Software License Agreement & Hardware Warranty

SecurePalm M Security is powered by Check Point Technologies Ltd, therefore usage of its application is governed by its terms and conditions.

Part I – Software LICENSE AGREEMENT

This License Agreement (the “Agreement”) is an agreement between you (both the individual installing the Product and any legal entity on whose behalf such individual is acting) (hereinafter “You” or “Your”) and Check Point Software Technologies Ltd. (hereinafter “Check Point”).

TAKING ANY STEP TO SET-UP, USE OR INSTALL THE PRODUCT CONSTITUTES YOUR ASSENT TO AND ACCEPTANCE OF THIS AGREEMENT. WRITTEN APPROVAL IS NOT A PREREQUISITE TO THE VALIDITY OR ENFORCEABILITY OF THIS AGREEMENT AND NO SOLICITATION OF ANY SUCH WRITTEN APPROVAL BY OR ON BEHALF OF YOU SHALL BE CONSTRUED AS AN INFERENCE TO THE CONTRARY. IF YOU HAVE ORDERED THIS PRODUCT SUCH ORDER IS CONSIDERED AN OFFER BY YOU, CHECK POINT’S ACCEPTANCE OF YOUR OFFER IS EXPRESSLY CONDITIONAL ON YOUR ASSENT TO THE TERMS OF THIS AGREEMENT, TO THE EXCLUSION OF ALL OTHER TERMS. THIS AGREEMENT SUPERSEDES ANY PREVIOUS VERSIONS. IF THESE TERMS ARE CONSIDERED AN OFFER BY CHECK POINT, YOUR ACCEPTANCE IS EXPRESSLY LIMITED TO THE TERMS OF THIS AGREEMENT. IF YOU DO NOT AGREE WITH ALL THE TERMS OF THIS AGREEMENT, YOU MUST RETURN THIS PRODUCT WITH THE ORIGINAL PACKAGE AND THE PROOF OF PAYMENT TO THE PLACE YOU OBTAINED IT FOR A FULL REFUND.

1. DEFINITIONS

“Affiliate” means any legal entity (i) directly or indirectly owning or controlling You; (ii) under the same direct or indirect ownership or control as You; or (iii) directly or indirectly controlled by You. Ownership or control shall exist through direct or indirect ownership of more than fifty percent (50%) of the nominal value of the issued equity share capital or of more than fifty percent (50%) of the voting rights.

“Licensed Configuration” means to the extent applicable, as indicated on the License Key, the choice of features and the maximum number of users, devices or nodes (an internal computing device with an IP address) on the trusted side of the network or that is trying to traverse the firewall, and the numbers of cores, or the maximum throughput capacity stated, or the code generated from the master installation, or any other hardware or software specifications, as declared by You in Your purchase order, or request for License Key, and upon which the licensing fee was based. If the Product purchased by You does not come with a License Key then the Licensed Configuration shall be the minimum configuration allowed for the Product by Check Point upon which the licensing fee was based.

“Licensed-server” means the server or appliance (defined by the host ID identified by You to Check Point when obtaining the License Key) which enables the Product to operate in accordance with the Licensed Configuration.

“License Key”means the code provided to You by Check Point, which enables the Product to operate on the Licensed-server or appliance for the specified Licensed Configuration.,/p>

“Product” means the object code copy of the software program, including Third Party Software, provided to You in association with this Agreement, together with the associated original electronic media and/or associated hardware devices (“Hardware Products”) and all accompanying manuals and other documentation, if available, and together with all enhancements, upgrades, and extensions thereto that may be provided by Check Point to You from time to time.

“Managed Service Provider” means (a) You are in the regular business of managing the functionality of the Product for a fee, to entities that are not Your Affiliates (each a “Service Customer”); or if You are a company that provides such managed services to Standard Users that are a part of your corporation or of your Affiliates or (b) You indicated in Your purchase order or in requesting the License Key, that You intend to use the Products on behalf of Service Customers, and (c) You purchased the managed service provider package, if applicable.

“Standard User” means You indicated in Your purchase order or in requesting the License Key that You intend to use the Products on Your own behalf, or You obtained the products from a Managed Service Provider, reseller, vendor or any other intermediate supplier.

“Third Party Software” means any software programs provided by third parties contained in the Product.

“Third Party Software Provider” means the third party that has the right to provide and grant licenses for the use of Third Party Software.

2. LICENSE AND RESTRICTIONS

2.1 License. Subject to the terms and conditions of this Agreement, and payment of the applicable Product fees, Check Point hereby grants only to You, a non-exclusive, nonsublicensable, non-transferable perpetual license (with the exception of (i) the license shall not be perpetual if the Product is designated for a limited time period only, in which case the license shall terminate at the expiration of the applicable period; and (ii) with regards to any Hardware Product, the license shall be valid only as part of and for the life of the originally designated Hardware Product) to install and use the copy of the Product in accordance with the relevant end user documentation provided by Check Point only on the Licensed-server and only for the Licensed Configuration. You have no right to receive, use or examine any source code or design documentation relating to the Product.

2.2 Standard User Restrictions. If You are a Standard User, the Products are licensed to You solely for use by You to provide policy management for Your own operations. To the extent applicable, You may reproduce the downloaded or installed Product for the purpose of connecting only with a duly licensed Check Point product, in accordance with the functionality, as described in the accompanying documentation for which You have paid the applicable fees to Check Point, and only within the designated limits of Your Product license for which You have purchased and provided to users, according to the restricted, maximum, authorized number of users, computer instances (means a computing unit individuated by an instance of an operation system), or copies of the Product (as the case may be) that can be used and installed at any given time. No Product, nor any portion thereof, may be used by or on behalf of, accessed by, re-sold to, rented to, or distributed to any other party.

2.3 Managed Service Provider Restrictions. If You are a Managed Service Provider, the Products are licensed to You for use by You to manage the functionality of the Product only for the operations of Your Service Customers. You are responsible for the compliance with the applicable terms and conditions set forth in this Agreement by your Service Customers. No Product, nor any portion thereof, may be used by or on behalf of, accessed by, re-sold to, rented to, or distributed to multiple customers, or to any other party, except for the management of Your Service Customers who have made a valid purchase of the Product.

2.4 General Restrictions. Except for copies solely for back-up or disaster recovery purposes or as may be permitted by applicable law, You may not copy the Product, in whole or in part. You must reproduce and include the copyright notice and any other notices that appear on the original Product on any back up copy. You agree not to allow others to use the Product and You will not use the Product for the benefit of third parties. You acknowledge that the source code of the Product, and the underlying ideas or concepts, are valuable intellectual property of Check Point and You agree not to, except as expressly authorized and only to the extent established by applicable statutory law, attempt to (or permit others to) decipher, reverse translate, decompile, disassemble or otherwise reverse engineer or attempt to reconstruct or discover any source code or underlying ideas or algorithms or file formats or programming or interoperability interfaces of the Products by any means whatsoever. You will not develop methods to enable unauthorized parties to use the Product, or to develop any other product containing any of the concepts and ideas contained in the Product not independently developed by You. You will not (and will not direct any third party to) modify Product or incorporate any portion of Product into any other software or create a derivative work of any portion of the Product. You will not (and will not direct any third party to) remove any copyright or other proprietary notices from the Product. Your use of the Product may require the purchase of separate licenses to use particular features, functionalities, operations, or capabilities.

2.5 Specific Restrictions. The Product is licensed to You based on the applicable Licensed Configuration purchased, as set forth in the Licensed Configuration definition in Section 1. The License permits the use of the Product only in accordance with the Product specifications as declared by You in Your purchase order, or request for License Key, and upon which the licensing fee was based. It is a violation of this License Agreement to create, set-up or design any hardware, software or system which alters the number of readable IP addresses, users, number of cores or exceeds the maximum throughput capacity presented to the Product with the intent, or resulting effect, of circumventing the Licensed Configuration.

2.6 Evaluation License. This Section shall only apply if You are licensing the Product for an initial evaluation period. The license is valid only for the designated evaluation period and is designed to allow You to evaluate the Product during such period. In the event that You wish to enter into a longer-term license agreement with Check Point, You may request a License Key from Check Point which if provided to You will allow You to use the Product after such evaluation period, but only subject to all of the terms and conditions of this Agreement. In the event that You determine not to enter into a licensing transaction with Check Point at the end of such evaluation period, or in the event that Check Point advises You that discussions with respect to a licensing transaction have terminated, then Your rights under this Agreement shall terminate and You shall promptly return to Check Point or destroy all copies of the Product.

2.7 Disabled License-server. The License Key You obtain from Check Point enables the Licensed-server which enables You to use the Licensed Configuration of the Product. If your Licensed-server is disabled for any reason, Check Point may, at its sole discretion, issue You another License Key which will enable You to operate this Product on a substitute Licensedserver. In this event, You agree not to use the Product on the original Licensed-server nor its License Key.

2.8 Customization for Product with VPN Functionality. For a Product with VPN functionality, customization is permitted to allow the inclusion of a bitmap on the left side of the authentication challenge/response dialog, and the insertion of text in the authentication success and authentication failure dialog boxes; provided, however, that the Product is used to communicate with a Check Point VPN-1 gateway licensed to the entity using the Product and the customization may not contain any reference to a competitive gateway or to Check Point products or services without Check Point’s prior written approval.

2.9 Check Point Media Encryption Blade, DLP-1 Product Family and Check Point Capsule Docs Product Family. If you are using any of these products, in many countries you may be required to advise users that their data, actions taken on the data, and web traffic may be inspected. Please consult the Check Point user guide and local laws as applicable.

2.10 Third Party Violation. In purchasing a Product, You are acknowledging that Check Point may need to make a determination for You on the potential effect the identified programs may have on Your system. You agree that the Product may automatically delete and/or restrict access to certain programs and/or provide to You the customized ability to delete and/or restrict access to certain programs. The deletion and/or restriction of access to any of these programs may be in violation with other license agreements that You have knowingly or unknowingly agreed to. The deletion and/or restriction of these programs and the potential violation of a third party license is Your responsibility. Check Point has no ability to verify what, if any, third party agreements You may have agreed to.

2.11 Inspecting Encrypted Traffic. Certain Check Point products and/or features may enable the inspection of encrypted traffic. The ability to define the inspection rules is provided to You and You may define it based on your organizational needs. However, it shall be your sole responsibility to comply with all applicable laws and regulations in defining Your inspection rules and privacy regulations. You understand that this feature enables decrypting the traffic at the gateway in order to inspect it, after which it is re-encrypted before it is sent to the server.

3. MAINTENANCE AND SUPPORT

Check Point has no obligation to provide You with any service (such as, but not limited to, technical support, maintenance, upgrades, modifications, or new releases) under this Agreement. The purchase of services, if applicable, shall be governed by the applicable Service Level Agreement. Any purchase of upgrades shall be subject to this Agreement, unless otherwise indicated by Check Point.

4. TITLE AND INTELLECTUAL PROPERTY

All right, title, and interest in and to the Product shall remain with Check Point and its licensors. The Product is protected under international copyright, trademark and trade secret and patent laws. The license granted herein does not constitute a sale of the Product or any portion or copy of it.

5. TERM AND TERMINATION

This Agreement is effective until terminated. Check Point may terminate this Agreement upon Your breach of any of the provisions hereof that is not cured within thirty (30) days. This Agreement will terminate immediately without notice from Check Point if You (i) fail to comply with any material provision of this Agreement, or (ii) if the license of the Product is terminated for any reason. Upon termination of this Agreement, You agree to cease all use of the Product and to return to Check Point or destroy the Product and all documentation and related materials in your possession, and so certify to Check Point. Except for the license granted herein and as expressly provided herein, the terms of this Agreement shall survive termination.

6. INDEMNIFICATION

Check Point shall have the right, but not the obligation, to defend or settle, at its option, any action at law against You arising from a claim that Your permitted use of the Product under this Agreement infringes any patent, copyright, or other ownership rights of a third party. You agree to provide Check Point with written notice of any such claim within ten (10) days of Your notice thereof and provide reasonable assistance in its defense. Check Point has sole discretion and control over such defense and all negotiations for a settlement or compromise, unless it declines to defend or settle, in which case, You are free to pursue any alternative You may have.

7. LIMITED WARRANTY, WARRANTY DISCLAIMERS AND LIMITATION OF LIABILITY

7.1 Limited Software Warranty. Check Point warrants to You that the encoding of the software program on the media on which the Product is furnished will be free from defects in material and workmanship, and that the Product shall substantially conform to its user manual, as it exists at the date of delivery, for a period of ninety (90) days. Check Point’s entire liability and Your exclusive remedy under this warranty shall be, at Check Point’s option, either: (i) return of the price paid to Check Point for the Product, resulting in the termination of this Agreement, or (ii) repair or replacement of the Product or media that does not meet this limited warranty. EXCEPT FOR THE LIMITED WARRANTIES SET FORTH IN THIS SECTION 7.1, THE PRODUCT AND ANY SERVICES ARE PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED. CHECK POINT DOES NOT WARRANT THAT THE PRODUCT WILL MEET YOUR REQUIREMENTS OR THAT ITS OPERATION WILL BE UNINTERRUPTED OR ERROR FREE. CHECK POINT DISCLAIMS ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. Some jurisdictions do not allow the exclusion of implied warranties or limitations on how long an implied warranty may last, so the above limitations may not apply to You. This warranty gives You specific legal rights. You may have other rights that vary from state to state.

7.2 Limited Hardware Warranty. Check Point’s warranty for Hardware products is described in the Limited Hardware Warranty page attached to this Agreement.

7.3 Limitation of Liability. You are solely responsible for adequate protection and backup of the data and equipment used in connection with the Product. Check Point does not guarantee that use of the Product will be uninterrupted or error-free. Check Point does not guarantee that the information accessed by the Product will be accurate or complete. You acknowledge that performance of the Product may be affected by any number of factors, including without limitation, technical failure of the Product, the acts or omissions of third parties and other causes reasonably beyond the control of Check Point. Certain features of the Product may not be forward-compatible with future versions of the Product and use of such features with future versions of the Product may require purchase of the applicable future version of the Product. EXCEPT FOR BODILY INJURY OF A PERSON, IN NO EVENT WILL CHECK POINT BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY DAMAGES ARISING OUT OF THE SUBJECT MATTER OF THIS AGREEMENT, THE PRODUCT OR ANY SERVICES UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY OR OTHER THEORY, FOR ANY INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES (INCLUDING LOST PROFITS), OR FOR LOSS OF OR CORRUPTION OF DATA, OR FOR COST OF PROCUREMENT OF SUBSTITUTE GOODS OR TECHNOLOGY, IRRESPECTIVE OF WHETHER CHECK POINT HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CHECK POINT’S MAXIMUM LIABILITY FOR DAMAGES SHALL BE LIMITED TO THE LICENSE FEES RECEIVED BY CHECK POINT UNDER THIS LICENSE FOR THE PARTICULAR PRODUCT(S) WHICH CAUSED THE DAMAGES. Some jurisdictions do not allow the exclusion or limitation of incidental or consequential damages, so the above limitation or exclusion may not apply to You.

8. PRE-RELEASE VERSIONS

8.1 License Grant. With respect to any pre-release version of a Check Point product, including a Beta or an Early Availability product (all collectively referred to herein as a “Beta Product”) that may be provided to You by Check Point from time to time, at its sole discretion, Check Point grants You a non-transferable and non-exclusive license to use the Beta Product for evaluation purposes only. The license is designed to provide You with early operational experience with the Beta Product and to provide Check Point with specified information regarding Your experiences with the installation and operation of the Beta Product. The license shall be in effect for a limited period as determined by Check Point and certain other restrictions may apply. You may be asked to sign a separate agreement pertaining to the Beta Product.

8.2 No Obligations. Check Point has no obligation to provide support, maintenance, upgrades, modifications, or new releases for a Beta Product. Owing to the experimental nature of the Beta Product, You are advised not to rely exclusively on the Beta Product for any reason. NOTWITHSTANDING THE AFOREMENTIONED IN THIS AGREEMENT, YOU AGREE THAT THE BETA PRODUCT AND RELATED DOCUMENTATION ARE BEING DELIVERED “AS IS” WITHOUT WARRANTIES OF ANY KIND, INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL CHECK POINT BE LIABLE TO YOU OR ANY OTHER PERSON FOR DAMAGES, DIRECT OR INDIRECT, OF ANY NATURE OR EXPENSES INCURRED BY YOU IN CONNECTION WITH THE BETA TESTING. YOUR SOLE AND EXCLUSIVE REMEDY SHALL BE TO TERMINATE THE BETA TEST AND THIS LICENSE BY WRITTEN NOTICE TO CHECK POINT.

9. GOVERNMENT REGULATION AND EXPORT CONTROL

9.1 Government Regulations. You agree that the Product will not be shipped, transferred, or exported into any country or used in any manner prohibited by law.

9.2 Export. You acknowledge that the Product contains cryptographic features and is subject to international and local country laws governing import, export, distribution and use. The Product is subject to export control laws of the State of Israel and the United States and/or may be subject to additional export control laws applicable to You or in Your jurisdiction, including, without limitation, the United States. If the Product contains any encryption device You must contact Check Point’s export regulation information page (checkpoint.com) for specific information. You agree that You will not ship, transfer, or export the Product into any country, or make available or use the Product in any manner, prohibited by law.,/p>

9.3 You understand and acknowledge that upon entry of the Product into the United States, it becomes subject to regulation by agencies of the U.S. government, including the U.S. Department of Commerce, which prohibit export or diversion of certain products and technology to certain countries. Any and all of Your obligations with respect to the Product shall be subject in all respects to such United States laws and regulations as shall from time to time govern the license and delivery of technology and products abroad by persons subject to the jurisdiction of the United States, including the Export Administration Act of 1979, as amended, any successor legislation, and the Export Administration Regulations (“EAR”) issued by the Department of Commerce, International Trade Administration, and Bureau of Export Administration. You warrant that You will comply in all respects with the export and reexport restrictions applicable to the Product and will otherwise comply with the EAR or other United States laws and regulations in effect from time to time.

9.4 You warrant and agree that You are not: (i) located in, under the control of, or a national or resident of Cuba, North Korea, Iran, Syria, Lebanon or Sudan or (ii) on the U.S Treasury Department list of Specially Designated Nationals or the U.S. Commerce Department’s Table of Deny Orders.

10. GENERAL

10.1 Miscellaneous. You may not assign your rights or obligations under this Agreement without the prior written consent of Check Point. If any provision of this Agreement is held to be invalid or unenforceable by a court of competent jurisdiction, that provision of the Agreement will be enforced to the maximum extent permissible so as to affect the intent of the Agreement, and the remainder of the provisions of this Agreement shall remain in full force and effect. The laws of the State of Israel shall govern all issues arising under or relating to this Agreement, without giving effect to the conflict of laws principles thereof. All disputes arising under or relating to this Agreement shall be resolved exclusively in the appropriate Israeli court sitting in Tel Aviv, Israel. This Agreement will not be governed by the United Nations Convention on Contracts for the International Sales of Goods, the application of which is expressly excluded. This Agreement sets forth the entire understanding and agreement between You and Check Point and may be amended only in writing signed by both parties.

10.2 Third Party Software. Certain Third Party Software may be provided with the Product for use in connection with the Product subject to the licenses of their respective proprietors. The provisions of this Agreement shall apply to all Third Party Software Providers and to Third Party Software as if they were Check Point and the Product, respectively, unless they are specifically listed and addressed at https://www.checkpoint.com/about-us/third-party-trademarks-and-copyrights/, in which case, such Third Party Software Provider’s licenses terms will apply with respect to those specific Third Party Software products.

10.3 Government Restricted Rights. This provision applies to Products acquired directly or indirectly by or on behalf of any Government. The Product is a commercial product, licensed on the open market at market prices. Any use modification, reproduction, release, performance, display, or disclosure of the Product by any Government shall be governed solely by the terms of this Agreement and shall be prohibited except to the extent expressly permitted by the terms of this Agreement, and no license to the Product is granted to any government requiring different terms.

10.4 Questions? Should You have any questions concerning this Agreement contact the manufacturer at Check Point Software Technologies Ltd., 5 Ha’Solelim Street, Tel Aviv, 67897 Israel.

PART II – LIMITED HARDWARE WARRANTY

The warranties provided by Check Point in this Limited Hardware Warranty apply only to Hardware Products you purchase for your use, and not for resale. The term “Hardware Product” means a computing device with a specific function and limited configuration ability. The Hardware Product is sold by Check Point for the purpose of executing the specific Check Point Software supplied with it. NOTHING IN THIS STATEMENT OF LIMITED WARRANTY AFFECTS ANY STATUTORY RIGHTS OF CONSUMERS THAT CANNOT BE WAIVED OR LIMITED BY CONTRACT.

1. LIMITED HARDWARE WARRANTY

Check Point warrants that the hardware components of its Hardware Product shall be free from material defects in design, materials, and workmanship and will function, under normal use and circumstances, in accordance with the documentation provided, for a period of one (1) year from the date of activation of the Hardware Product. If the Hardware Product has not been activated, the warranty will be valid for fifteen (15) months from the date of Check Point’s shipment of the Hardware Product (“Warranty Period”).

After the Warranty Period, certain return material authorization (“RMA”) services, as provided by Check Point (which are not covered under this warranty), are available for all Hardware Products pursuant to a purchased and active Check Point support agreement.

Your sole and exclusive remedy, and Check Point’s sole and exclusive liability for defective hardware components, shall be that Check Point, subject to the terms and conditions of this Section 1, and solely upon confirmation of a defect or failure of a hardware component to perform as warranted, shall at its sole option, either repair or replace the nonconforming hardware component or return of the price paid for the Hardware Product. All replacement parts furnished to you under this warranty shall be refurbished and equivalent to new, and shall be warranted as new for the remainder of the original warranty period. If a hardware failure occurs in the first 30 days from the product’s software activation, Check Point will replace it with new part or full unit as may be needed. All defective parts, which have been replaced, shall become the property of Check Point. All defective parts that have been repaired shall remain Your property. This warranty gives You specific legal rights. You may have other rights that vary from state to state.

2. EXCLUSIONS

The foregoing warranties and remedies shall be void as to any Hardware Products damaged or rendered unserviceable by one or more of the following: (1) improper or inadequate maintenance by anyone other than Check Point or Check Point’s authorized agents, (2) software or interfacing supplied by anyone other than Check Point, (3) modifications, alterations or additions to the Hardware Products by personnel not certified by Check Point or Check Point’s authorized agents to perform such acts, or other unauthorized repair, installation or opening or other causes beyond Check Point’s control, (4) unreasonable refusal to agree with engineering change notice programs, (5) negligence by any person other than Check Point or Check Point’s authorized agents, (6) misuse, abuse, accident, electrical irregularity, theft, vandalism, fire, water or other peril, (7) damage caused by containment and/or operation outside the environmental specifications for the Hardware Products, (8) alteration or connection of the Hardware Products to other systems, equipment or devices (other than those specifically approved by Check Point) without the prior approval of Check Point, or (9) any use that is inconsistent with the user manual supplied with the Hardware Product. The warranty period is not extended if Check Point repairs or replaces a warranted product or any parts. Check Point may change the availability of limited hardware warranties, at its discretion, but any changes will not be retroactive.

3. HARDWARE RETURN PROCEDURES

If a Hardware Product or one of its component parts does not function as warranted during the warranty period, and such nonconformance can be verified by Check Point, Check Point, at its election, will provide either return and replacement service or replacement with a refurbished part/unit for the Hardware Product under the type of warranty service Check Point designates for that Hardware Product. A defective Hardware Product or one of its component parts may only be returned to Check Point upon Check Point’s prior written approval. Any such approval shall reference an RMA number issued by an authorized Check Point service representative. To request an RMA number, you or your local Check Point Certified Solution Provider (“CCSP/CSP/ACSP”) must contact Check Point’s Technical Assistance Center (“TAC”) and open a Service Request. You should always register the Hardware Product in your Check Point User Center account. If you do not register the Hardware Product with Check Point, you may be required to present proof of purchase as evidence of your entitlement to warranty service. The Hardware Product’s identification number will be required for all RMA cases.

Transportation costs, if any, incurred in connection with the return of a defective Hardware Product to Check Point shall be borne by You. Any transportation costs incurred in connection with the redelivery of a repaired or replacement item to You by Check Point shall be borne by Check Point; provided, however, that if Check Point determines, in its sole discretion, that the allegedly defective item is not covered by the terms and conditions of the warranty or that a warranty claim is made after the warranty period, the cost of the repair by Check Point, including all shipping expenses, shall be reimbursed by You.

4. HARDWARE REPLACEMENT PROCEDURES

Check Point will attempt to diagnose and resolve your problem over the phone or web. Upon determination of the hardware issue is related to a malfunction of one of the Hardware Product components, an RMA process will be initiated by Check Point’s TAC. Check Point’s TAC will either issue a replacement of the faulty part (like Power Supply, Fan, Hard Disk, etc.) or a full Unit Replacement.

For Warranty Replacement service, it is required that you deliver the faulty unit to a location Check Point designates, and provide courier name and tracking number to Check Point’s TAC. After the Faulty unit is returned to Check Point, Check Point will use commercially reasonable efforts to ship the replacement hardware within seven (7) business days. Actual delivery times may vary depending on Your location. Check Point’s TAC will send the required hardware to the Hardware Product’s physical location, as it appears in your User Center and as verified with You when opening the Support Service Request.

For Hardware Advanced Replacement, support options Standard, Standard Onsite, Premium, and Premium Onsite are available for customers who have purchased the Hardware Product support plan with Check Point. More information on the Check Point support programs is specified on Check Point’s website.

5. DEAD ON ARRIVAL (DOA)

If a defective Hardware Product covered under warranty fails to operate within thirty (30) days from its activation, but no more than one hundred and twenty (120) days from the date of Check Point’s shipment of the Hardware Product, Check Point will provide expedited replacement of a new unit within two (2) business days from Check Point fulfillment hub, following confirmation of any such failure. Customers outside of the fulfillment hub region should allow for additional transit time due to international customs clearance.

6. ADDITIONAL RESPONSIBILITIES

You agree:

6.1. Before Check Point or its partner exchanges a Hardware Product or part, to remove all features, parts, options, alterations, data and attachments not under warranty service and ensure that the Hardware Product is free of any legal obligations or restrictions that prevent its exchange.

6.2. To obtain authorization from the owner to have Check Point or its partner service a Hardware Product that you do not own.

6.3. Where applicable, before service is provided:

a. Follow the service request procedures that Check Point or its partner provides;
b. Backup and secure all programs and data in the Hardware Product;
c. Inform Check Point or its partner of changes in the Hardware Product physical location.

6.4. To provide Check Point or its partner with sufficient and safe access to your facilities to permit Check Point to fulfill its obligations.

6.5. To ship back the faulty Hardware Product (or replaceable unit) suitably packaged according to the guidelines as Check Point specified in the letter shipped with the RMA, to the Check Point designated location.

6.6. You shall ship the faulty Hardware Product once TAC approves the RMA and provide the courier name and tracking number to TAC before Check Point processes the RMA.

6.7. If you are a customer who has purchased the support plan with Check Point covering Advanced Replacement Service, You will ship the faulty Hardware Product within five (5) business days of the arrival of the RMA, or pay the standard Check Point list price of replacement Hardware Product.

6.8. To securely erase from any Hardware Product you return to Check Point for any reason all programs and data not provided by Check Point with the Hardware Product. You acknowledge that in order to perform its responsibilities under this Limited Hardware Warranty, Check Point may ship all or part of the Hardware Product or its software to third party locations around the world, and you authorize Check Point to do so.

7. LIMITATION OF LIABILITY

NOTWITHSTANDING ANYTHING ELSE IN THIS AGREEMENT OR OTHERWISE, NEITHER CHECK POINT NOR ITS SUPPLIERS WILL BE LIABLE WITH RESPECT TO ANY SUBJECT MATTER OF THIS AGREEMENT UNDER ANY CONTRACT, NEGLIGENCE, STRICT LIABILITY, OR OTHER LEGAL OR EQUITABLE THEORY, REGARDLESS OF WHETHER CHECK POINT OR ITS SUPPLIERS WERE ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, FOR: (i) ANY PUNITIVE, INCIDENTAL OR CONSEQUENTIAL DAMAGES OR LOST DATA OR LOST PROFITS; OR (ii) FOR COSTS OF PROCUREMENT OF SUBSTITUTE GOODS, TECHNOLOGY OR SERVICES; OR (iii) FOR ANY CLAIMS BASED ON ANY ERROR, DEFECT OR NONCONFORMITY IN THE PRODUCTS OR SERVICE, FOR ANY AMOUNT IN EXCESS OF THE PRICE PAID TO CHECK POINT FOR SUCH DEFECTIVE PRODUCT(S) OR SERVICE; OR (IV) FOR ALL OTHER CLAIMS NOT RELATED TO AN ERROR, DEFECT OR NONCONFORMITY IN THE HARDWARE PRODUCTS, ANY AMOUNTS IN EXCESS IN THE AGGREGATE OF THE AMOUNT PAID TO CHECK POINT HEREUNDER DURING THE THREE (3) MONTHS PRECEDING THE DATE THE CAUSE OF ACTION AROSE.

8. GOVERNMENT REGULATION AND EXPORT CONTROL

8.1 In the course of receiving Limited Hardware Warranty services, You agree that you will not ship, transfer, or export the Hardware Product into any country, or make available or use the Hardware Product in any manner, prohibited by law.

8.2 The Hardware Product is subject to export control laws of the United States of America and/or other countries and/or may be subject to additional export control laws applicable to You or in your jurisdiction.

8.3 You understand and acknowledge that upon entry of the Hardware Product into the United States, it becomes subject to regulation by agencies of the U.S. government, including the U.S. Department of Commerce, which prohibit export or diversion of certain products and technology to certain countries. Any and all of Your obligations with respect to the Hardware Product shall be subject in all respects to such United States laws and regulations as shall from time to time govern the license and delivery of technology and products abroad by persons subject to the jurisdiction of the United States, including the Export Administration Act of 1979, as amended, any successor legislation, and the Export Administration Regulations (“EAR”) issued by the Department of Commerce, International Trade Administration, and Bureau of Export Administration. You warrant that You will comply in all respects with the export and reexport restrictions applicable to the Hardware Product and will otherwise comply with the EAR or other United States laws and regulations in effect from time to time.

8.4 You warrant and agree that You are not: (i) located in, under the control of, or a national or resident of Cuba, North Korea, Iran, Syria, Lebanon or Sudan, or (ii) on the U.S Treasury Department list of Specially Designated Nationals or the U.S. Commerce Department’s Table of Deny Orders.

THESE WARRANTIES GIVE YOU SPECIFIC LEGAL RIGHTS AND YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE OR JURISDICTION TO JURISDICTION.

WARRANTY DISCLAIMER. EXCEPT AS STATED HEREIN, CHECK POINT MAKES NO WARRANTIES WITH RESPECT TO ANY HARDWARE PRODUCT, LICENSE OR SERVICE AND DISCLAIMS ALL STATUTORY OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR ARISING FROM A COURSE OF DEALING OR USAGE OF TRADE AND ANY WARRANTIES OF NONINFRINGEMENT. CHECK POINT DOES NOT WARRANT THAT THE CHECK POINT HARDWARE PRODUCT(S) WILL MEET ANY REQUIREMENTS OR THAT THE OPERATION OF CHECK POINT HARDWARE PRODUCTS WILL BE UNINTERRUPTED OR ERROR FREE.

9. TECHNICAL SUPPORT CONTACT INFORMATION

You may contact Check Point technical support by web request at: URL:https://usercenter.checkpoint.com. For the United States, Canada, Latin America, European Union and Asia Pacific countries, to reach Check Point by phone, please refer to the technical support phone numbers listed at the above Check Point website for the number covering your region.

SecurePalm Website Terms of Service

Introduction and Scope

This document is an agreement between You and SecurePalm LLC (“SecurePalm”) that describes the terms of service (“TOS”) for which You may use the services offered on the websites and web pages owned and operated by SecurePalm or its subsidiaries (collectively, the “SecurePalm Sites”). Examples of SecurePalm Sites include the internet domains SecurePalm.com, siteadvisor.com, foundstone.com, trustedsource.com, and numerous others. The services and information offered on some SecurePalm Sites may be subject to additional terms and conditions described on the site or web pages for those services or information, and additional licensing terms may apply for software that are disclosed in an End-User License Agreement distributed with such software. YOU ACKNOWLEDGE AND AGREE THAT BY BROWSING OR USING THE SOFTWARE OR SERVICES OFFERED BY THE SECUREPALM SITES, YOU HAVE AGREED TO BE BOUND BY THESE TERMS OF SERVICE AND ANY ADDITIONAL TERMS THAT APPLY.

Please note that SecurePalm reserves the right to revise these site TOS at any time by posting an update to this page. Your continued use of the SecurePalm Sites or Services following the posting of changes to these TOS will mean You accept those changes.

SecurePalm reserves the right, in its sole discretion, to determine if You have violated these site TOS, and to take any action it deems appropriate.

You acknowledge that SecurePalm shall have the right to terminate Your access to the SecurePalm Sites or Services for violations of any of these rules, including repeat infringement of copyrights.

The SecurePalm Privacy Policy and Anti-Piracy Policy are incorporated by reference to this TOS.

Your Use & Conduct

Personal, Non-Commercial Use: The SecurePalm Sites are made available for Your personal, non-commercial use only. Except as provided by specific terms governing a specific service, product, or information, You may not modify, copy, distribute, transmit, display, perform, reproduce, publish, license, create derivative works from, transfer, or sell any of the information, software, products, or services obtained from the SecurePalm Sites.

No Unlawful or Prohibited Use: You agree that You will not use the SecurePalm Sites or the information, products, or services available from them for, or to further, any unlawful purpose. Additionally, You will NOT:

1. Upload, post, email, transmit, or otherwise make available any content that:

a. Is unlawful, harmful, threatening, abusive, harassing, tortuous, defamatory, vulgar, obscene, libelous, invasive of another's privacy, hateful, or racially, ethnically, or otherwise objectionable or harmful to another party;

b. You do not have a right to make available under any law or under contractual or fiduciary relationships (such as inside information, proprietary and confidential information learned or disclosed as part of employment relationships or under nondisclosure agreements);

c. Infringes any patent, trademark, trade secret, copyright, or other intellectual property right of another party;

d. Is unsolicited or unauthorized advertising, promotional materials, “junk mail,” “spam,” “chain letters,” “pyramid schemes,” website links, or any other form of content for the purpose of solicitation;

e. Contains software viruses or any other computer code, files, or programs designed to interrupt, destroy, or limit the functionality of any computer software or hardware or telecommunications equipment;

f. Consists of forged or manipulated information that disguises the true origin of any content You provide; or

g. Impersonates another person or entity, including, but not limited to, a SecurePalm employee, forum leader, guide or host, or falsely states or otherwise misrepresents Your affiliation with a person or entity.

2. Collect or store personal data about other users in connection with any prohibited conduct and activities;

3. Use the SecurePalm Sites in any manner that could damage, disable, overburden, or impair any SecurePalm server, or network(s) connections; disobey any requirements, procedures, policies, or regulations of networks connected to the SecurePalm Sites; or interfere with any other party's use and enjoyment of the SecurePalm Sites;

4. Attempt to gain unauthorized access to any SecurePalm Site content, other accounts, computer systems, or networks connected to any SecurePalm server through hacking, password mining, scraping, or by any other means to obtain any materials or information not intentionally made available on the SecurePalm Sites;

5. Intentionally or unintentionally violate any applicable local, state, national, or international law, including, but not limited to, regulations promulgated by the U.S. Securities and Exchange Commission, any rules of any national or other securities exchange, including, without limitation, the New York Stock Exchange, the American Stock Exchange, or the NASDAQ, and any regulations having the force of law; or

6. Provide material support or resources (or conceal or disguise the nature, location, source, or ownership of material support or resources) to any organization(s) designated by the United States government as a foreign terrorist organization pursuant to section 219 of the Immigration and Nationality Act.

User Submissions: Certain SecurePalm Sites enable users to submit content or other information that will be made available to other users of the SecurePalm Sites (e.g., a forum or blog site). You understand and agree that SecurePalm: (a) is NOT responsible for the content of user submissions, (b) has no obligation to remove any user-submitted content, and (c) has sole discretion to determine whether any user-submitted content violates the SecurePalm Sites TOS and to take action or inaction based on that determination.

If You submit content or information to a Site or Service that makes Your content available to other users, You represent and agree that:

1. Your content in not prohibited by these TOS;

2. You are solely responsible for the form, content, and accuracy of any material You submit to a SecurePalm Site;

3. You are granting SecurePalm a royalty-free, perpetual, irrevocable, non-exclusive license (including a waiver of any moral rights) under Your intellectual property rights to use, reproduce, modify, adapt, translate, publish, display, and redistribute Your content (in whole or in part) worldwide, and to incorporate Your content in other works in any form, media, or technology now known or later developed, for the full term of any rights that may exist in such content; and

4. SecurePalm is not obligated to exercise the rights You granted above.

Content

SecurePalm Intellectual Property Rights: All content and services on the SecurePalm Sites, including, but not limited to, trademarks and logos, designs, text, graphics, sounds, images, software, and other website materials (the “Materials”) are the intellectual property of SecurePalm, its licensors, or other vendors. The Materials are protected by United States and foreign intellectual property laws. Except as stated herein, none of the Materials may be copied, reproduced, or distributed in any form without the prior written permission of SecurePalm.

SecurePalm Trademarks and Brands: SecurePalm, the SecurePalm logo, and other marks related to SecurePalm products and services (“SecurePalm Marks”) are the exclusive and valuable property of SecurePalm or its subsidiaries. The SecurePalm Marks can only be reproduced or displayed with specific written permission from SecurePalm, and only in accordance with SecurePalm Trademark Policy and Guidelines.

Limited Copyright Permission: Subject to the terms of an applicable software or service license or other written agreement, SecurePalm grants You permission under its copyrights to display, copy, or download the Materials from a SecurePalm Site for personal, non-commercial and informational use only, provided that You DO NOT:

1. Modify the Materials;

2. Remove or alter any copyright or other proprietary notices contained in the Materials;

3. Frame or utilize framing techniques, to display the Materials at a domain not owned by SecurePalm; or

4. Use any SecurePalm-owned mark or product name as a meta-tag or other “hidden text” for search engines in a manner that does not inure benefit to SecurePalm.

Translations: Where SecurePalm has provided a translation of the English-language version of a SecurePalm Site, these TOS, or other Materials, You agree that: (a) the translations are only for Your convenience; (b) the English-language version governs Your use of the Materials provided by SecurePalm; and (c) the English-language version shall take precedence in the event of a conflict between the English-language version and the translated version (except as prohibited by local law).

Digital Millennium Copyright Act (DMCA) Copyright Infringement Claims: Pursuant to Title 17, United States Code, Section 512(c)(2), notifications of claimed copyright infringement should be sent to the SecurePalm Designated Agent, in accordance with the procedure described in the SecurePalm Sites Digital Millennium Copyright Act (DMCA) Notice and Procedure. INQUIRIES NOT COMPLIANT WITH THE PROCEDURE OUTLINED MAY NOT RECEIVE A RESPONSE.

Third-Party Content and Links: Certain SecurePalm Sites may display content provided by third parties, links to third-party web pages, or both, including advertisements and solicitations to purchase their products or services. As consideration for Your convenience in making this third-party content available or accessible to You, You acknowledge that SecurePalm is not responsible for the third-party content. You also agree that SecurePalm IS NOT responsible or liable for any losses or damages You experience with any third-party content You chose to rely upon or advertisements You respond to, and that You must contact the third party directly for any remedies that may be available to You.

SecurePalm Sites Disclaimers

NO WARRANTY: The SecurePalm Sites and the information provided therein are for the convenience of users of the SecurePalm Sites and for customers and potential customers of SecurePalm, its products, or its services. The information provided on the SecurePalm Sites and the products and services described on the SecurePalm Sites are subject to change without notice. SECUREPALM DOES NOT REPRESENT OR WARRANT THE ACCURACY, CONTENT, COMPLETENESS, LEGALITY, RELIABILITY, OPERABILITY, OR AVAILABILITY OF ANY INFORMATION OR MATERIAL DISPLAYED OR DOWNLOADED FROM THE SECUREPALM SITES. EXCEPT AS PROVIDED BY THE TERMS OF AN APPLICABLE END-USER LICENSE AGREEMENT OR OTHER WRITTEN AGREEMENT SIGNED BY SECUREPALM, THE SECUREPALM SITES, SERVICES, AND SOFTWARE ARE PROVIDED “AS IS,” WITH NO WARRANTY, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT OF PROPRIETARY RIGHTS. SECUREPALM DISCLAIMS ANY IMPLIED, EXPRESS, OR STATUTORY WARRANTIES REGARDING THE SECURITY, RELIABILITY, TIMELINESS, AND PERFORMANCE OF THE SECUREPALM SITES AND SOFTWARE DOWNLOADED THEREFROM, INCLUDING INFORMATION OR ADVICE OBTAINED THROUGH THE SECUREPALM SITES, SERVICES, OR SOFTWARE. SECUREPALM DOES NOT WARRANT THAT THE SECUREPALM SITES, SOFTWARE, OR SERVICES WILL OPERATE ERROR-FREE OR THAT THE SECUREPALM SITES ARE FREE OF COMPUTER VIRUSES OR OTHER HARMFUL MECHANISMS. YOU UNDERSTAND AND AGREE THAT YOU DOWNLOAD OR OTHERWISE OBTAIN MATERIAL OR DATA THROUGH THE USE OF THE WEBSITE, SERVICES, OR SOFTWARE AT YOUR OWN DISCRETION AND RISK, AND THAT YOU WILL BE SOLELY RESPONSIBLE FOR ANY DAMAGES TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS FROM THE DOWNLOAD OF SUCH MATERIAL OR DATA. IF YOUR USE OF THE WEBSITE OR THE MATERIAL RESULTS IN THE NEED FOR SERVICING OR REPLACEMENT OF EQUIPMENT OR DATA, SECUREPALM, ITS AFFILIATES, AND SUBSIDIARIES ARE NOT RESPONSIBLE FOR THOSE COSTS.

Additionally, SecurePalm makes no claim that any of the content or software available from the SecurePalm Sites can be lawfully viewed or downloaded outside of the United States. Access to portions of the SecurePalm Sites may not be legal by certain persons or in certain countries. If You access the Website from outside of the United States, You do so at Your own risk and are responsible for compliance with the laws of Your jurisdiction.

Some states or other jurisdictions do not allow the exclusion of implied warranties, so the above exclusions may not apply to You. You may also have other rights that vary from state to state and from jurisdiction to jurisdiction.

LIMITATION OF LIABILITY: Except as provided by an applicable End-User License Agreement or other written agreement signed by SecurePalm,

UNDER NO CIRCUMSTANCES IS SECUREPALM, ITS AFFILIATES, SUBSIDIARIES, OR LICENSORS LIABLE TO YOU FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, INCIDENTAL, RELIANCE, OR CONSEQUENTIAL, OR SPECIAL DAMAGES WHETHER OR NOT FORSEEN, LOST PROFITS, OR DAMAGES RESULTING FROM LOST DATA OR BUSINESS INTERRUPTION) ON ACCOUNT OF YOUR USE, MISUSE, OR RELIANCE ON THE INFORMATION SERVICES OR SOFTWARE AVAILABLE ON THE SECUREPALM SITES. THIS LIMITATION OF LIABILITY SHALL APPLY TO PREVENT RECOVERY OF DIRECT, INDIRECT, INCIDENTAL, CONSEQUENTIAL, SPECIAL, EXEMPLARY, OR PUNITIVE DAMAGES ARISING FROM ANY CLAIM RELATING TO THIS AGREEMENT OR THE SUBJECT MATTER HEREOF, WHETHER SUCH CLAIM IS BASED ON WARRANTY, CONTRACT, TORT (INCLUDING NEGLIGENCE), OR OTHERWISE ANY OTHER LEGAL THEORY EVEN IF SECUREPALM HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES).

The above limitation applies to Your use, misuse, or reliance upon the SecurePalm Sites, including, without limitation, damages You may incur because of third-party services or other services or goods received, such as third-party services or goods received by, advertised on, or linked to the SecurePalm Sites.

Some states or other jurisdictions do not allow the exclusion or limitation of liability for incidental or consequential damages, so the above limitations and exclusions may not apply to You.

General Provisions

Governing Law: These TOS and all claims related to them, their execution, or the performance of the parties under them, shall be governed by and construed in accordance with the laws of the State of California, without giving effect to its conflict of laws provisions or Your actual state or country of residence, and shall not be governed by the provisions of the United Nations Convention on Contracts for the International Sale of Goods, the Brussels or Lugano Conventions, or the Rome or Rome 1 Conventions. If for any reason, a court of competent jurisdiction finds any provision or portion of these TOS to be unenforceable, the remainder of the TOS will continue in full force and effect.

Force Majeure: Under no circumstances shall SecurePalm, its affiliates, subsidiaries, or licensors be held liable for any delay or failure in performance resulting directly or indirectly from acts of nature, forces, or causes beyond its reasonable control, including, without limitation, Internet failures, computer equipment failures, telecommunication equipment failures, other equipment failures, loss of data, electrical power failures, strikes, labor disputes, riots, insurrections, civil disturbances, shortages of labor or materials, fires, floods, storms, explosions, acts of God, war, governmental actions, orders of domestic or foreign courts or tribunals, non-performance of third parties, or loss of or fluctuations in heat, light, or air-conditioning.

Entire Agreement: Except as provided by an End-User License Agreement or other written agreement signed by SecurePalm, these TOS constitute the entire agreement between You and SecurePalm with respect to the subject matter hereof and supersedes and replaces all prior or contemporaneous understandings or agreements, written or oral, regarding such subject matter.

TERMS OF USE

SecurePalm M Security is powered by Check Point Technologies Ltd, therefore usage of its application is governed by its terms and conditions…

Securepalm M Security makes information and products available on this Web site (the “Site”), subject to the following terms and conditions. By accessing the Site, you agree to these terms and conditions. SecurePalm M Security reserves the right to change these terms and conditions, and the products, services, prices, and programs mentioned on the Site at any time, at its sole discretion, without notice and your continued use of the Site constitutes your acceptance of such revised terms. SecurePalm M Security reserves the right to seek all remedies available by law and in equity for any violation of these terms and conditions. Any rights not expressly granted herein are reserved.

Use of Site Materials

All documents and other information provided on this Site, including trademarks, logos, graphics and images (the “Materials”) are provided to you by SecurePalm M Security and are protected by copyright, trade dress, and other laws. This Site, and the materials and services offered herein, are intended for users 13 years of age or older. Individuals under the age of 13 are requested not to access the Site.

SecurePalm M Security grants you the limited right to display the Materials only on your personal computer, and to copy and download the Materials on this Site, provided that: (1) both the SecurePalm M Security copyright notice (set forth below) and this permission notice appear in the Materials so displayed, copied or downloaded; (2) such display, copy or download is solely for your personal or internal informational use (that is, not distributed or otherwise transmitted outside of your home or company, or otherwise broadcast in any media). You acknowledge and agree that you have no right to modify, edit, alter or enhance any of the Materials in any manner. This limited license terminates automatically, without notice to you, if you breach any of these Terms. Upon termination of this limited license, you agree to immediately destroy any downloaded and/or printed Materials. You agree not to “frame” or “mirror” any Materials contained on or accessible from this Site on any other server or Internet-based device without the advance written authorization of ZoneAlarm.

You acknowledge that, except as expressly stated herein, you have no right, title or interest in or to the Materials.

Copyright Notice:

© 2003–2015 Check Point Software Technologies Ltd. All rights reserved.

Trademarks

SecurePalm M Security, SecurePalm M Security logo, Check Point, Check Point logo, DefenseNet, IMsecure, OSFirewall, Safe@Office, SmartDefense, SmartDefense Advisor, TrueVector, ZoneAlarm, SecurePalm M Security Anti-Spyware, SecurePalm M Security PRO Antivirus + Firewall, SecurePalm M Security DataLock, SecurePalm M Security ForceField, SecurePalm M Security Free Firewall, SecurePalm M Security Internet Security Suite, SecurePalm M Security Pro, SecurePalm M Security Secure Wireless Router, Privacy & Security Toolbar, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd & or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, 7,165,076, 7,540,013, 7,725,737 and 7,788,726 and may be protected by other U.S. Patents, foreign patents, or pending applications.

Use of the Software

The software programs available to download from the Site (the “Software”) are the copyrighted work of SecurePalm M Security (except as otherwise indicated on the Site). The Software is protected by the copyright and patent laws of the United States and international treaties. Use of the Software is governed by the terms of the applicable end user license agreement, which accompanies such Software. You will not be able to use, download, or install any Software unless you agree to the terms of such end user license agreement.

Password Restricted Areas of the Site

Certain areas of the Site (including but not limited to purchase history pages and certain technical support pages) are password restricted to authorized users (“Restricted Areas”). If you are an authorized user of the Restricted Areas, you agree that you are entirely responsible for maintaining the confidentiality of your password and account, and agree to notify SecurePalm M Security if your password is lost, stolen, disclosed to an unauthorized third party, or otherwise may have been compromised. You agree that you are entirely responsible for any and all activities that occur under your account. You agree to immediately notify SecurePalm M Security of any unauthorized use of your account or any other breach of security in relation to the Site known to you.

SecurePalm M Security does not collect personally identifiable information from, nor allow the creation of user accounts by, individuals under the age of 13. If we have specific knowledge that an individual under the age of 13 has submitted personally identifiable information to this Site, we will delete such information permanently and without notice.

Warranties and Disclaimers; Liability Limitations

DISCLAIMER OF WARRANTY: THE SITE AND SOFTWARE ARE PROVIDED TO YOU “AS IS” WITHOUT WARRANTY OF ANY KIND. SECUREPALM M SECURITY MAKES NO EXPRESS OR IMPLIED REPRESENTATIONS OR WARRANTIES, ORAL OR WRITTEN RELATING TO THE SITE OR SOFTWARE. SECUREPALM M SECURITY DISCLAIMS ANY AND ALL WARRANTIES WITH RESPECT TO THE SITE AND SOFTWARE, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING, BUT WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF NONINFRINGEMENT OF THIRD PARTY RIGHTS, MERCHANTABILITY, AND FITNESS FOR A PARTICULAR PURPOSE. THIS SITE MAY CONTAIN INFORMATION POSTED BY THIRD PARTIES. SECUREPALM M SECURITY DOES NOT GUARANTEE THE ACCURACY OF INFORMATION POSTED BY THIRD PARTIES AND DOES NOT WARRANT EXPRESSLY OR IMPLIEDLY ANY INFORMATION POSTED BY THIRD PARTIES.

LIMITATION OF LIABILITY: TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, SECUREPALM M SECURITY SHALL NOT BE LIABLE TO YOU OR ANY THIRD PARTY CLAIMING THROUGH YOU FOR ANY DAMAGES IN CONNECTION WITH THE SOFTWARE OR THE SITE. IN NO EVENT SHALL SECUREPALM M SECURITY BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INDIRECT, EXTRAORDINARY, EXEMPLARY, PUNITIVE, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES (INCLUDING LOSS OF DATA, REVENUE, PROFITS, USE OR OTHER ECONOMIC ADVANTAGE) HOWEVER ARISING, WHETHER FOR BREACH OR IN TORT, EVEN IF SECUREPALM M SECURITY HAS BEEN PREVIOUSLY ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

SECUREPALM M SECURITY ASSUMES NO RESPONSIBILITY FOR ERRORS OR OMISSIONS IN THE INFORMATION OR SOFTWARE OR OTHER DOCUMENTS WHICH ARE INCLUDED WITHIN, REFERENCED BY, OR LINKED TO OR BY THE SITE.

THIS SITE COULD INCLUDE TECHNICAL OR OTHER INACCURACIES. CHANGES ARE PERIODICALLY MADE TO THE INFORMATION HEREIN. HOWEVER, SECUREPALM M SECURITY MAKES NO COMMITMENT TO UPDATE MATERIALS ON THIS SITE.

Third-Party Web Sites

The Site contains links to third-party Web sites, which are not under the control of SecurePalm M Security. Please note that when you click on these links you are moving to another Web site. SecurePalm M Security makes no representations about third-party Web sites. When you access a third party Web site, you do so at your own risk. SecurePalm M Security is not responsible for the reliability of any data, opinions, advice, or statements made on third-party Web sites. SecurePalm M Security provides these links merely as a convenience. The inclusion of such links does not imply that SecurePalm M Security endorses, recommends, or accepts any responsibility for the content of such sites.

Third-Party Products and Services

The Site may contain mention of third-party products and services for informational purposes. Third party products and services are the products and services of such third parties and SecurePalm M Security does not warrant impliedly or expressly the quality and/or reliability of such third party products and services. SecurePalm M Security makes no recommendations or endorsements about third-party products and services. References to third-party services and products are provided by SecurePalm M Security “as is,” without warranty of any kind, either express or implied, or statutory, including, but without limitation, the implied warranties of noninfringement of third party rights, merchantability, and fitness for a particular purpose.

Privacy Policy

Your use of the Site and any information submitted to SecurePalm M Security by you is subject to and governed by the SecurePalm M Security’s Privacy Policy, which is incorporated herein by reference

Governing Law and Jurisdiction

You agree that all matters relating to your access to, or use of, the Site shall be governed by the laws of the state of California. You agree and hereby submit to the exclusive personal jurisdiction and venue of the Superior Court of San Francisco County in California and the United States District Court for the Northern District of California, with respect to such matters. SecurePalm M Security makes no representation that information on the Site is appropriate or available for use in all countries and prohibits accessing materials from territories where contents are illegal. Those who access the Site do so on their own initiative and of their own risk and are responsible for compliance with all applicable laws.

Export Control Laws

You acknowledge that the Software is subject to the export control laws and regulations of the United States (“U.S.”) and agree to abide by those laws and regulations. Under U.S. law, the Software may not be downloaded or otherwise exported, reexported, or transferred to restricted countries, restricted end-users, or for restricted end-uses. The U.S. currently has embargo restrictions against Cuba, Iran, Iraq, Libya, North Korea, Sudan, and Syria. The lists of restricted end-users are maintained on the U.S. Commerce Department’s Denied Persons List, the Commerce Department’s Entity List, the Commerce Department’s List of Unverified Persons, and the U.S. Treasury Department’s List of Specially Designated Nationals and Blocked Persons. In addition, the Software may not be downloaded or otherwise exported, reexported, or transferred to an end-user engaged in activities related to weapons of mass destruction.