их конфиденциальности при использовании таких компонентов ПО.
5.6. Во время использования ПО, в частности, когда Пользователь настраивает ПО для использования Kaspersky Security Network, Пользователь несет ответственность за обеспечение законности обработки персональных данных Субъектов данных, которая определена в применимых законах о конфиденциальной информации, персональных данных, защите данных или аналогичных законах.
5.7. В том случае, если Пользователь принимает решение получать согласие от Субъектов данных для обеспечения законности обработки, Пользователь должен перед началом использования ПО получить согласие каждого Субъекта данных в соответствии со всеми требованиями применимого законодательства. Пользователь должен получать согласие от каждого Субъекта данных до начала обработки персональных данных такого Субъекта данных.
5.8. В отношении п. 5.7 настоящего Лицензионного соглашения Пользователь должен иметь подтверждения наличия согласия на обработку персональных данных. Пользователь обязуется предоставить подтверждения наличия такого согласия каждого Субъекта данных по запросу Правообладателя в течение 5 (пяти) рабочих дней после получения запроса.
5.9. В отношении п. 5.7 настоящего Лицензионного соглашения, до начала использования ПО Пользователь обязуется и несет полную ответственность за предоставление каждому отдельному Субъекту данных всей информации, требуемой в соответствии с применимым законодательством, для получения согласия на обработку персональных данных. В частности, Пользователь до начала использования ПО обязан предоставить каждому Субъекту данных Политику конфиденциальности Правообладателя (

www.kaspersky.com/Products-and-Services-Privacy-Policy

).
5.10. Пользователь несет полную ответственность по отношению к Правообладателю за любой ущерб, причиненный в результате нарушения настоящего Лицензионного соглашения, в частности, в случае неспособности Пользователя получить согласие Субъекта данных, если это применимо, и/или в случае отсутствия подтверждений, и/или позднего предоставления подтверждений наличия согласия, полученного от Субъекта данных, и/или любого другого нарушения обязательств по настоящему Лицензионному соглашению.   
5.11. Пользователь обязуется возместить Правообладателю ущерб в результате претензий, выдвинутых третьими сторонами, в частности контролирующими органами по надзору за соблюдением законодательства о защите данных, против Правообладателя в связи с невыполнением Пользователем обязательств, указанных в разделе 5 «Условия обработки данных».

6. Ограничения
6.1. Вы не вправе декомпилировать, дизассемблировать, модифицировать или выполнять производные работы, основанные на ПО, целиком или частично, за исключением случаев, предусмотренных законодательством.
6.2. Запрещается передавать право на использование ПО третьей стороне.
6.3. Запрещается передавать и предоставлять доступ к Коду активации и/или Файлу ключа третьим лицам в нарушение положений настоящего Лицензионного соглашения. Код активации и Файл ключа являются конфиденциальной информацией Правообладателя.
6.4. Запрещается сдавать ПО в аренду, прокат или во временное пользование.
6.5. Запрещается использовать ПО с целью создания данных или кода, или программного обеспечения, предназначенных для обнаружения, блокирования или удаления угроз, описанных в Руководстве Пользователя.
6.6. В случае нарушения Вами условий настоящего Лицензионного соглашения Ваш файл ключа может быть заблокирован.
6.7. При использовании Вами ПО, предназначенного для ознакомительных целей, Вы не имеете права получать техническую поддержку, указанную в п.4 настоящего Лицензионного соглашения, а также передавать имеющийся у Вас экземпляр ПО третьим лицам.
6.8. Нарушение интеллектуальных прав на ПО ведет к гражданской, административной или уголовной ответственности в соответствии с законодательством.

7. Ограниченная гарантия и отказ от предоставления гарантий
7.1. Правообладатель гарантирует работу ПО в соответствии со спецификациями и описаниями, изложенными в Руководстве Пользователя.
7.2. Вы соглашаетесь с тем, что никакое программное обеспечение не свободно от ошибок, и поэтому рекомендуется регулярно создавать резервные копии файлов на Вашем компьютере.
7.3. Правообладатель не гарантирует работоспособность ПО при нарушении условий, описанных в Руководстве Пользователя или в настоящем Лицензионном соглашении.
7.4. Правообладатель не гарантирует работоспособность ПО, если Вы не осуществляете регулярные обновления ПО, указанные в п.2.4 настоящего Лицензионного соглашения.
7.5. Правообладатель не гарантирует защиту от угроз, описанных в Руководстве Пользователя, по окончании срока, указанного в Лицензионном Сертификате, или после прекращения действия лицензии на использование ПО по какой-либо причине.
7.6. Вы соглашаетесь с тем, что ПО предоставляется со стандартными настройками, применяемыми по умолчанию, и ответственность за вносимые Вами изменения в настройки ПО лежит на Вас.
7.7. ЗА ИСКЛЮЧЕНИЕМ УСТАНАВЛИВАЕМОЙ В НАСТОЯЩЕМ ПУНКТЕ ОГРАНИЧЕННОЙ ГАРАНТИИ, ПРОГРАММНОЕ ОБЕСПЕЧЕНИЕ ПОСТАВЛЯЕТСЯ «КАК ЕСТЬ». ПРАВООБЛАДАТЕЛЬ И ЕГО ПАРТНЕРЫ НЕ ДАЮТ НИКАКИХ ГАРАНТИЙ НА ЕГО ИСПОЛЬЗОВАНИЕ ИЛИ ПРОИЗВОДИТЕЛЬНОСТЬ. ЗА ИСКЛЮЧЕНИЕМ ГАРАНТИЙ, УСЛОВИЙ, ПРЕДСТАВЛЕНИЙ ИЛИ ПОЛОЖЕНИЙ, СТЕПЕНЬ КОТОРЫХ НЕ МОЖЕТ БЫТЬ ИСКЛЮЧЕНА ИЛИ ОГРАНИЧЕНА В СООТВЕТСТВИИ С ПРИМЕНИМЫМ ЗАКОНОДАТЕЛЬСТВОМ, ПРАВООБЛАДАТЕЛЬ И ЕГО ПАРТНЕРЫ НЕ ДАЮТ НИКАКИХ ГАРАНТИЙ, УСЛОВИЙ, ПРЕДСТАВЛЕНИЙ ИЛИ ПОЛОЖЕНИЙ (ВЫРАЖАЕМЫХ В ЯВНОЙ ИЛИ В ПОДРАЗУМЕВАЕМОЙ ФОРМЕ) НА ВСЕ, ВКЛЮЧАЯ БЕЗ ОГРАНИЧЕНИЙ НЕНАРУШЕНИЕ ПРАВ ТРЕТЬИХ ЛИЦ, КОММЕРЧЕСКОЕ КАЧЕСТВО, ИНТЕГРАЦИЮ ИЛИ ПРИГОДНОСТЬ ДЛЯ ОПРЕДЕЛЕННЫХ ЦЕЛЕЙ. ВЫ СОГЛАШАЕТЕСЬ С ТЕМ, ЧТО ВЫ НЕСЕТЕ ОТВЕТСТВЕННОСТЬ ЗА ВЫБОР ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ ДЛЯ ДОСТИЖЕНИЯ НУЖНЫХ РЕЗУЛЬТАТОВ, ЗА УСТАНОВКУ И ИСПОЛЬЗОВАНИЕ ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ, А ТАКЖЕ ЗА РЕЗУЛЬТАТЫ, ПОЛУЧЕННЫЕ С ЕГО ПОМОЩЬЮ.БЕЗ ОГРАНИЧЕНИЯ ВЫШЕИЗЛОЖЕННЫХ ПОЛОЖЕНИЙ, ПРАВООБЛАДАТЕЛЬ НЕ ДЕЛАЕТ НИКАКИХ ЗАЯВЛЕНИЙ И НЕ ДАЕТ НИКАКИХ ГАРАНТИЙ, ЧТО ПРОГРАММНОЕ ОБЕСПЕЧЕНИЕ НЕ БУДЕТ СОДЕРЖАТЬ ОШИБОК ИЛИ БУДЕТ РАБОТАТЬ БЕЗ СБОЕВ ИЛИ ДРУГИХ НЕИСПРАВНОСТЕЙ, ИЛИ ЧТО ПРОГРАММНОЕ ОБЕСПЕЧЕНИЕ БУДЕТ СООТВЕТСТВОВАТЬ КАКИМ-ЛИБО ИЛИ ВСЕМ ВАШИМ ТРЕБОВАНИЯМ, НЕЗАВИСИМО ОТ ТОГО, СООБЩИЛИ ЛИ ВЫ ПРАВООБЛАДАТЕЛЮ О ТАКОВЫХ ИЛИ НЕТ.

8. Взаимодействие с брандмауэром Microsoft Windows
8.1. Вы соглашаетесь с тем, что брандмауэр Windows, включенный в системе на момент установки ПО, может быть отключен. Экспорт настроек и правил, сделанных в брандмауэре Windows, в устанавливаемое ПО не производится.

9. Исключения и ограничение ответственности
9.1. В МАКСИМАЛЬНОЙ СТЕПЕНИ, ДОПУСКАЕМОЙ ПРИМЕНИМЫМ ЗАКОНОДАТЕЛЬСТВОМ, ПРАВООБЛАДАТЕЛЬ И/ИЛИ ЕГО ПАРТНЕРЫ НЕ НЕСУТ ОТВЕТСТВЕННОСТИ ЗА КАКИЕ-ЛИБО УБЫТКИ И/ИЛИ УЩЕРБ (В ТОМ ЧИСЛЕ УБЫТКИ В СВЯЗИ С НЕДОПОЛУЧЕННОЙ КОММЕРЧЕСКОЙ ПРИБЫЛЬЮ, ПРЕРЫВАНИЕМ ДЕЯТЕЛЬНОСТИ, УТРАТОЙ ИНФОРМАЦИИ ИЛИ ИНОЙ ИМУЩЕСТВЕННЫЙ УЩЕРБ), ВОЗНИКАЮЩИЕ В СВЯЗИ С ИСПОЛЬЗОВАНИЕМ ИЛИ НЕВОЗМОЖНОСТЬЮ ИСПОЛЬЗОВАНИЯ ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ, ДАЖЕ ЕСЛИ ПРАВООБЛАДАТЕЛЬ И/ИЛИ ЕГО ПАРТНЕРЫ БЫЛИ УВЕДОМЛЕНЫ О ВОЗМОЖНОМ ВОЗНИКНОВЕНИИ ТАКИХ УБЫТКОВ И/ИЛИ УЩЕРБА. В ЛЮБОМ СЛУЧАЕ ОТВЕТСТВЕННОСТЬ ПРАВООБЛАДАТЕЛЯ И/ИЛИ ЕГО ПАРТНЕРОВ ПО ЛЮБОМУ ИЗ ПОЛОЖЕНИЙ НАСТОЯЩЕГО ЛИЦЕНЗИОННОГО СОГЛАШЕНИЯ ОГРАНИЧИВАЕТСЯ СУММОЙ, ФАКТИЧЕСКИ УПЛАЧЕННОЙ ВАМИ ЗА ПРОГРАММНОЕ ОБЕСПЕЧЕНИЕ. НАСТОЯЩИЕ ОГРАНИЧЕНИЯ НЕ МОГУТ БЫТЬ ИСКЛЮЧЕНЫ ИЛИ ОГРАНИЧЕНЫ В СООТВЕТСТВИИ С ПРИМЕНИМЫМ ЗАКОНОДАТЕЛЬСТВОМ.

10. Открытое (свободное) программное обеспечение
10.1. Данный продукт содержит или может содержать программы, которые лицензируются (или сублицензируются) Пользователю в соответствии с общедоступной лицензией GNU или иными аналогичными лицензиями Open Source, которые помимо прочих прав разрешают Пользователю копировать, модифицировать, перераспределять определенные программы или их части и получать доступ к исходному коду (“ПО с открытым исходным кодом”). Если такая лицензия предусматривает предоставление исходного кода Пользователям, которым предоставляется ПО в формате исполняемого двоичного кода, исходный код делается доступным при осуществлении запроса на адрес

source@kaspersky.com

или сопровождается с продуктом. Если какая-либо лицензия на ПО с открытым исходным кодом требует, чтобы Правообладатель предоставлял права на использование, копирование или модификацию ПО с открытым исходным кодом, выходящие за рамки прав, предоставляемых настоящим Лицензионным соглашением, такие права имеют преимущественную силу над правами и ограничениями, оговоренными в настоящем Лицензионном соглашении.

11. Права на интеллектуальную собственность
11.1. Вы соглашаетесь с тем, что ПО, документация, как и все другие объекты авторского права, а также системы, идеи и методы работы, другая информация, которая содержится в ПО, товарные знаки — являются объектами интеллектуальной собственности Правообладателя или его Партнеров. Данное Лицензионное соглашение не дает Вам никаких прав на использование объектов интеллектуальной собственности, включая товарные знаки и знаки обслуживания Правообладателя или его Партнеров, за исключением переданных Вам прав Правообладателем или его Партнерами.
11.2. Вы соглашаетесь с тем, что не будете модифицировать или изменять ПО никаким способом. Запрещается удалять или изменять уведомления об авторских правах или другие проприетарные уведомления на любой копии ПО.

12. Применимое законодательство
12.1. Настоящее Лицензионное соглашение регулируется в соответствии с законодательством Российской Федерации.

13. Контактная информация Правообладателя
Если у Вас есть какие-либо вопросы в отношении настоящего Соглашения, или если Вы хотите связаться с Правообладателем по любой причине, обратитесь в Отдел обслуживания клиентов по адресу:

АО «Лаборатория Касперского», Ленинградское шоссе, д. 39А, стр. 3
Москва, 125212
Российская Федерация
Адрес электронной почты:

info@kaspersky.com

Веб-сайт:

www.kaspersky.ru

© АО «Лаборатория Касперского», 2018. 

Лицензионное соглашение c конечным пользователем о предоставлении неисключительной лицензии на использование AES Модуль Шифрования.

ВНИМАНИЕ! Внимательно ознакомьтесь с условиями Лицензионного соглашения перед началом работы с программным обеспечением.
Использование Вами ПО означает Ваше безоговорочное согласие с условиями настоящего Лицензионного соглашения. Если Вы не согласны с условиями настоящего Лицензионного соглашения, Вы не имеете право использовать ПО.

1. Определения
1.1. ПО – обозначает программное обеспечение AES Модуль Шифрования и сопроводительные материалы, Правообладателем которых является Kaspersky Lab UK Ltd.
1.2. Правообладатель (обладатель исключительного права на ПО) — Kaspersky Lab UK Ltd.
1.3. Компьютер – операционная система, виртуальная машина или оборудование, для работы на котором предназначено ПО, на которое устанавливается ПО и/или на котором используется ПО.
1.4. Пользователь (Вы) – юридическое лицо, для которого ПО было загружено и которое поручило отдельному физическому лицу принять данное соглашение от своего лица.
1.5. Руководство Пользователя – сопроводительные печатные и иные материалы, Руководство Пользователя, Руководство Администратора, справочник, файл справки и аналогичные им печатные и электронные документы, Правообладателем которых является Kaspersky Lab UK Ltd.

2. Предоставление лицензии
2.1. При наличии установленного на Вашем Компьютере программного обеспечения Kaspersky Endpoint Security, Правообладатель предоставляет Вам неисключительную лицензию на использование ПО в пределах функциональности, описанной в Руководстве Пользователя или на сайте Правообладателя.
2.2. Вы имеете право изготовить копию ПО при условии, что эта копия предназначена только для архивных целей и для замены правомерно приобретенного экземпляра в случаях, когда оригинал утерян, уничтожен или стал непригоден для использования. Такая копия не может быть использована для иных целей и должна быть уничтожена в случае, если владение экземпляром ПО перестанет быть правомерным.

3. Срок и его истечение
3.1. ПО может быть использовано бессрочно после принятия условий данного Лицензионного соглашения.
3.2. В случае нарушения Вами какого-либо из условий данного Соглашения Правообладатель вправе прервать действие данного Лицензионного соглашения на использование ПО в любое время без Вашего уведомления.

4. Техническая поддержка
4.1. Техническая поддержка предоставляется только пользователям коммерческих версий программных продуктов Kaspersky Endpoint Security и в соответствии с правилами, изложенными на странице:

http://support.kaspersky.ru/support/rules

.

5. Ограничения
5.1. Вы не вправе декомпилировать, дизассемблировать, модифицировать или выполнять производные работы, основанные на ПО, целиком или частично, за исключением случаев, предусмотренных законодательством.
5.2. Запрещается передавать право на использование ПО третьим лицам.
5.3. Запрещается сдавать ПО в аренду, прокат или во временное пользование.
5.4. За нарушение интеллектуальных прав на ПО нарушитель несет гражданскую, административную или уголовную ответственность в соответствии с законодательством.

6. Ограниченная гарантия и отказ от предоставления гарантий
6.1. Правообладатель не гарантирует Пользователю работоспособность ПО.
6.2. Вы соглашаетесь с тем, что ПО предоставляется со стандартными настройками, применяемыми по умолчанию, и ответственность за вносимые Вами изменения в настройки ПО лежит на Вас.
6.3. ПРОГРАММНОЕ ОБЕСПЕЧЕНИЕ ПОСТАВЛЯЕТСЯ «КАК ЕСТЬ». ПРАВООБЛАДАТЕЛЬ НЕ ДАЕТ НИКАКИХ ГАРАНТИЙ, УСЛОВИЙ, ПРЕДСТАВЛЕНИЙ ИЛИ ПОЛОЖЕНИЙ (ВЫРАЖАЕМЫХ В ЯВНОЙ ИЛИ В ПОДРАЗУМЕВАЕМОЙ ФОРМЕ) НА ВСЕ, ВКЛЮЧАЯ БЕЗ ОГРАНИЧЕНИЙ НЕНАРУШЕНИЕ ПРАВ ТРЕТЬИХ ЛИЦ, КОММЕРЧЕСКОЕ КАЧЕСТВО, ИНТЕГРАЦИЮ ИЛИ ПРИГОДНОСТЬ ДЛЯ ОПРЕДЕЛЕННЫХ ЦЕЛЕЙ. ВЫ СОГЛАШАЕТЕСЬ С ТЕМ, ЧТО ВЫ НЕСЕТЕ ОТВЕТСТВЕННОСТЬ ЗА ВЫБОР ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ ДЛЯ ДОСТИЖЕНИЯ НУЖНЫХ РЕЗУЛЬТАТОВ, ЗА УСТАНОВКУ И ИСПОЛЬЗОВАНИЕ ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ, А ТАКЖЕ ЗА РЕЗУЛЬТАТЫ, ПОЛУЧЕННЫЕ С ЕГО ПОМОЩЬЮ.

7. Ограничение ответственности
7.1. В МАКСИМАЛЬНОЙ СТЕПЕНИ, ДОПУСКАЕМОЙ ПРИМЕНИМЫМ ЗАКОНОДАТЕЛЬСТВОМ, ПРАВООБЛАДАТЕЛЬ НЕ НЕСЕТ ОТВЕТСТВЕННОСТИ ЗА КАКИЕ-ЛИБО УБЫТКИ И/ИЛИ УЩЕРБ (В ТОМ ЧИСЛЕ УБЫТКИ В СВЯЗИ С НЕДОПОЛУЧЕННОЙ КОММЕРЧЕСКОЙ ПРИБЫЛЬЮ, ПРЕРЫВАНИЕМ ДЕЯТЕЛЬНОСТИ, УТРАТОЙ ИНФОРМАЦИИ ИЛИ ИНОЙ ИМУЩЕСТВЕННЫЙ УЩЕРБ), ВОЗНИКАЮЩИЕ В СВЯЗИ С ИСПОЛЬЗОВАНИЕМ ИЛИ НЕВОЗМОЖНОСТЬЮ ИСПОЛЬЗОВАНИЯ ПРОГРАММНОГО ОБЕСПЕЧЕНИЯ, ДАЖЕ ЕСЛИ ПРАВООБЛАДАТЕЛЬ БЫЛ УВЕДОМЛЕН О ВОЗМОЖНОМ ВОЗНИКНОВЕНИИ ТАКИХ УБЫТКОВ И/ИЛИ УЩЕРБА. НАСТОЯЩИЕ ОГРАНИЧЕНИЯ НЕ МОГУТ БЫТЬ ИСКЛЮЧЕНЫ ИЛИ ОГРАНИЧЕНЫ В СООТВЕТСТВИИ С ПРИМЕНИМЫМ ЗАКОНОДАТЕЛЬСТВОМ.

8. Права на интеллектуальную собственность
8.1. Вы соглашаетесь с тем, что ПО, документация, как и все другие объекты авторского права, а также системы, идеи и методы работы, другая информация, которая содержится в ПО, товарные знаки являются объектами интеллектуальной собственности Правообладателя. Данное Соглашение не дает Вам никаких прав на использование объектов интеллектуальной собственности, включая товарные знаки и знаки обслуживания Правообладателя, за исключением прав, предоставленных настоящим Соглашением.
8.2. Запрещается удалять или изменять уведомления об авторских правах и другие проприетарные уведомления на любой копии ПО.

9. Применимое законодательство
9.1. Настоящее Соглашение регулируется в соответствии с законодательством Англии. Использование ПО AES Модуль Шифрования должно осуществляться в соответствии с локальным законодательством.

10. Контактная информация Правообладателя

Kaspersky Lab UK Limited
New Bridge Street House
30-34 New Bridge Street 
London, EC4V 6BJ 
United Kingdom
Адрес электронной почты:

info@kaspersky.com

Веб-сайт:

www.kaspersky.com

© Kaspersky Lab UK Ltd, 2018.

ПОЛИТИКА КОНФИДЕНЦИАЛЬНОСТИ ДЛЯ ПРОДУКТОВ И СЕРВИСОВ ЛАБОРАТОРИИ КАСПЕРСКОГО

Введение
АО «Лаборатория Касперского», находящаяся по следующему адресу: 125212, Российская Федерация, г.Москва, Ленинградское шоссе, 39А, стр.3, а также все компании, принадлежащие к группе «Лаборатория Касперского», обеспечивает Ваше право на конфиденциальность. Настоящая Политика Конфиденциальности для Продуктов и Сервисов (Политика Конфиденциальности) описывает, как мы используем информацию, предоставляемую Вами при использовании наших продуктов и сервисов, а также как Вы можете повлиять на использование такой информации. В Политике Конфиденциальности описаны меры, принимаемые нами для обеспечения защиты Ваших данных, а также информация о том, каким образом Вы можете связаться с нами для получения сведений о методах обеспечения конфиденциальности.
Продукты и сервисы могут быть предоставлены Лабораторией Касперского на условиях отдельных соглашений, условий использования, положений и т.п., которые могут дополнять настоящую Политику Конфиденциальности в части обработки данных. 
Настоящая Политика Конфиденциальности может быть обновлена в связи с изменениями в применимом законодательстве, требованиями органов власти или из-за изменений наших методов обеспечения конфиденциальности. Новые версии Политики Конфиденциальности вступают в силу немедленно с момента их размещения на веб-сайте:

www.kaspersky.com/Products-and-Services-Privacy-Policy
Текущая версия Политики Конфиденциальности вступает в силу с 1 февраля 2018 года.

Источники получения информации
Лаборатория Касперского может получать информацию о Вас из различных источников, а именно:
• от продуктов и сервисов;
• при регистрации продуктов и в сервисах Лаборатории Касперского;
• при обращениях в службу технической поддержки или других обращениях с целью обеспечить необходимую работоспособность продуктов и сервисов;
• на наших веб-сайтах;
• при участии в маркетинговых программах и другой коммуникации;
• при участии в различных предложениях, акциях и рекламных мероприятиях.
Вы также можете согласиться с возможностью раскрытия нам информации третьими лицами, полученной ими от Вас.

Информация, предоставляемая пользователями, и как мы используем такую информацию
Обработка данных Лабораторией Касперского всегда осуществляется на законных основаниях.
Вы всегда можете ознакомиться с тем, какую информацию Вы предоставляете в Лабораторию Касперского до начала использования продуктов и сервисов и до подтверждения Вашего согласия. Информацию, которую Вы предоставляете, зависит от того, какие сервисы, продукты или дополнительную функциональность Вы используете. Для более подробной информации о предоставляемых Вами данных, пожалуйста, ознакомьтесь с Лицензионным Соглашением, Положением о Kaspersky Security Network или другой документацией к продукту или сервису, который Вы используете, а именно:

ДЛЯ ДОМАШНИХ ПОЛЬЗОВАТЕЛЕЙ (B2C):
• РАЗДЕЛ «Б» ЛИЦЕНЗИОННОГО СОГЛАШЕНИЯ С КОНЕЧНЫМ ПОЛЬЗОВАТЕЛЕМ, КОТОРЫЙ ОПИСЫВАЕТ ИНФОРМАЦИЮ, ОБРАБОТКА КОТОРОЙ НЕОБХОДИМА ДЛЯ ВЫПОЛНЕНИЯ ОБЯЗАТЕЛЬСТВ ПО ДОГОВОРУ;
• ПОЛОЖЕНИЕ О KASPERSKY SECURITY NETWORK, КОТОРОЕ ОПИСЫВАЕТ ИНФОМАЦИЮ, НЕОБХОДИМУЮ ДЛЯ ОБРАБОТКИ С ЦЕЛЬЮ ПОВЫШЕНИЯ ЭФФЕКТИВНОСТИ ВАШЕЙ ЗАЩИТЫ;
• ПОЛОЖЕНИЕ ОБ ОБРАБОТКЕ ДАННЫХ В МАРКЕТИНГОВЫХ ЦЕЛЯХ, КОТОРОЕ ОПИСЫВАЕТ ИНФОРМАЦИЮ, НЕОБХОДИМУЮ ДЛЯ ОБРАБОТКИ ДЛЯ УЛУЧШЕНИЙ ПРОИЗВОДИТЕЛЬНОСТИ ПРОДУКТОВ, А ТАКЖЕ ДЛЯ ОЦЕНКИ УДОВЛЕТВОРЕННОСТИ ПОЛЬЗОВАТЕЛЕЙ;
• ОТДЕЛЬНЫЕ ПОЛОЖЕНИЯ, ОТНОСЯЩИЕСЯ К КОНКРЕТНОЙ ФУНЦИОНАЛЬНОСТИ, КОТОРЫЕ ОПИСЫВАЮТ ОБРАБАТЫВАЕМУЮ ИНФОРМАЦИЮ В ОТНОШЕНИИ КАКОЙ-ЛИБО ДОПОЛНИТЕЛЬНОЙ ФУНКЦИОНАЛЬНОСТИ ПРОДУКТОВ, К ПРИМЕРУ, АНТИСПАМ. ВЫ МОЖЕТЕ ОЗНАКОМИТЬСЯ С ТАКИМИ ПОЛОЖЕНИЯМИ ПРИ ВКЛЮЧЕНИИ ФУНКЦИОНАЛЬНОСТИ В ПРОДУКТЕ.

ДЛЯ БИЗНЕСА (B2B):
• ПОЛОЖЕНИЕ О KASPERSKY SECURITY NETWORK, КОТОРОЕ ОПИСЫВАЕТ ИНФОМАЦИЮ, НЕОБХОДИМУЮ ДЛЯ ОБРАБОТКИ С ЦЕЛЬЮ ПОВЫШЕНИЯ ЭФФЕКТИВНОСТИ ВАШЕЙ ЗАЩИТЫ. ДЛЯ НЕКОТОРЫХ ПРОДУКТОВ IT-АДМИНИСТРАТОР ИЛИ ДРУГОЙ СОТРУДНИК, УСТАНАВЛИВАЮЩИЙ ПРОДУКТ, ИМЕЕТ ВОЗМОЖНОСТЬ ВЫБРАТЬ ОБЪЕМ ОБРАБАТЫВАЕМОЙ ИНФОРМАЦИИ.

Информация, получаемая нами для обработки, зависит от продукта и сервиса, и мы настоятельно рекомендуем внимательно ознакомиться с соглашениями и сопутствующими положениями, с которыми необходимо согласиться в процессе установки или использования продукта или сервиса. 
Часть обрабатываемых данных по законодательству некоторых стран, к примеру, стран, входящих в Европейский Союз, классифицируется как персональные данные. Вне зависимости от классификации и территории, откуда данные были получены, мы используем самый высокий уровень стандартов защиты данных и применяем различные правовые, организационные и технические меры, чтобы защитить данные пользователей, гарантировать безопасность и конфиденциальность, а также обеспечить выполнение прав пользователей, гарантированных применимым законодательством. 
Информация, в зависимости от используемых продуктов и сервисов, может включать:

• Информация о лицензии
Такая информация обрабатывается с целью проверки правомерности использования продуктов и сервисов. Информация также необходима для поддержания связи между продуктом и IT-инфраструктуры Лаборатории Касперского для отправки и получения баз данных продуктов, обновлений и т.п.

• Информация о продукте
Также анализируется информация об активностях продукта и его взаимодействии с пользователем, в частности сколько времени у продукта заняло сканирование компьютера на наличие угроз, какая функциональность используется пользователями чаще, чем другие. Такая информация помогает нам улучшать продукты, увеличивать их производительность и делать их удобнее для использования.

• Информация об устройстве
Такая информация как тип устройства, операционная система и т.п, может понадобиться для того, чтобы пользователю после переустановки операционной системы не потребовалось покупать новую лицензию. Эта информация также помогает нам анализировать угрозы информационной безопасности, поскольку она дает нам представление о том, как много устройств было подвержено конкретной угрозе. 

• Обнаруженные угрозы
Если угроза (новая или известная) была найдена на устройстве, то информация о такой угрозе отправляется в Лабораторию Касперского. Это дает возможность нам анализировать угрозы, их источники, принципы заражения и т.п., что позволяет увеличивать качество и эффективность защиты каждого пользователя.

• Информация об установленных приложениях
Информация об установленных приложениях помогает создавать списки безопасных приложений, которые используются для уменьшения вероятностей ложных срабатываний. Информация о приложениях также используется для обновления и расширения категорий программ для такой функциональности, как Parental Control и Application Startup Control. В дополнении, такая информация помогает нам предлагать пользователям решения, которые наиболее подходят их потребностям.

• Информация о посещаемых URL адресах
URL адреса передаются нам для проверки, являются ли они вредоносными. Такая информация также помогает создавать списки безопасных веб-сайтов, которые используются для уменьшения вероятностей ложных срабатываний. Информация о посещаемых URL используется для обновления и расширения категорий веб-сайтов для решений Kaspersky Safe Kids, а также для повышения эффективности защиты при финансовых транзакциях при использовании таких продуктов, как Kaspersky Fraud Prevention. Дополнительно такая информация помогает нам предлагать пользователям решения, которые наиболее подходят их потребностям. Из передаваемых URL адресов мы исключаем информацию о логинах и паролях, даже если она хранится в первоначальном запросе браузера.

• События операционной системы
Новое вредоносное ПО, как правило, может быть обнаружено только по его подозрительному поведению. Из-за этого, продукты Лаборатории Касперского анализируют данные о процессах, запущенных на устройстве. Это позволяет на ранней стадии выявлять процессы, которые указывают на вредоносную активность, и предотвращать негативные последствия для пользователей, к примеру, уничтожение пользовательских данных.

• Подозрительные файлы и файлы, которые могут быть использованы злоумышленниками
Если на устройстве обнаружен неизвестный файл с подозрительным поведением, он может быть автоматически отправлен нам для более тщательного анализа с помощью технологий машинного обучения и, в отдельных случаях, с помощью вирусных аналитиков. Личные файлы (например, фотографии или документы) редко являются вредоносными и не ведут себя подозрительно. Поэтому категория «Подозрительные» включает в себя в основном исполняемые файлы (.exe). При расследовании инцидентов информационной безопасности также могут отправляться доверенные исполняемые и неисполняемые файлы целиком или их части.

• Информация о подключении к сетям Wi-Fi
Такая информация анализируется для того, чтобы предупредить пользователей о небезопасных (т. е. плохо защищенных) точках доступа Wi-Fi, что помогает предотвратить перехват данных.

• Контактная информация пользователя
Адреса электронной почты используются для авторизации на веб-порталах Лаборатории Касперского (My Kaspersky, Company Account, Kaspersky Endpoint Security Cloud и т. д.), которые позволяют пользователям управлять защитой удаленно. Адреса электронной почты могут быть использованы для отправки сообщений о безопасности (например, сообщения с важными предупреждения) пользователям продуктов Лаборатории Касперского. Пользователи также могут указать имена (или прозвища), для использования их в обращениях на портале My Kaspersky и в электронных письмах. Контактная информация предоставляется пользователями по собственному усмотрению.

• Файлы дампов и трассировок
Выставив специальные настройки в продуктах, пользователи также могут предоставить Лаборатории Касперского отчеты об ошибках для дальнейшего анализа. Эта информация помогает (1) если ошибки произошли в продукте, изменить его соответствующим образом, чтобы продукт работал более эффективно, и (2) в предотвращении и расследовании инцидентов информационной безопасности.

• Информация из электронных писем
При использовании в продуктах функциональности защиты от спама мы можем получать и анализировать информацию о сообщениях электронной почты, в том числе содержимое и данные об отправителях писем, чтобы защитить Вас от спама и мошенничества. Также мы анализируем информацию из писем, которые были отмечены пользователями как спам или неправильно определены как спам продуктами и сервисами.

• Информация об украденном устройстве
Вы можете использовать функциональность Anti-Theft, чтобы получить ограниченный удаленный доступ к Вашему мобильному устройству и управление им для защиты данных на Вашем мобильном устройстве в случае его кражи. Также Вы сможете получить данные о местонахождении украденного устройства. Для работы такая функциональность должна быть включена пользователем устройства.

• Данные для защиты детей
Если родитель или законный опекун хочет использовать решения для защиты детей, к примеру, Kaspersky Safe Kids, он может получать информацию об устройстве ребенка и информацию о местоположении ребенка. Кроме того, родитель или опекун может настроить параметры, чтобы блокировать или разрешать доступ к определенным веб-сайтам, а также блокировать или разрешать запуск определенных приложений на устройстве ребенка. Лаборатория Касперского не обрабатывает данные о детях вне рамок такой функциональности.

ЛАБОРАТОРИЯ КАСПЕРСКОГО ОБРАБАТЫВАЕТ ИНФОРМАЦИЮ ТОЛЬКО ДЛЯ КОНКРЕТНЫХ, ЗАРАНЕЕ ОПРЕДЕЛЕННЫХ ЦЕЛЕЙ, КОТОРЫЕ РАЗРЕШЕНЫ ПРИМЕНИМЫМ ЗАКОНОДАТЕЛЬСТВОМ И ИМЕЮТ ОТНОШЕНИЕ К ДЕЯТЕЛЬНОСТИ ЛАБОРАТОРИИ КАСПЕРСКОГО.
• Для обеспечения выполнения контракта с пользователями и обеспечения заявленной функциональности продуктов и сервисов.
• Для защиты пользователей от известных угроз информационной безопасности.
• Для проверки лицензий у пользователей.
• Для повышения эффективности защиты, в частности для обеспечения более быстрого ответа на новые информационные и сетевые угрозы информационной безопасности, повышения эффективности работы компонентов защиты продуктов, уменьшения вероятностей ложных срабатываний.
• Для улучшения качества продуктов и сервисов, удобства их использования, разработки новых продуктов и сервисов, а также в маркетинговых целях для предоставления контента и рекламных материалов, интересных пользователям.
• Для предоставления технической поддержки продуктов и сервисов.
• Проведение статистических и иных исследований на основе обезличенных данных.
Лаборатория Касперского хранит данные в течение срока, необходимого для достижения целей, которые указаны в принимаемых соглашениях (положение о KSN, лицензионных соглашениях, согласиях), или для соблюдения применимого законодательства.

ОГРАНИЧЕНИЕ ОБРАБОТКИ ДАННЫХ
ЕСЛИ ВЫ РЕШИТЕ НЕ ПРЕДОСТАВЛЯТЬ ДАННЫЕ, НЕОБХОДИМЫЕ ДЛЯ РАБОТЫ ПРОДУКТА ИЛИ ОПРЕДЕЛЕННОЙ ФУНКЦИОНАЛЬНОСТИ, ВЫ НЕ СМОЖЕТЕ ИСПОЛЬЗОВАТЬ ПРОДУКТ ИЛИ ФУНКЦИОНАЛЬНОСТЬ. ЭТИ НЕОБХОДИМЫЕ ДАННЫЕ УКАЗАНЫ В ЛИЦЕНЗИОННОМ СОГЛАШЕНИИ С КОНЕЧНЫМ ПОЛЬЗОВАТЕЛЕМ. ПОЛОЖЕНИЕ О KASPERSKY SECURITY NETWORK ИЛИ ПОЛОЖЕНИЕ ОБ ОБРАБОТКЕ ДАННЫХ ДЛЯ МАРКЕТИНГОВЫХ ЦЕЛЕЙ СОДЕРЖАТ СПИСОК ДАННЫХ, КОТОРЫЕ ПОЛЬЗОВАТЕЛИ МОГУТ СОГЛАСИТЬСЯ ПРЕДОСТАВИТЬ НАМ В ЛЮБОЕ ВРЕМЯ, ПРОСТАВИВ СООТВЕТСТВУЮЩУЮ ГАЛОЧКУ В НАСТРОЙКАХ ПРОДУКТА (ПОЛЬЗОВАТЕЛИ ТАКЖЕ МОГУТ ОТМЕНИТЬ ЭТО РЕШЕНИЕ, КОГДА ЗАХОТЯТ). 

Что мы не будем обрабатывать:
Продукты и сервисы Лаборатория Касперского никогда не собирает «чувствительные» данные пользователей, такие как данные о вероисповедании, политических взглядах, сексуальных предпочтениях, здоровье или другие специальные категории данных. Мы не хотим получать такие данные и не запрашиваем таковые от Вас.
Продукты Лаборатории Касперского должны устанавливаться и использоваться взрослым. Дети могут использовать устройство, на котором был установлен продукт Лаборатории Касперского, только с разрешением родителей или законных опекунов. За исключением информации, описанной в «Данные для защиты детей», мы не намерены обрабатывать персональные данные детей, а также не хотим получать персональные данные детей.

Где мы обрабатываем информацию и как мы делимся ею
Данные, предоставленные пользователем, могут быть обработаны в следующих странах:

• Россия
• Германия
• Швейцария
• Франция
• Голландия
• Великобритания
• Сингапур
• Китай
• Япония
• Канада
• Азербайджан
• США
• Мексика
Мы никогда не предоставляем данные или доступ к ним государственным организациям или третьим лицам. Мы можем раскрывать информацию только в следующих случаях:
• Внутри группы компаний Лаборатория Касперского. Компании могут обмениваться данными.
• Поставщики услуг. Мы также можем использовать информацию, полученную от Вас, совместно с поставщиками, которые предоставляют нам услуги, включая компании, которые предоставляют сервисы веб-аналитики, обработки данных, рекламы, электронной почты, обработки платежей, выполнения заказов и других услуг. 
Обратите внимание, что некоторые из наших продуктов, например, Kaspersky Secure Connection, содержат ссылки на продукты третьих лиц, чьи процедуры обеспечения конфиденциальности отличаются от таких процедур в Лаборатории Касперского. Если Вы предоставляете данные любому из таких продуктов, обработка Ваших данных регулируется положениями о конфиденциальности компаний, являющихся правообладателями таких продуктов.

Ваши права и возможности
В большинстве случаев Вы можете отказаться от предоставления нам данных при использовании продуктов, сервисов и веб-сайтов Лаборатории Касперского. Однако, если Вы не предоставляете данные по какому-либо запросу, Вы не сможете воспользоваться полным спектром продуктов и сервисов Лаборатории Касперского, их функциональности, а также мы не сможем предоставить вам информацию о продуктах, сервисах и акциях.
Вы можете в любое время отказаться от получения маркетинговых материалов, нажав на ссылку «отписаться» в маркетинговых электронных письмах, которые Вы от нас получаете.
Если Ваш работодатель предоставляет Ваши данные Лаборатории Касперского, у Вас может быть определенная возможность выбора в отношении использования или раскрытия Лабораторией Касперского этой информации. Пожалуйста, свяжитесь с Вашим работодателем, чтобы узнать о своих возможностях.
В некоторых случаях отзыв Вашего согласия на обработку Лабораторией Касперского Ваших данных будет означать, что Вы не сможете воспользоваться определенными продуктами или сервисами Лаборатории Касперского.
В соответствии с действующим законодательством, Вы имеете право: получать подтверждение о том, что мы храним Ваши данные, запрашивать доступ и получать информацию о Ваших данных, получать копии Ваших данных, обновлять и исправлять неточности в Ваших данных, возражать против обработки Ваших данных, а также право на блокирование, анонимизацию и удаление данных. Право доступа к Вашим данным может быть ограничено при определенных обстоятельствах в соответствии с действующим законодательством. Для реализации вышеуказанных прав, просим Вас обращаться по адресу, указанному в разделе «Как с нами связаться».
Если Вы предоставляете любую информацию или материалы, относящиеся к другому человеку, Вы должны быть уверены, что подобный обмен информацией с нами и последующее использование этой информации с нашей стороны находится в соответствии с действующим законодательством. Например, Вы должны сообщить человеку об обработке ее/его данных и получить ее/его согласие, что может быть необходимо в рамках действующего законодательства.
Вы можете обращаться к нам по контактным данным, указанным в разделе “Как с нами связаться”. Для улучшения качества ответов на Ваши запросы, пожалуйста, предоставьте полную информацию по каждому интересующему вопросу. Мы предпринимаем все усилия для обработки всех запросов в рамках разумных сроков. 

Принципы обеспечения конфиденциальности
Обработка данных в Лаборатории Касперского основана на следующих принципах:

Согласие и выбор
• Предоставление пользователям выбора – разрешить или отказаться от обработки данных. Выбор пользователя должен быть осознанным и добровольным;
• Информирование пользователей об их правах перед получением согласия;
• Предоставление пользователям перед получением согласия необходимой информации согласно принципам открытости, прозрачности и осведомленности;
• Объяснение пользователям последствий разрешения или отказа от обработки их данных.

Законность и конкретность цели 
• Обеспечение того, чтобы цель(-и) соответствовала применимому законодательству и полагалась на допустимую правовую основу;
• Информирование пользователей о новой цели(-ях) до использования данных; 
• Использование для описания конкретной цели понятного и доступного языка.

Ограничения на обработку данных
• Ограничение получения данных только в рамках границ, указанных в действующем законодательстве, и необходимых исключительно для указанной цели(-ей).
• Удаление данных в случае, если цель для обработки указанных данных исчерпана, и не существует никаких юридических требований для хранения данных, или это нецелесообразно.

Использование, хранение и ограничение раскрытия данных
• Ограничение на использование, хранение и раскрытие данных в рамках выполнения конкретных, явных и законных целей;
• Ограничение на использование данных в рамках целей, указанных Лабораторией Касперского до получения данных, если иные цели явным образом не указаны в рамках действующего законодательства;
• Хранение данных только на срок выполнения указанных целей с надежным удалением и анонимизацией при истечении указанного срока;
• Блокировка (т.е. архивирование, защита и изъятие данных из дальнейшей обработки) любых данных после истечения срока выполнения указанных целей, за исключением требований хранения со стороны действующего законодательства.

Качество обработки
• Создание процедур для обеспечения качества обработки данных;
• Создание механизмов контроля для периодической проверки качества обработки данных.

Открытость, прозрачность и осведомленность
• Предоставление пользователям ясной и легкодоступной информации о политиках Лаборатории Касперского в части обработки данных;
• Создание процедур по обработке данных;
• Добавление в информационные уведомления сведений об обработке данных, целях обработки данных, типах заинтересованных сторон, которым могут быть предоставлены данные, информацию об организации, которая определяет вышеуказанные требования, и о том, как с ней связаться;
• Раскрытие возможностей и средств, предоставляемых Лабораторией Касперского пользователям для целей ограничения обработки данных, доступа к ним, их корректировке и удаления;
• Уведомления пользователей о существенных изменениях в процедурах по обработке данных, если таковые произойдут.

Индивидуальное участие и доступ
• Предоставление пользователям возможности связаться с нами (используя контакты в разделе “Как с нами связаться”) и просмотреть свои данные.

Обеспечение информационной безопасности: как мы защищаем Вашу конфиденциальную информацию
Обеспечение информационной безопасности – основа бизнеса Лаборатории Касперского. Все предоставляемые Вами данные являются конфиденциальными по умолчанию. Вследствие этого Лаборатория Касперского всегда принимает разумные и достаточные технические и организационные меры для защиты данных, учитывая возможные риски обработки персональных данных, а также использует новейшие процедуры и стандарты безопасности. Помимо других целей, для установки определенного уровня безопасности и соответствия ему, Лаборатория Касперского классифицирует системы обработки данных и осуществляет ряд последовательных мер защиты.
Лаборатория Касперского также обеспечивает технические и организационные меры с целью защиты информации от потери, ненадлежащего использования, повреждения или изменения и несанкционированного доступа или раскрытия. Некоторые из ключевых принципов нашей системы обеспечения информационной безопасности:
• Наличие Департамента информационной безопасности, который разрабатывает и осуществляет контроль нашей системы обеспечения информационной безопасности;
• Определение рисков безопасности при обработке данных в системах обработки Лаборатории Касперского;
• Применение соответствующих инструментов защиты информации;
• Оценка эффективности мер защиты данных до их ввода в эксплуатацию в системах обработки;
• Внедрение средств контроля идентификации, аутентификации и авторизации доступа к различным сервисам или веб-сайтам;
• Выявление фактов несанкционированного доступа к данным и принятие соответствующих мер;
• Восстановление модифицированных или уничтоженных данных;
• Установление правил доступа к персональным данных, обрабатываемых в системах обработки информации Лаборатории Касперского, а также регистрация и учет всех действий с персональными данными в этих системах;
• Обеспечение шифрования между нашими клиентами и серверами (а также между нашими центрами обработки данных);
• Разграничение доступа наших сотрудников и подрядчиков, которые должны знать информацию для того, чтобы обрабатывать ее для нас, и которые подпадают под строгие договорные обязательства обеспечения конфиденциальности по отношению к данным. К ним могут быть применены дисциплинарные взыскания, или действие их контракта может быть прекращено, если они не выполняют взятых обязательств;
• Мониторинг наших инфраструктурных систем для выявления слабых мест и потенциальных вторжений;
• Мониторинг принимаемых мер для обеспечения защиты данных;
• Обеспечение сотрудников Лаборатории Касперского соответствующей подготовкой, и постоянное обновление наших методов обеспечения безопасности данных в свете новых рисков и развития технологий.

Документ актуален на момент публикации.
Актуальная версия документа доступна по ссылке 

«Лаборатория Касперского»

Рамка верх.png

 

— Для консультации по продуктам Kaspersky Security для бизнеса, заполните Форму «Отправить запрос».
— Консультация по программам Лаборатории Касперского;
— Купить Kaspersky Security для бизнеса в России; 
— Цена Kaspersky Security для бизнеса

Kaspersky Endpoint Security для бизнеса Стандартный

Все покупатели Kaspersky Endpoint Security для бизнеса могут получить скидку 40% на Kaspersky Security для почтовых серверов. Чтобы воспользоваться предложением, сообщите номер лицензии Kaspersky Endpoint Security для бизнеса по контактам: Марина Королева Marina.Koroleva@allsoft.ru или по тел. 8 (800) 200-22-33 доб.2223.

Подробнее здесь: https://allsoft.ru/offers/skidka-40-na-kaspersky-dlya-pochtovykh-serverov/

Внимание! Вы можете активировать приобретенное ПО только в пределах Российской Федерации.

Внимание! Период действия лицензии начнется, как только вы завершите оплату заказа.

После окончания срока действия лицензионного соглашения в течение 1 года вы можете возобновить лицензионное использование продукта, купив Продление. Продление подписки осуществляется на тот же продукт и то же количество лицензий, которые указаны в первичном лицензионном соглашении.

Языки интерфейса: Русский
Операционные системы: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows 2012 Server, Windows 2008 Server
Способ доставки: электронная доставка


+
Системные требования

Аппаратные и программные требования

Для функционирования Kaspersky Endpoint Security компьютер должен удовлетворять следующим требованиям.

  • Процессор: с поддержкой инструкций SSE2: для рабочих станций – с частотой 1 ГГц, для серверов – 1,4 ГГц
  • Оперативная память: 1 ГБ для 32-разрядной ОС (2 ГБ для 64-разрядной ОС или сервера)
  • Не менее 2 ГБ свободного места на жестком диске.

Операционные системы

  • Windows 11
  • Windows 10 (все версии)
  • Windows 8.1
  • Windows 8
  • Windows 7 (все версии), Service Pack 1 или выше
  • Windows Server 2022
  • Windows Server 2019 Essentials/Standard/Datacenter
  • Windows Server 2016 Essentials/Standard/Datacenter
  • Windows Server 2012 R2 Foundation/Essentials/Standard/Datacenter
  • Windows Server 2012 Foundation/Essentials/Standard/Datacenter
  • Windows Server 2008 R2 (все версии), Service Pack 1 или выше
  • Windows MultiPoint Server 2011 или выше
  • Small Business Server 2011 или выше

Виртуальные платформы

  • VMWare Workstation 16.1.1 Pro
  • VMWare ESXi 7.0U2a
  • Microsoft Hyper-V 2019
  • Citrix Virtual Apps and Desktops 7 2103.
  • Citrix Provisioning 7 2012
  • Citrix XenServer 8.2 LTSR


V

Продукт добавлен в корзину ?


Электронная лицензия на 1 год


цена за копию (от 10 до 14)



Артикул:
KL4863RPKFS








25 560 ₽

В корзину

Оформить заказ


!
Поставка:
на email. Доставка в электронном виде составляет от 10 минут при онлайн платеже. При других способах оплаты — 1-2 рабочих дня после зачисления денежных средств.

Kaspersky Endpoint Security для бизнеса Стандартный Продление

Внимание! Вы можете активировать приобретенное ПО только в пределах Российской Федерации.

Внимание! Период действия лицензии суммируется с остатком периода действия вашей текущей лицензии.

Внимание! Продление возможно только в течение 365-и дней после окончания срока действия продляемой лицензии. Продление подписки осуществляется на тот же продукт и то же количество лицензий, которые указаны в первичном лицензионном соглашении.

Языки интерфейса: Русский
Операционные системы: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows 2012 Server, Windows 2008 Server
Способ доставки: электронная доставка


+
Системные требования

Аппаратные и программные требования

Для функционирования Kaspersky Endpoint Security компьютер должен удовлетворять следующим требованиям.

  • Процессор: с поддержкой инструкций SSE2: для рабочих станций – с частотой 1 ГГц, для серверов – 1,4 ГГц
  • Оперативная память: 1 ГБ для 32-разрядной ОС (2 ГБ для 64-разрядной ОС или сервера)
  • Не менее 2 ГБ свободного места на жестком диске.

Операционные системы

  • Windows 11
  • Windows 10 (все версии)
  • Windows 8.1
  • Windows 8
  • Windows 7 (все версии), Service Pack 1 или выше
  • Windows Server 2022
  • Windows Server 2019 Essentials/Standard/Datacenter
  • Windows Server 2016 Essentials/Standard/Datacenter
  • Windows Server 2012 R2 Foundation/Essentials/Standard/Datacenter
  • Windows Server 2012 Foundation/Essentials/Standard/Datacenter
  • Windows Server 2008 R2 (все версии), Service Pack 1 или выше
  • Windows MultiPoint Server 2011 или выше
  • Small Business Server 2011 или выше

Виртуальные платформы

  • VMWare Workstation 16.1.1 Pro
  • VMWare ESXi 7.0U2a
  • Microsoft Hyper-V 2019
  • Citrix Virtual Apps and Desktops 7 2103.
  • Citrix Provisioning 7 2012
  • Citrix XenServer 8.2 LTSR


V

Продукт добавлен в корзину ?


Электронная лицензия на 1 год


цена за копию (от 10 до 14)



Артикул:
KL4863RPKFR








17 890 ₽

В корзину

Оформить заказ


!
Поставка:
на email. Доставка в электронном виде составляет от 10 минут при онлайн платеже. При других способах оплаты — 1-2 рабочих дня после зачисления денежных средств.

Windows 10,Windows 8.1,Windows 8,Windows 7,Windows 2012 Server,Windows 2008 Server

Понравилась статья? Поделить с друзьями:
  • Акционерное общество акционерная страховая компания инвестстрах
  • Акционерное общество алтайская молочная компания инн 0411147176
  • Акционерное общество национальная авиационно сервисная компания
  • Акционерное общество теплоэнергетическая компания мосэнерго инн
  • Акционерное общество управляющая компания дальневосточный рыбак