Software License Agreement for Personal Data Security
(C) 2009-2016, PDS Software Solutions LLC
All rights reserved.
PLEASE READ THIS SOFTWARE LICENSE AGREEMENT ("LICENSE") CAREFULLY BEFORE USING THIS SOFTWARE:
This End-User License Agreement (EULA) constitutes a legal, binding agreement between you, the end-user of this software, as well as, if applicable, the company, corporation, or organization that purchased a PDS certificate, and the copyright holders of Personal Data Security (PDS), and establishes the terms and conditions by which you are permitted to install and use the licensed software ("SOFTWARE PRODUCT"). By downloading, installing, using, decompiling, or in any way interacting with the SOFTWARE PRODUCT, you agree to be bound by the terms of this EULA.
1. GRANT OF LICENSE.
This SOFTWARE PRODUCT is licensed, not sold, to you by the copyright holders.
The copyright holders retain ownership of the SOFTWARE PRODUCT and RESERVE ALL RIGHTS NOT EXPRESSLY GRANTED TO YOU.
You are licensed to use this SOFTWARE PRODUCT only where it is legal.
To use this SOFTWARE PRODUCT in the SECURE or HIGHLY SECURE modes, you must purchase a PDS certificate to import into the SOFTWARE PRODUCT. Once you have imported your certificate, only then may you use the SECURE or HIGHLY SECURE ciphers. For information about purchasing a PDS certificate, please see https://www.trustpds.com.
You are granted the right to reverse engineer the SOFTWARE PRODUCT to verify that it does not contain malware, spyware, or any other *ware that could diminish the trust of this application.
You are granted the right to reverse engineer the SOFTWARE PRODUCT to verify that there are no implementations that will prevent the use of the SOFTWARE PRODUCT in the future.
You are granted the right to reverse engineer the SOFTWARE PRODUCT to review or improve upon the security of this application, so long as those improvements are passed on to the copyright holders in accordance with these policies:
A. If a security issue is found, you must contact the copyright holders to make them aware of the discovery within five (5) business days of discovering the issue. You must use the email address email@example.com to make this notification (SECURITY NOTIFICATION).
B. After the SECURITY NOTIFICATION has been made, you must allow at least thirty (30) days from the date of the SECURITY NOTIFICATION to pass before making your discovery public. This period of time will be used to re-mediate or mitigate the reported issue.
You are NOT PERMITTED to reverse engineer the SOFTWARE PRODUCT for any other purposes, except as mandated under applicable law.
You are NOT PERMITTED to recompile any of the reverse engineered code, or reuse any of the bits within the distribution, except as provided for in the original form of the distribution.
You are NOT PERMITTED to redistribute the SOFTWARE PRODUCT, or ANY components of the SOFTWARE PRODUCT, on any website or through any other distribution mechanism, without express written permission from the copyright holders.
2. PROPRIETARY RIGHTS
All title and copyrights in and to the SOFTWARE PRODUCT (including but not limited to any images, documentation, and on-line materials), the software, and any copies of the SOFTWARE PRODUCT are owned by the copyright holders.
3. NO WARRANTY
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED.
4. NO LIABILITY FOR DAMAGES
IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.