EULA

END USER LICENSE AGREEMENT (EULA) FOR 360 ANTIVIRUS PRO

PLEASE GO THROUGH THIS END-USER LICENSE AGREEMENT (“EULA”) CAREFULLY BEFORE INSTALLING OR USING 360 ANTIVIRUS PRO (”SOFTWARE”) REGISTERED BY GLBL TRADELINES PVT LTD. BY INSTALLING OR UTILIZING THE SOFTWARE, YOU AGREE TO COMPLY WITH THE TERMS AND CONDITIONS OF THIS EULA. IF YOU DO NOT ACKNOWLEDGE TO THESE TERMS AND CONDITIONS, DO NOT INSTALL OR EMPLOY THE SOFTWARE. THE PRIMARY PURPOSE OF THIS AGREEMENT IS TO OUTLINE THE RIGHTS AND PERMISSIONS GRANTED TO THE END USER REGARDING THE SOFTWARE’S UTILIZATION. IT’S NOT A CONTRACT FOR THE SALE OF THE SOFTWARE ITSELF.

In accordance with the conditions outlined in this End User License Agreement executed by and between 360 Antivirus Pro, having its registered office at G-20, Sector 63, Noida UP, India, 201301, and you, a physical person or organization (from now on referred to as “You” or “the End User”) are granted the right to use the software provided by 360 Antivirus Pro. You can get or acquire the software using various methods, such as:

  • Downloading it from the Internet
  • Downloading it directly from servers owned by 360 Antivirus Pro
  • via electronic mail (email)
  • Obtaining it from other legitimate sources
  • Storing it on a physical data carrier (like a CD or USB drive)
Despite granting you certain rights to employ the product, the ownership of the product and any physical media (such as CDs or DVDs) containing it remains with the product provider (“Provider”). It means that the end user doesn’t own the product itself but has permission to use it under the terms of the EULA.
  • If you have acquired physical media (like CDs) of the antimalware program, accompanying documentation, or a sales receipt. In that case, you should either return these items to the Provider or the outlet from which you acquired the solution. Alternatively, if the items are digital (like downloaded files), you may need to delete them.
  • If the agreement permits you to make copies of the software (for backup purposes, for instance), the product provider still retains ownership. In other words, the end user’s rights are limited to using the authorized copies according to the terms of the EULA.
As the program’s consumer, you are subject to certain terms and conditions outlined in the document. These terms and conditions will specify how the virus solution can be utilized, any restrictions or limitations on its utilization, the responsibilities of both parties, intellectual property rights, disclaimers of liability, and more. Hence, as the final affirmation, it is taken for granted that you comprehended the legal and practical implications of the terms and conditions outlined in the EULA and accept the legal obligations and restrictions associated with using the antivirus as defined in the following passages.

1.1 GRANT OF LICENSE

You are granted the right to perform several actions related to the antimalware program. Following are the rights and provisions that 360 Antivirus Pro will provide you regarding its products:
  1. Use: You can employ the solution once it’s installed on a Device.
  2. Access: You’re allowed to access the software’s features and functionalities.
  3. Display: You can display the program’s user interface or output.
  4. Run: You can execute (run) the system solution to perform its intended tasks.
  5. Device Limit: The number of devices on which you can install, utilize, access, display, and run the antimalware program is subject to the conditions stated in this license agreement. The specific terms of the license agreement will determine how many devices are covered under your license.
  6. License Agreement: The permissions granted depend upon complying to the terms outlined in your license agreement. It is a legal document that defines the scope of your rights and responsibilities regarding the 360 Antivirus Pro usage.

1.2 Mandatory Activation and Trial Period

Mandatory activation and trial period include:
  • The activation process.
  • The trial period.
  • The need for activation.
  • The consequences of unlicensed implementation.
  • The data collection during activation to confirm the applicability of EULA to your specific copy of the program.
Here are the following points that are important to remember for this part of the agreement.

A. Activation Process:

  • You need to unlock the full licensed functionality beyond the trial period for antivirus activation.
  • Activation can be done via the Internet. However, toll charges might be associated with using the Internet.

B. Reactivation:

  • If you modify your Device’s hardware or alter the program, you might need to reactivate the system solution.

C.Technological Measures to Prevent Unlicensed Use:

  • The product contains technological measures designed to prevent unlicensed practice.
  • The Company (product provider) will employ these measures to verify that you use a legally licensed copy of the product.

D. Unlicensed Use:

  • If you’re using an unlicensed copy of the antivirus, you are not allowed to put into service the system solution or install future program updates.

E.Data Collection and Privacy:

  • The activation process doesn’t collect personally identifiable information from your device.
  • However, some device-identifying information may be collected during the activation process.

F. Confirmation of Application:

  • Whether the terms in this section apply to your copy of the antimalware solution can be confirmed by contacting customer support or your point of purchase.

1.3 Storage/Network Use

You can download or install a copy of the antivirus on a storage device, such as a network server. The purpose of this storage is to allow you to install or run the software on other Workstation Devices within your internal network. If you store the software on a network server and employ it across different Workstation Devices within your internal network, you are still required to have a separate license for each Device on which the software is used. This is to ensure that the software usage complies with the terms of the EULA and that proper licensing is obtained for each instance of product usage.

1.4 Additional License Requirement:

However, it’s important to note that while you can store the software on a network server, you must obtain an additional license for each separate Device on which the program is installed, used, accessed, displayed, or run. If you want to use the program on multiple Devices (workstations), you need to have a valid license for each of those Devices.

A. Sharing and Concurrent Use:

  • The key point is that unless expressly permitted otherwise, a single license for the product cannot be shared or used at the same time on different Devices.
  • Each Device you want to use the product on must have its license.

B. Operating System Uninstall Procedures:

  • Access the computer’s “Control Panel” and go to the “Uninstall a Program” or similar section.
  • Find the program application in the list of installed applications.
  • Select the software from the list and click the “Uninstall” option.

C. Uninstallation Outcome:

  • Following the uninstallation process, the program application will be removed from your Windows PC.
  • Note that after uninstallation, some files and folders may remain on your system. These files can be removed after a system reboot.

D. Registration Information and Shortcuts:

  • Registration information for the antivirus solution might be left behind after uninstallation on some devices and operating systems. This is done to facilitate a streamlined reinstallation process without needing to re-register the product.
  • The program installer usually offers to create a shortcut to the software for convenient access via the desktop or quick launch bar. You might have the option to decline these shortcuts during the installation.

E. Additional Libraries and Dependencies:

  • The program installer might also install necessary libraries, such as Microsoft .NET, or other dependencies if they are not already present on your computer.

F. Internet Connection Requirement:

  • The antivirus application requires an active Internet connection to perform certain functions, like database updates.

1.5 Product Acquisition Resources

You will get clear information regarding various sources from which you can acquire the software, the application of the EULA regardless of the sources and the process of accessing and upgrading to the premium features. You have the complete instruction for the auto-renewing subscription process for continued access to the premium features. Here are the explanations:

A. Different Sources:

  • The antivirus application can be obtained from various sources, including the Company’s website, resellers, affiliates, stores, distributors, and others.
  • Regardless of where you get the product from, the terms of the End User License Agreement (EULA) apply to you if you choose to install and use the program.

B. Acquiring from the App Store:

  • The antivirus application can also be acquired from an app store.
  • When you download it from the app store, it might be available for free with basic features enabled.
  • Information about the basic and premium properties can be found on the website as well.

C. Additional Terms Based on Acquisition Source:

  • Depending on the source from which you get the solution, there might be additional terms and policies applicable to your installation and usage.
  • These additional terms would depend on the specific source of acquisition.

D. Unlocking Premium Features:

  • The complete set of features, including both basic and premium features, can be unlocked by making a payment and subscribing to the license for the premium attributes.
  • If there is a “free trial version,” you might be able to try out the premium functions during the trial period.

E. Auto-Renewing Subscription:

  • After the trial period or after your payment for premium features, an auto-renewing subscription period will begin.
  • This subscription period will renew on a regular basis, as specified in the terms unless you choose to cancel it.

2. OTHER IMPORTANT RIGHTS AND LIMITATIONS.

2.1 Internet-Based Services Components:

The product you’re using contains certain components that allow you to access and utilize specific services over the internet. These services could include things like updates, information retrieval, or other online functionalities. Antivirus solution interacts with the internet to provide you with updates, fixes, and information. It informs you that it can automatically download and install these updates without needing your explicit consent, as long as they pertain to enhancing your experience or addressing issues with the product. It’s advised to carefully read and comprehend these terms.
  • The company that developed the solution has the ability to automatically check the version of the software you are using. This is likely done to ensure that you have the latest version with the most recent features and security fixes.
  • Based on the version check, if the company finds that there are updates or fixes available for the product or its components, it has the right to provide these updates or fixes to your program. These updates or fixes will be automatically downloaded and installed on your device without requiring your explicit permission.
  • The antivirus may also periodically display updates and information related to the solution and your license. This information is likely downloaded from the internet and could include details about the software’s characteristics, usage, licensing terms, and any relevant announcements.

2.2 Driver Update Features

The software offers the ability to update drivers, which are pieces of software that allow the operating system to communicate with specific hardware components in your device, like graphics cards or printers. if you decide to use the driver update features of the programs, you’re allowing us to access and use specific information from your device to ensure effective updates.
  • In order to provide driver update features, the program needs to collect certain information about your device’s system, hardware, and software. This information is necessary to ensure that the updates are compatible and effective with your specific layout.
  • By using the driver update features, you explicitly give permission (authorize) the firm or its associated representative to access and use the required information from your device. This information might include details about your device’s configuration, program setup, geographic location, and IP address.
  • The collected information is used for the purpose of improving the product and providing customized services or technologies to you. This implies that we might use the gathered data to enhance its product`s functionality and potentially offer you tailored solutions.
  • The collected information may be disclosed to others, but in a manner that doesn’t personally identify you. We might share the data with the third parties, but it will be encrypted or aggregated to protect your privacy.
  • The program itself might have various components that also need periodic updates. The version details of your antivirus, along with other device info, may be shared with us. This sharing is for the purpose of checking compatibility and providing the necessary updates.

2.3 Platform Support and Compatibility

  • The product and its associated materials (packaging, documentation, etc.) may contain details about the system requirements and operating systems that the software is compatible with. This is to guide users in setting up the program on their devices.
  • The company declares that it does not provide support for platforms (hardware or operating systems) for which the manufacturer’s official support has been discontinued.
  • The information provided on the packaging and materials regarding compatibility with specific platforms is for informational purposes only. We acknowledge that the product market is constantly changing and evolving, making it difficult to maintain accurate and up-to-date compatibility information.
  • If the purchased antivirus is not compatible with your platform (device or operating system), we offer a solution. You can contact our support team to receive a complete refund for the product, provided that you haven’t activated the antivirus yet.
  • If you have already installed and activated the antivirus solution on your device, it is assumed that the program is compatible with your platform.

2.4 Functional Changes and Updates

The company emphasizes that updates to the antivirus are made periodically. The program`s features, functions, and services might change or improve over time through these updates.
  • We retain the right to make improvements and alterations to the product, including removing or discontinuing certain features, functions, or services. These changes can occur without any prior notice to the user.
  • When you purchase the antivirus, it might not include all the features and functions that were initially advertised. This acknowledges that the program might evolve and change between the time of purchase and installation.
  • After purchasing and installing the antivirus, the features and functions might continue to change without any notice. The company holds the right to modify, enhance, or remove features as they see fit.
  • The product might be sold as a subscription-based service. If it is, users are expected to accept all the changes made to the product during the subscription or license period. This includes understanding that certain features or functions might be discontinued if the firm decides to do so.
  • Users of the antivirus must acknowledge and accept that changes can be made to the program over time. If a particular feature or function is discontinued, users should understand that this is within the company’s discretion.

2.5 Legitimate Utilization

We grant you the right to use our product, but this usage comes with the condition that you must use it in a legitimate way. You are not allowed to engage in any activities that are illegal or against the law while using the product.
  • The software usage terms specifically prohibit you from taking part in any activities that may violate local, federal, national, or international laws, regulations, rules, and statutes. You will not use the software for purposes that could be considered illegal under any jurisdiction
  • If the company detects or receives reports of you engaging in illegal or unlawful activities while using its products, it reserves the right to terminate your access to the software.
  • If you engage in any illegal or unlawful activities or misconduct while using the software, the company is not responsible for any liability that arises from your actions. When you violate the law or use the software for illegal activities, any resulting consequences are solely your responsibility.

3. Possession Of Ownership And Rights

The company possesses all the ownership and rights which are not mentioned to you in this EULA. The product is subject to the protection of copyright and intellectual property rules and regulations. All the rights and titles are trademarks solely belonging to the supplier or the manufacturing company.

4. Restrictions On Dismantling Or Reverse Engineering

You’re not allowed to take apart the antivirus to understand its inner workings, whether by reverse engineering, decompiling, or disassembling it. In some jurisdictions, laws might permit reverse engineering for purposes like interoperability (making software work with other software), security research, or other legitimate reasons. If applicable laws explicitly allow you to engage in these activities despite the general restriction, then you are permitted to do so.

5. No Commercial Hosting, Lending Or Leasing

The end user is not allowed to rent out the software to others. Allowing someone else to use the antivirus in exchange for payment, much like renting out a physical item is completely prohibited. Similarly, you cannot lease it. Granting someone the right to use the program for a specific period in exchange for periodic payments is completely forbidden. Even allowing someone for temporary use without charging or charging any money is also not allowed. You are also prohibited from providing commercial hosting services. Commercial hosting including the software as a service to others, where users can access and use the antivirus remotely via the internet is completely forbidden. So no user is allowed to rent out or lease the product to generate income.

6. Export control

The product falls under the jurisdiction of international export laws and regulations. As a user, you are agreeing to follow all relevant international and national laws that pertain to the product. These rules include limitations on exporting software to certain countries, entities, or individuals due to national security, human rights, or other concerns. It cannot be used in ways that could compromise national security, violate trade agreements, or circumvent international embargoes or sanctions.

7. Limited Warranty And Remedies

The company’s liability is confined to the options provided by the warranty. No consequential compensation is allowed. You may be entitled to specific remedies, and this warranty is void if product issues arise from misuse, violation of the terms and conditions mentioned in this EULA, etc. Remedies include refund, repair, or replacement of the program.

8. Disclaimer

It is made clear that the main option available to the user for any breach of the limited warranty is as outlined in the section. Except for a potential refund offered by the company, no damages, including consequential damages, are permitted. We hold the authority, guided by relevant laws, to select from three alternatives: issuing a refund equivalent to the product`s cost (if any), repairing or replacing the antivirus failing to meet the warranty and returning it with the purchase receipt, or offering monetary compensation. The selected remedy will be given at no cost to the user, but any associated expenses like shipping fees for returning the software will be the user’s responsibility.
This limited warranty loses its validity if product failure results from situations such as accidents, misuse, abuse, or abnormal usage. Moreover, the limited warranty’s coverage extends to include the entirety of the software’s purchase, download, and checkout process. This coverage includes all marketing and promotional acts carried out by the firm or its representatives for the product, as well as the technical elements of the checkout process, which includes tasks like data encryption and transmission for credit card transactions. Users who don’t agree with these limitations applying to the entirety of the purchase process are advised not to continue with the purchase.

9. Limited Liability

To the fullest extent permissible by applicable law, the firm and its suppliers are not liable for any special, incidental, punitive, indirect, or consequential damages that may arise from using the antivirus. These damages include:
  • Specific and quantifiable losses.
  • Incidental, unplanned or secondary damages.
  • Punitive ones to punish a party for wrongdoing
  • Indirect, Consequences of the main event.
  • Consequential damages resulting from the use or inability to use the software.
  • Some arise from using the antivirus
The company (developer/creator of the program) and its suppliers (those involved in providing components or services for the antivirus) cannot be held legally responsible or accountable. This limitation is applied to the maximum extent allowed by the law applicable to the situation. It aims to protect the company and its suppliers from being held accountable for a wide range of potential damages that could occur as a result of using the product.

10. Support Services

The company offers support services for the antivirus solution. These services include help with troubleshooting, technical inquiries, and resolving issues related to the antivirus. Specific terms and conditions may apply to these support services, outlining the scope, duration, and any limitations of the assistance provided. If the company provides any additional product code as part of the support services, it will be considered an integral part of the software itself and subject to the terms of the existing agreement. We are responsible for handling orders and providing customer support during regular business hours. We will assist customers with inquiries and concerns related to the software within the operational time frame. Also, we might engage third-party providers to offer technical support for the product.

11. Comprehensive Software Agreement: Terms, Supersedence, and Legal Clarity

The entire EULA, together with any attached documents, constitutes the complete understanding between the user and the company. It rules over any prior discussions or written communication. It also clarifies that the terms within this agreement are more authoritative than any conflicting company policies. If there’s any conflict between the terms of this EULA and those in the company’s policies or programs regarding support services, the terms of this EULA take precedence and are given priority. If any part of this agreement is deemed invalid, unenforceable, or illegal, it doesn’t affect the legality or enforceability of the other provisions. Those unaffected provisions remain in full effect.

12. Contact Information

For further queries or assistance, please email us at [email protected]