COMODO MOBILE SECURITY FOR ANDROID
THIS AGREEMENT CONTAINS A BINDING ARBITRATION CLAUSE. PLEASE READ THE AGREEMENT CAREFULLY BEFORE ACCEPTING ITS TERMS AND CONDITIONS.
IMPORTANT - PLEASE READ THESE TERMS CAREFULLY BEFORE USING THE COMODO MOBILE SECURITY SOFTWARE AND SERVICES (THE "PRODUCTS"). THE PRODUCTS MEANS ALL OF THE ELECTRONIC FILES PROVIDED BY DOWNLOAD WITH THIS LICENSE AGREEMENT. BY USING THE PRODUCTS, OR BY CLICKING ON "I ACCEPT" BELOW, YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, THAT YOU UNDERSTAND IT, AND THAT YOU AGREE TO BE BOUND BY ITS TERMS. IF YOU DO NOT AGREE TO THE TERMS HEREIN, DO NOT USE THE SOFTWARE, SUBSCRIBE TO OR USE THE SERVICES, OR CLICK ON "I ACCEPT".
This end user license and subscriber agreement is between you ("you" or "Subscriber"), an individual, and either:
a. if you are not located in China, Comodo Security Solutions, Inc., which has its principal place of business at 200 Broadacres Drive, 2nd Floor, Suite 100, Bloomfield, New Jersey 07310, or
b. if you are located in China, Beijing Comodo Software Development Co. Ltd., which has its principal place of business at 401 Tower B., Fenglan International Plaza, 32 Beidajie Xizhimen, Haidian District, Beijing, China.
Both are referred to herein as "Comodo".
Product Functionality:
Comodo Mobile Security Software includes: Comodo Anti-theft, Comodo App Lock, and Comodo Backup and has the features of Anti-Virus Scan, Cloud Scan, Scheduled Scans, Real time Scan, Real time file scan, Installer Scan, Wi-Fi Hotspot Security, Secure Browsing, Call Block, and Private Number Block. In addition, the Product includes Logging Modules of Comodo Messaging Center, Google Analytics, as well as Promotion and Advertising modules, such as Google Play Rate and Facebook Share.
In exchange for your use of the Products, you agree as follows:
1. License
1.1. Grant of License. Comodo grants you a limited, non-exclusive, non-transferable, and revocable license to download, install, back-up, and use the Software and Services (collectively, the "Products") on (1) one mobile device unless otherwise indicated under a valid license granted by Comodo for the term that you have paid for (if a paid version), including any documentation and files accompanying the Products. You shall not resell, lease, sell, modify, reverse engineer, decompile, or create derivative works of the Software. All rights not expressly granted herein are reserved to Comodo. This License grant shall expire at the end of the paid subscription period or at the end of the trial period.
1.2. Restrictions. The licenses granted herein are only valid if:
(i) the Products are NOT modified in any manner;
(ii) the Products are only installed and used in accordance with your network security policies,
(iii) you possess the necessary authority and power to install and use the Products,
(iv) you promptly pay all license fees when due, and
(v) this agreement is accepted without modification and has not been breached.
1.3. Registration. When registering Products, you must provide accurate information and must update the registration information if it changes. Comodo may limit your ability to use the Products if you fail to complete a required registration process. You may also be required to select a username and password. Maintaining the confidentiality of this password and username is your responsibility. You must notify Comodo immediately of any unauthorized use of your account.
1.4. Limited License. The licenses granted herein are only for the mobile device for which you paid for the Products. You can secure additional mobile devices by obtaining a separate license for each mobile device, which might require an additional fee. You must have a license for each mobile device that accesses or use the Products prior to installing or using the Products.
1.5. Updates. Comodo is not obligated to provide updates to the Products. If an update is provided and the update is not accompanied by an additional agreement, this agreement applies to your use and installation of the update. Some Products update automatically without notice.
1.6. Technical Support. No technical or customer support is provided for Comodo Mobile Security.
1.7. Trial, Free, Evaluation, and Beta License. If this agreement pertains to a trial, free, beta, or evaluation version, the licenses granted herein terminate at the end of the trial or evaluation period or when Comodo disables access to the Products. For a trial version of the Product if no term is agreed or specifically set forth in the documentation that you receive with this Product, then the term for the licenses granted herein shall be for the term that you purchased. Any Limited Guarantee which may be set forth herein is not offered with any Trial, Free, Evaluation or Beta Product. All trial, evaluation, and beta licenses are limited to one per customer. Generally, credit card information is required to access a free trial. However, Comodo shall not charge your credit card until the trial period has ended. At the end of the trial period, Comodo may bill the credit card for the Products without further notice. Participants in a free trial are not entitled to a 30 day refund period. Your termination of this agreement prior to the end of the free trial is required to avoid fees for the Products. Annual subscriptions expire one year from the end of the trial period. Comodo may deny or revoke a free trial for any reason.
2. Ownership
2.1. No Ownership Rights. The Products are being licensed, not sold. Comodo retains all ownership rights in and to all Products, including any intellectual property rights therein.
2.2. Copyright. The Products contains material that is protected by United States and foreign intellectual property laws, including copyright, trade secret, and patent law. All rights not granted to you herein are expressly reserved by Comodo. You may not remove any copyright or other proprietary notice of Comodo from the Products.
2.3. Content. Content, including files, links, images, and text, made available or accessible through the Products is the sole responsibility of the person or entity from whom it originated and is the property of the applicable owner. This agreement does not give any rights to such content. Comodo does not endorse any such content. You accept all responsibility for security risks and any damage resulting from any content viewed or accessed through the Products, and Comodo is not responsible for any damage or loss caused by your use or reliance on any of the content, goods or services, or information available through third party sources regardless of how presented.
2.4. Submissions. Any communications sent to Comodo are the property of Comodo or its affiliates. Unless stated otherwise herein, submissions are not considered confidential, and Comodo is not liable for any use or disclosure of a submission. Except as noted herein, Comodo is entitled to unrestricted use of any submissions for any purpose whatsoever without compensation to the provider of the submission.
3. Payment
3.1. Fees. Certain Products may be used without payment to Comodo. For other Products, you must pay the fee listed on Comodo's website prior to using or accessing the Products. Free and paid for Products are listed on www.comodo.com. Comodo may modify fees for paid products in its sole discretion. Your failure to terminate this agreement after a fee change is posted to Comodo's website constitutes your acceptance of amended prices, which will apply upon your renewal of the Products.
3.2. Method of Payment. All fees must be paid in advance. Comodo may automatically charge the credit card provided for renewing subscriptions to the Products. However, you remain solely responsible for any renewal payment. If renewal payments are not made before a subscription expires, Comodo may, without notice, restrict or remove your access to the Products.
3.3. Rejected Charges. If any charges are rejected by your credit card issuer then Comodo may deactivate your account until payment is successfully received. Comodo may deactivate any account that has a disputed charge until Comodo, in its sole discretion, determines the dispute resolved.
3.4. Billing Issues. You shall provide Comodo notice of any billing problems or disputes within 60 days after the charge first appears on a statement you receive from your bank, credit card company, or other billing company. Failure to notify Comodo of the problem within the 60 day period is your acceptance of the charges. Comodo is not obligated to provide a refund for any unused Products.
4. Restrictions
4.1. Lawful Use. The Products are solely for lawful purposes and use. You are responsible for ensuring that your use of the Products is in accordance with this agreement and any applicable laws, statutes, ordinances, regulations, rules and other government authority.
4.2. Compliance. You shall (1) not interfere or disrupt networks connected to Comodo's services; (2) comply with all regulations, policies and procedures of networks connected to the services; (3) not use the Products to infringe the privacy or intellectual property rights of a third party; (4) not use the Products to distribute or transmit any file that contains malware, (5) not attempt to gain unauthorized access to other computer systems or mobile devices; and (6) not use the Products to transmit any unlawful, harassing, libelous, defamatory, racist, indecent, abusive, violent, threatening, intimidating, harmful, vulgar, obscene, offensive or otherwise objectionable material of any kind or nature.
4.3. Export. You represent that you are not located in and will not modify, export or re-export, either directly or indirectly, the Products to any country or entity under United States restrictions or to any country or entity subject to applicable trade sanctions. The United States restricted country and persons list is subject to change without notice from Comodo, and you must comply with the list as it exists in fact. COMODO SHALL NOT BE LIABLE FOR YOUR VIOLATION OF ANY SUCH EXPORT OR IMPORT LAWS, WHETHER UNDER UNITED STATES LAW OR FOREIGN LAW.
5. Termination.
5.1. Term. This agreement is effective until terminated by you or by Comodo. You may only use paid Products during the period for which you have paid the subscription fee. The subscription may be renewed by paying an additional license fee as set forth on the Comodo website.
5.2. Termination by You. For free software, you may terminate this agreement at any time by removing all copies of the software in your possession or under your control. All paid Products may be terminated by removing all copies of any related software and notifying Comodo of your intent to terminate this agreement. Notification of termination must be sent by email to support@comodo.com. Your termination will be effective upon Comodo's receipt and processing of the email. Processing may take up to 24 hours.
5.3. Termination by Comodo. Comodo may terminate this agreement at any time by posting notice of the termination on its website or sending an email to the address provided during your registration for the Products. Comodo may monitor its systems for excessive consumption of network resources and may take technical or other remedies deemed necessary to prevent or eliminate any excessive consumption. If Comodo deems your use to be excessive, Comodo may, with email notice, terminate your account or adjust the price of the Products.
5.4. Events Upon Termination. Upon termination, you must immediately cease using the Products and delete all copies of any related software found on your mobile device and any backup copies made. Upon termination, Comodo may disable further use of the Products without further notice and may delete, remove, and erase any account information, any backup data stored by Comodo, and any other information stored or collected by Comodo. Such deletions are in Comodo's sole discretion and may occur without notice to you. No refunds shall be given for any reason.
a. Uninstall
To uninstall Comodo Mobile Security, you should remove the application from device administration screen first. You can find the menu under "Settings - Security - Device Administrators." You need to disable the check mark from Comodo Mobile Security under the Device Administrator menu. Then you should go to "Settings - Application Manager" menu and find Comodo Mobile Security from the list. You should tab on application name to see the details on App info menu. Under App info menu, you can see the action buttons. You should choose and tab "Uninstall". (Note: Menu names and order may not be exactly as described here due to Android versions and manufacturer customization). Please contact Comodo if you need further help.
6. Indemnification.
6.1. Indemnification. You shall indemnify (i) Comodo, (ii) Comodo's affiliates, and (iii) Comodo's and its affiliate's directors, officers, employees, and agents (each an "Indemnified Person") against all liabilities, losses, expenses, or costs (including reasonable attorney's fees) (collectively "Losses") that, directly or indirectly, are based on your breach of this agreement, information provided by you, or your infringement on the rights of a third party.
6.2. Indemnification Procedure. Comodo shall notify you promptly of any demand for indemnification. However, Comodo's failure to notify will not relieve you from your indemnification obligations except to the extent that the failure to provide timely notice materially prejudices you. You may assume the defense of any action, suit, or proceeding giving rise to an indemnification obligation unless assuming the defense would result in potential conflicting interests as determined by the Indemnified Person in good faith. You may not settle any claim, action, suit or proceeding related to this agreement unless the settlement also includes an unconditional release of all Indemnified Persons from liability.
6.3. Additional Liability. Your indemnification obligations are not Comodo's sole remedy for a breach and are in addition to any other remedies Comodo may have against you under this agreement. Your indemnification obligations survive the termination of this agreement.
7. Disclaimers and Limitation of Liability.
7.1. Internet. You acknowledge that the Products are subject to the operation and telecommunications infrastructures of the Internet and the operation of your Internet connection services, all of which are beyond Comodo's control.
7.2. Guarantee Disclaimer; Assumption of Risk. EXCEPT AS SPECIFICALLY STATED OTHERWISE IN THIS AGREEMENT, COMODO EXPRESSLY DISCLAIMS ALL IMPLIED AND EXPRESS WARRANTIES IN THE PRODUCTS. THIS DISCLAIMER INCLUDES ALL WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT AND IS EFFECTIVE TO THE MAXIMUM EXTENT ALLOWED BY LAW. COMODO DOES NOT GUARANTEE THAT 1) THE PRODUCTS WILL MEET YOUR REQUIREMENTS OR EXPECTATIONS OR 2) THAT ACCESS TO THE PRODUCTS WILL BE UNINTERRUPTED, TIMELY, SECURE, OR ERROR-FREE.
7.3. Damage Limitation. THE TOTAL LIABILITY OF COMODO AND ITS AFFILIATES, AND EACH OF THEIR OFFICERS, DIRECTORS, PARTNERS, EMPLOYEES, AND CONTRACTORS, RESULTING FROM OR CONNECTED TO THIS AGREEMENT IS LIMITED TO THE AMOUNT PAID BY YOU FOR THE PRODUCTS. YOU WAIVE ALL LIABILITY FOR SPECIAL, INDIRECT, INCIDENTAL, PUNITIVE OR CONSEQUENTIAL DAMAGES. THIS WAIVER INCLUDES ALL DAMAGES FOR LOST PROFITS, REVENUE, USE, OR DATA AND APPLIES EVEN IF COMODO IS AWARE OF THE POSSIBILITY OF SUCH DAMAGES. These limitations apply to the maximum extent permitted by law regardless of 1) the reason for or nature of the liability, including tort claims, 2) the number of claims, 3) the extent or nature of the damages, and 4) whether any other provisions of this agreement have been breached or proven ineffective.
7.4. Data Transfer. ALL MATERIAL AND/OR DATA DOWNLOADED OR OBTAINED THROUGH THE PRODUCTS IS AT YOUR OWN RISK. YOU ARE SOLELY RESPONSIBLE FOR THE USE OR YOUR POSSESSION OF SUCH DATA OR MATERIAL. COMODO DOES NOT ACTIVELY MONITOR ANY INFORMATION OR MATERIAL TRANSFERRED THROUGH ITS PRODUCTS AND CANNOT WARRANT THE CONTENT OF SUCH MATERIAL OR DATA.
7.5. Exceptions. If any legal right disallows an exclusion of warranties or disallows limiting certain damages, then the disclaimers of guarantee and limitations on liability herein apply to the maximum extent allowed by law.
7.6. Limitations on Remedy. Except for actions and claims related to a party's indemnification obligations, all actions or claims relating to this agreement must be brought within one (1) year from the date when the cause of action occurred.
8. Privacy.
8.1. Privacy Policy. Comodo shall follow the privacy policy posted on its website at http://www.comodo.com/reposit/privacy_agreement.html when collecting and using information from you. Comodo may amend the privacy policy at any time by posting the amended privacy policy on its website.
8.2. Permissions: You hereby expressly authorize and grant permission to Comodo to remotely access, modify and delete personal data such as contacts, emails, addresses, messages, music files, videos, when requested by you. You expressly authorize and grant permission to Comodo to remotely lock a stolen or lost device. You expressly authorize and grant permission to Comodo to view if your device is rooted. Additionally, you expressly authorize and grant permission to Comodo to access your device's Global Positioning System (GPS) location, cellular network location or other similar data, reading the SD card, device ID, device IMEI number, installed application(s), battery and memory status, and camera control.
Antivirus Settings
For Settings under Antivirus, the following features are installed as enabled:
The setting of Report False Detection sends suspicious items to the cloud when the device is both in the charging mode and connected to Wi-Fi.
Comodo collects a reported .apk file as a false positive when the user device is connected to Wi-Fi and the charging mode is on. As a precondition to collection of this information, this property must be enabled in the Application settings.
The setting of Enable Real-Time Protection scans installed applications on the device.
The setting of Secure Wi-Fi assists in the prevention of identity theft on public Wi-Fi.
Specific user information obtained by the Product includes:
Email, Internet, Network State Access and Change, Wi-Fi State Change and Access, External Storage, Kill Background Process, Phone State Access, System Alert Window, Receive Boot Completed, Read/Write History Bookmarks, Read Call Log, Read Contacts, Call Phone, and Wake Lock
SPECIFICALLY, YOU ARE GRANTING THIS APPLICATION ACCESS TO THE FOLLOWING:
SERVICES THAT COST YOU MONEY:
Send SMS Messages
Allows the application to send SMS messages.
Directly Call Phone Numbers
Allows the application to call phone numbers without your intervention.
HARDWARE CONTROLS:
Change Your Audio Settings
Allows the application to modify global audio settings such as volume and routing.
Take Pictures and Videos
Allows the application to take pictures and videos with the camera, and record video. This allows the application at any time to collect images the camera is seeing.
YOUR LOCATION:
Approximate location (network-based), precise location (GPS and network based), access extra location provider commands, and GPS access.
Coarse (network-based) Location
Access coarse location sources such as the cellular network database to determine an approximate tablet location, where available. Access coarse location sources such as the cellular network database to determine an approximate phone location, where available.
Fine (GPS) Location
Access fine location sources such as the Global Positioning System on the tablet, where available. Access fine location sources such as the Global Positioning System on the phone, where available.
Mock Location Sources For Testing
Allows the application to create mock location sources for testing.
YOUR MESSAGES:
Receive SMS
Allows the application to receive and process SMS messages.
Edit SMS or MMS
Allows the application to write to SMS messages stored on your tablet or SIM card. Malicious apps may delete your messages. Allows the application to write to SMS messages stored on your phone or SIM card.
Read SMS or MMS
Allows the application to read SMS messages stored on your tablet, phone, or SIM card.
NETWORK COMMUNICATION:
Full Internet Access
Allows the application to create network sockets.
YOUR PERSONAL INFORMATION:
Read Browser's History and Bookmarks: (Not valid after Android API 23)
This allows the application to read all the URLs that the Browser has visited, and all of the Browser's bookmarks. Note: this permission may not be enforced by third-party browsers or other applications with web browsing capabilities.
Write Browser's History and Bookmarks: (Not valid after Android API 23)
This allows the application to modify the Browser's history or bookmarks stored on your device or phone. This may allow the application to erase or modify Browser data. Note: this permission may not be enforced by third-party browsers or other applications with web browsing capabilities.
Write Contact Data
Allows the application to modify the contact (address) data stored on your tablet or your phone.
Read Contact Data
Allows the application to read all of the contact (address) data stored on your tablet or phone.
Read Log Data
This allows the application to read from the system's various log files. This allows it to discover general information about what you are doing with the phone or tablet, potentially including personal or private information.
Read Calendar Events
Allows the application to read all calendar events stored on your tablet, including those of friends or coworkers. Allows the app to read all calendar events stored on your phone, including those of friends or coworkers.
Add or Modify Calendar Events and Send Email to Guests Without Owners' Knowledge
Allows the application to send event invitations as the calendar owner and add, remove, change events that you can modify on your device, including those of friends or co-workers.
DEVICE AND APPLICATION HISTORY
The application can use one or more of the following: Read sensitive log data, Retrieve system internal state, Read your web bookmarks and history, Retrieve running applications.
CELLULAR DATA SETTINGS:
The application can use settings that control your mobile data connection and potentially the data you receive.
IDENTITY:
The application can use your account and/or profile information on your device.
Identity Access may include the ability to: find accounts on the device; read your own contact card (such as name and contact information); modify your own contact card; add or remove accounts.
PHONE:
The application can use your phone and/or its call history.
Depending on your plan, you may be charged by your carrier for phone calls. Phone access may include the ability to:
Directly call phone numbers; this may cost you money;
Write call log (example: call history);
Read call log;
Reroute outgoing calls;
Modify phone state;
Make calls without your intervention.
DEVICE ID AND PHONE CALLS:
The application can access your device ID(s), phone number, if you are on the phone, and number connected by a call.
Read Phone State and Identity
This allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and the like.
Process Outgoing Calls
Allows the application to process outgoing calls and change the number to be dialed.
Read Call Log
This allows an application to read the user's call log.
Call Phone
This allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call.
STORAGE - PHOTOS/MEDIA/FILES:
The application can use files or data stored on your device. Photos/Media/Files access may include the ability to:
Read/Modify/Delete USB Storage Contents or Read/Modify/Delete SD Card Contents
This allows the application to write to the USB storage and allows the app to read and write to the SD card; format external storage; mount or unmounts external storage.
SYSTEM TOOLS:
Display System-Level Alerts
This allows the application to show system alert windows.
Change Wi-Fi State
This allows the application to connect to and disconnect from Wi-Fi access points, and to make changes to configured Wi-Fi networks.
Prevent Tablet From Sleeping or Prevent Phone From Sleeping
This allows the application to prevent the tablet or phone from going to sleep.
Reorder Running Apps
This allows the application to move tasks to the foreground and background.
Mount And Un-mount File Systems
This allows the application to mount and un-mount file systems for removable storage.
Retrieve Running Apps
This allows the application to retrieve information about currently and recently running tasks.
Modify Global System Settings
This allows the application to modify the system's settings data.
Change Network Connectivity
This allows the application to change the state of network connectivity.
Automatically Start at Boot
This allows the application to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet by always running. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Kill Background Processes
This allows the application to kill background processes of other applications even if memory isn't low.
Retrieve System Internal State
YOUR ACCOUNTS:
Discover Known Accounts
This allows the application to get the list of accounts known by the tablet or phone.
HARDWARE CONTROLS:
Control Vibrator
Allows the application to control the vibrator on the phone or tablet.
NETWORK COMMUNICATION:
View Wi-Fi State
Allows the application to access and view the information about the state of Wi-Fi, such as if the Wi-Fi is turned on and the name(s) of connected devices.
View Network State
Allows the application to view the state of all networks and view Wi-Fi connections.
PHONE CALLS:
Modify Phone State
This allows the application to control the phone features of the device. An application with this permission can switch networks, turn the phone radio on and off and the like without ever notifying you.
SYSTEM TOOLS:
Kill Background Processes
Allows the app to kill background processes of other apps, even if memory isn't low.
Automatically Start At Boot
Allows the application to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet or phone by always running.
DEFAULT:
Battery
Allows the application to access usage of the battery.
CLOUD SCAN:
Sends the hash code of each application installed on the user device.
OTHER:
The application can use custom settings provided by your device manufacturer and application specific permissions. Other access may include the ability to :
Read and/or write to your social media stream on some social networks
Access subscribed feeds.
Comodo Messaging Center Data
Comodo collects information and data for improvement and understanding of the performance and functionality of the Product. This includes:
Computer ID, Operating system, Operating system version, Mobile brand name and model, Product ID, Product Version, Time Stamp when data is related to, Activation events, Heartbeat (once per day to determine if product is active), App Launched, User interface Clicks, Memory Consumed, Battery Usage, and Google Cloud Messaging (GCM) ID.
YOU ARE GIVING EXPRESS PERMISSION FOR THE ABOVE DATA AND INFORMATION COLLECTION.
8.3. Disclosure. Comodo will disclose information where required by a subpoena, interception order or other lawful process. Comodo may also disclose information when it believes that such disclosure is necessary to protect the rights or safety of others or to enforce, or protect Comodo's rights under this Agreement.
8.4. Opt Out. You may opt-out of having information used for purposes not directly related to the Products by emailing a clear notice to optout@comodo.com. By clicking "I AGREE", you affirmatively consent to receiving Comodo's and its affiliates' promotional material.
9. Miscellaneous
9.1. Notices. All questions, notices, demands, or requests to Comodo with respect to this Agreement shall be made in English writing to: Comodo Security Solutions, Inc., 200 Broadacres Drive, 2nd Floor, Suite 100, Bloomfield, New Jersey 07003. All notices to you shall be made by posting the notice on the Comodo website.
9.2. Entire Agreement. This agreement, along with the attached schedules and any documents referred to herein, is the entire agreement between the parties with respect to the subject matter, superseding all other agreements that may exist with respect to the subject matter. Section headings are for reference and convenience only and are not part of the interpretation of the agreement.
9.3. Modifications. Comodo may amend or discontinue certain Products offered under this agreement in its sole discretion, including modifying renewal license fees, availability, equipment and software requirements, and limiting or restricting use of Products. Comodo may amend this agreement to the extent allowed by law. Comodo will give you notice of these amendments by posting the modified agreement to its website. You must periodically visit Comodo's website to be aware of any changes. Continued use of a Product after an amendment constitutes your acceptance of the change.
9.4. Waiver. A party's failure to enforce a provision of this agreement does not waive the party's right to enforce the same provision later or right to enforce any other provision of this agreement. To be effective, all waivers must be both in writing and signed by the party benefiting from the waived provision.
9.5. Force Majeure and Internet Frailties. Other than for payment obligations by you, neither party will be liable for a delay or failure to perform an obligation to the extent that the delay or failure is caused by an occurrence beyond the party's reasonable control. Each party acknowledges that the operation of the Internet is beyond the other party's reasonable control, and neither party will be liable for a delay or failure caused by an interruption or failure of telecommunication or digital transmission links, Internet slow-downs or failures, or other such transmission failure.
9.6. Arbitration/ Governing Law. You agree that any dispute, claim or controversy arising out of this agreement shall be determined by binding arbitration. Before you may begin arbitration with respect to a dispute involving any aspect of this Agreement, you shall notify Comodo and any other party to the dispute for the purpose of seeking dispute resolution. The notice to Comodo should be addressed to 200 Broadacres Drive, 2nd Floor, Bloomfield, New Jersey 07003.
If the dispute is not resolved within sixty (60) days after the initial notice, then a
party may proceed in accordance with the following: Any unresolved dispute arising under the terms of this Agreement shall be decided by arbitration conducted through the services of the Commercial Arbitration Rules of the American Arbitration Association (hereinafter referred to as the "AAA"). Notice of demand for an arbitration hearing shall be in writing and properly served upon the parties to this Agreement. Arbitration hearings shall be held in the state of New Jersey at a location mutually agreeable to the parties.
For the Arbitration, and to the extent any matter of this Agreement cannot be covered by Arbitration, the laws of the state of New Jersey govern the interpretation, construction, and enforcement of this agreement and all proceedings arising out of it, including tort claims, without regard to any conflicts of law principles. All proceedings or legal action arising from this agreement must be commenced in the state or federal courts of New Jersey. Both parties agree to the exclusive venue and jurisdiction of these courts.
The United Nations Convention on Contracts for the International Sale of Goods and the Uniform Computer Information Transaction Act shall not apply to this agreement and are specifically excluded.
Class Action Waiver: Any proceedings to resolve or litigate any dispute in any forum will be conducted solely on an individual basis. Neither you nor Comodo will seek to have any dispute heard as a class action, private attorney general action, or in any other proceeding in which either party acts or proposes to act in a representative capacity. No arbitration or proceeding will be combined with another without the prior written consent of all parties to all affected arbitration or proceedings.
9.7. Assignment. You may not assign any of your rights or obligations under this agreement, whether by merger, consolidation, operation of law, or any other manner, without the prior written consent of Comodo. For purposes of this section only, a change in control is deemed an assignment. Any transfer without consent is void. To the extent allowed by law, Comodo may assign its rights and obligations without your consent.
9.8. Severability. Any provision held invalid or unenforceable will be reformed to the minimum extent necessary to make the provision valid and enforceable. If reformation is not possible, the provision is deemed omitted and the balance of the agreement remains valid and enforceable.
9.9. Survival. All provisions relating to confidentiality, proprietary rights, indemnification, and limitations of liability survive the termination of the agreement.
9.10. Rights of Third Parties. There are no third party beneficiaries under the agreement.
10. Included Software and Licenses
The following third party or open source software is included and is provided under other licenses and/or has source available from other locations.
Apache License v2.0
Copyright 2015, Comodo Security Solutions Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
Sun BCL
http://www.oracle.com/technetwork/java/javase/downloads/jdk-6u21-license-159167.txt
Skyhook
Copyright 2005-2013 Skyhook, Inc. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted subject to the following:
Use and redistribution is subject to the Software License and Development Agreement, available at www.skyhookwireless.com
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
CDDL
http://opensource.org/licenses/CDDL-1.0
[GoogleSupport]
com.android.support:appcompat-v7:23.4.0
com.android.support:recyclerview-v7:23.4.0
com.android.support:multidex:1.0.1
com.android.support:cardview-v7:23.4.0
[GoogleAnalytic]
com.google.android.gms:play-services-analytics:9.0.2
com.google.android.gms:play-services-plus:9.0.2
[GoogleFirebase]
com.google.firebase:firebase-messaging:9.0.2
[GoogleGson]
com.google.code.gson:gson:2.2.4
[GoogleProtoBuf]
com.google.protobuf:protobuf-java:3.0.0-beta-1
com.google.protobuf.nano:protobuf-javanano:3.0.0-alpha-3
com.github.clans:fab:1.6.2
https://github.com/Clans/FloatingActionButton/blob/master/LICENSE
com.facebook.android:facebook-android-sdk:4.8.0
https://github.com/facebook/facebook-android-sdk/blob/master/LICENSE.txt
[Retrofit]
com.squareup.retrofit2:retrofit:2.0.1
com.squareup.retrofit2:converter-gson:2.0.0
https://github.com/square/retrofit/blob/master/LICENSE.txt
com.crashlytics.sdk.android:crashlytics:2.5.7@aar
https://fabric.io/terms
ACCEPTANCE
BY CLICKING "I ACCEPT" BELOW, YOU AGREE THAT YOU HAVE READ AND UNDERSTAND THIS AGREEMENT AND THAT YOU WILL BE BOUND BY AND COMPLY WITH ALL OF ITS TERMS AND ACCEPT THE FUNCTIONS OF THE PRODUCT. DO NOT CLICK THE "I ACCEPT" BUTTON IF YOU DO NOT AGREE TO THE FUNCTIONS OF THE PRODUCT AND THE TERMS OF THIS AGREEMENT.