Sophos SafeGuard Disk Encryption for Mac Administrator help. Product version: 6.1

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Sophos SafeGuard Disk Encryption for Mac Administrator help. Product version: 6.1"

Transcription

1 Sophos SafeGuard Disk Encryption for Mac Administrator help Product version: 6.1 Document date: February 2014

2 Contents 1 About SafeGuard Disk Encryption for Mac Installation Configuration Working with Disk Encryption for Mac Recovery Uninstallation from client Technical support Legal notices

3 Administrator help 1 About SafeGuard Disk Encryption for Mac Sophos SafeGuard Disk Encryption for Mac offers Mac OS X users the same data protection that the disk encryption feature of SafeGuard Enterprise already offers to Windows users. SafeGuard Disk Encryption for Mac builds on Mac OS X's integrated FileVault 2 encryption technology. It uses FileVault 2 to encrypt the entire hard disk, so that your data is safe even if the computer is lost or stolen. However, it also enables you to provide and manage disk encryption for entire networks. The encryption works transparently. The user will not see any prompts for encryption or decryption when opening, editing, and saving files. In SafeGuard Enterprise s Management Center, you can select which computers (Windows as well as Macs) to encrypt, monitor their encryption status, and provide recovery for users who forget their passwords. 1.1 About this document This document describes how to install, configure and administer Sophos SafeGuard Disk Encryption for Mac. For detailed information on SafeGuard Management Center operation and policy settings, refer to the SafeGuard Enterprise Administrator help. For user-relevant information refer to the Quick Startup Guide for Sophos SafeGuard Disk Encryption for Mac. 1.2 Terms and acronyms The following terms and acronyms are used in this document: Term or acronym GUID POA SGN SSL Meaning or explanation Globally Unique Identifier: a unique reference number used as an identifier in computer software. Power-On Authentication (synonym: "pre-boot authentication") SafeGuard Enterprise Secure Sockets Layer: a cryptographic protocol that provides communication security over the internet. 3

4 Sophos SafeGuard Disk Encryption for Mac 2 Installation The following chapter describes the installation of Sophos SafeGuard Disk Encryption on Mac OS X clients. For a description of how to install the administration environment (backend), refer to the SafeGuard Enterprise Installation guide. Two Mac OS X client installation types are possible: manual (attended) installation automated (unattended) installation The installer package is signed. In case of internet problems you may have a delay of up to 20 minutes during the installation procedure. 2.1 Installation prerequisites Before starting the installation, make sure the SGN-SSL server certificate has been imported into the system keychain and is set to Always Trust for SSL: 1. Ask your SafeGuard Server Administrator to provide you with the SGN server certificate for SSL (file <certificate name>.cer). 2. Import the <certificate name>.cer file into your keychain. To do so, go to Applications - Utilities and double-click the Keychain Access.app. 3. In the left pane select System. 4. Open a Finder window and select the <certificate name>.cer file from above. 5. Drag the certificate file and drop it into the System Keychain Access window. 6. You will be prompted to enter your Mac OS X password. 7. After entering the password click Modify Keychain to confirm your action. 8. Then double-click the <certificate name>.cer file. Click on the arrow left beside Trust and open the Trust Chain. 9. For Secure Sockets Layer (SSL) select the option Always Trust. 10. Close the dialog. You will be prompted again to enter your Mac OS X password. 11. Enter the password and confirm by clicking Update Settings. A blue plus symbol in the lower right corner of the certificate icon indicates that this certificate is marked as trusted for all users: 12. Open a web browser and check that your SafeGuard Enterprise Server is available using Now you can start with the installation. Note: 4

5 Administrator help Certificate import can also be done by running the command sudo /usr/bin/security add-trusted-cert -d -k /Library/Keychains/System.keychain -r trustasroot -p ssl "/folder/<certificate name>.cer". This can also be used for automated deployment via script. Change folder and certificate names according to your settings. Note: If you want to bypass the process described above, you can run the command sgdeadmin --disable-server-verify with sudo rights as described here: Command line options (section 4.9). We do not recommend this option as it may create a security vulnerability. 2.2 Manual (attended) installation A manual (or attended) installation allows you to control and test the installation while proceeding step by step. It is performed on a single Mac. Note: Make sure the server verification has been properly set up as described in Installation prerequisites (section 2.1). 1. Copy Sophos SafeGuard DE for OS X dmg to your desktop. 2. Double-click the file Sophos SafeGuard DE for OS X dmg to install the application. After reading through the readme file offered, click Sophos SafeGuard DE.pkg and follow the installation wizard. You will be prompted for your password to allow the installation of new software. 3. Click Close to complete the installation. 4. After a restart, logon with your Mac password. 5. Open the System Preferences and click the Sophos Encryption icon to start the application. 6. Click the Server tab. 7. If server and certificate details are shown, skip the next steps and go to Step 11 and click Synchronize. If no information is shown, continue with the next step. 8. Select the configuration zip file (For a description of how to create a configuration package for Macs see SafeGuard Enterprise Administration Help version 6.10, Working with configuration packages > Create configuration package for Macs). 9. Drag the zip file to the Server dialog and drop it into the drop zone. 10. You will be prompted to enter a Mac administrator password. Enter the password and click OK to confirm. 5

6 Sophos SafeGuard Disk Encryption for Mac 11. Check the connection to the SafeGuard Enterprise server: Company certificate details are shown in the lower part of the Server dialog. Then click Synchronize. A successful connection will result in an updated "Last Contacted" time stamp (Tab Server, Server Info area, Last Contacted:). An unsuccessful connection will display the following icon: Refer to the log file for further information. Refer to Server tab (section 4.7.2) for more information on synchronization and server connection. 2.3 Automated (unattended) installation via Remote Management Software An automated (unattended) installation does not require any user interaction during the installation process. This section describes the basic steps for an automated (unattended) installation of SafeGuard Disk Encryption for Mac. Use the management software installed on your system. Depending on the management solution you are using, the actual steps may vary. Note: To install SafeGuard Disk Encryption for Mac on client computers, perform the following steps: 1. Download the installer file Sophos SafeGuard DE for OS X dmg. 2. Copy the file to the target machines. 3. Install the file on the target machines. If you use Apple Remote Desktop, steps 2 and 3 are one single step. 4. Select the configuration zip file (For a description of how to create a configuration package for Macs see SafeGuard Enterprise Administration Help version 6.10, Working with configuration packages > Create configuration package for Macs) and copy it to the target machines. 5. Run the following command on the target machines: /usr/bin/sgdeadmin --import-config /full/path/to/file.zip Change /full/path/to/file according to your settings. This command needs to be run with administrator privileges. If you are using Apple Remote Desktop, then enter root in the field user name to specify which user issues the above stated command. 6

7 Administrator help 3 Configuration Sophos SafeGuard Disk Encryption for Mac OS X is administered in the SafeGuard Management Center. The following chapter focuses on the Mac-specific configuration. Any standard Management Center functionality is described in the most recent SafeGuard Enterprise Administrator help. Note: SafeGuard Disk Encryption for Mac only makes use of policies of the type "Device Protection" and ignores all policy settings except Target and Media encryption mode. 3.1 Centrally administered configuration options Policies are configured centrally in the SafeGuard Management Center. SafeGuard Disk Encryption for Mac only makes use of policies of the type "Device Protection" and ignores all policy settings except Target and Media encryption mode. In order to initiate full disk encryption the settings must be chosen as follows: 1. Create a new policy of type Device Protection. For Device protection target choose Local Storage Devices, Internal Storage or Boot Volumes. Type a name for the policy and click OK. 2. For Media encryption mode select Volume based. A new policy for device protection has been created and configured for full disk encryption for Macs. Note: Make sure that the policy is assigned to the clients that will be encrypted. If all of the endpoints are to be encrypted you might assign the policy to the top level of your domain or workgroup. If IT staff take care of the installation, do not assign the policy before the clients are given to the end-users. There is the risk that the endpoint is encrypted too early and IT staff are registered for FileVault 2 instead of the end-users. 3.2 Locally administered configuration options The following options are configured locally on the Mac client: Define synchronization interval This option allows you to set the intervals at which the client contacts the server to synchronize settings. Use the command sgdeadmin --contact-interval in order to set the interval to a specific time (in minutes). E.g. the command sgdeadmin --contact-interval 120 sets this interval to a time of 2 hours. Info: Default value is 90 minutes. Synchronize database information 7

8 Sophos SafeGuard Disk Encryption for Mac Use the command sgdeadmin --synchronize to start synchronizing database information from the SafeGuard Enterprise backend such as policies and keys. Enable or disable the system menu Use the command sgdeadmin --enable-systemmenu to activate the system menu in the upper right corner. Use the command sgdeadmin --disable-systemmenu to deactivate the system menu. Note: Default setting after installing SafeGuard Disk Encryption is "disabled", that is, the system menu is deactivated. For more information on the system menu, see Sophos SafeGuard Disk Encryption system menu (section 4.8). Refer to Command line options (section 4.9) for a complete overview of all command line options. 8

9 Administrator help 4 Working with Disk Encryption for Mac A separate Quick Startup Guide for Disk Encryption explains the user-relevant aspects of the application. You can find the latest version of the product documentation on our Documentation page at In the following sections you will find information on how to work with Disk Encryption for Mac from an administrator's perspective. 4.1 How does encryption work? FileVault 2 keeps all data on the hard drive secure with XTS-AES-128 data encryption at the disk level. The algorithm has been optimized for 512-byte blocks. The conversion from plaintext to ciphertext and back is performed on the fly with low impact on the user experience since it is given a lower priority. One traditional obstacle to usability with full disk encryption is that it was necessary for the end user to authenticate twice: once to unlock the encrypted boot volume (POA), and the second time to log on to the user desktop. However, this is no longer necessary. Users enter their password at the pre-boot logon and the system initiates password-forwarding when the operating system is up and requiring logon credentials. Password-forwarding eliminates the need for users to log on twice after a cold boot. Users are able to reset their passwords at any time without the need to re-encrypt the volume. The reason is that a multi-level key system is employed. The keys shown to the users (e.g. logon keys and recovery keys) are derived encryption keys and therefore can be replaced. The true volume encryption key will never be given to a user. For further information on FileVault 2 see Apple Technical White Paper - Best Practices for Deploying FileVault 2 (Aug. 2012), which can be downloaded from the Apple website. 4.2 Initial encryption If a volume based encryption of the system disk is specified in the policy, then disk encryption will be activated for the user currently logged on. On client side, perform the following tasks: 1. Before encryption starts, a dialog is shown to ask for the logon password. Enter the Mac OS X password. If the dialog is shaking, the password is incorrect. Try again. Note: If the password is empty, please change it. It is not possible to enable disk encryption without a password set. 9

10 Sophos SafeGuard Disk Encryption for Mac 2. Wait for the Mac to restart. Note: If activation of the encryption fails, an error message will be displayed. More information can be found in the log files. Unless you chose another location, you find them at /var/log/system.log 3. Disk encryption starts and is done in the background. The user can continue working. The user is added as first FileVault 2 user of the endpoint. 4.3 Decryption Usually it is not necessary to decrypt. If you set a policy that specifies No encryption for Mac clients that are already encrypted, they will remain encrypted. But in this case the users have the choice to decrypt. They will find the corresponding button in the preference pane, see Disk Encryption tab (section 4.7.4). Users with local administrator rights cannot be prevented from attempting to manually decrypt their hard disk using built-in FileVault 2 functionality. However, they will be prompted for a restart to complete the decryption. As soon as the Mac has completed the restart, SafeGuard Disk Encryption for Mac will enforce encryption if a corresponding policy has been set. 4.4 Add FileVault 2 user Only users that are already registered for FileVault 2 at the endpoint will be able to log on to the system after a restart. In order to add a user to FileVault 2 proceed as follows: 1. While the Mac is still running, log on with the user you want to register for FileVault Provide the credentials of that user in the dialog Enable Your Account. If you are using Mac OS X version 10.8, not only the user's own credentials are requested, but also those of a user already active in FileVault 2. With Mac OS X version 10.9 this is no longer necessary. Therefore, with the exception of Mac OS X version 10.8, users will be able to log on as easily as if there was no disk encryption enforced. 4.5 Remove FileVault 2 user A user can be removed from the list of users assigned to a Mac in the SafeGuard Management Center. After the next synchronization, the user will be removed from the FileVault 2 users of the endpoint as well. But this does not mean that the user will not be able to log on to that Mac anymore. Like any new user, the user just needs to log on to a running Mac in order to become authorized again. If you really want to prevent a user from booting a Mac, mark the user as blocked in Management Center. The user will then be removed from the FileVault 2 users of the client and no new authorization will be possible. 10

11 Administrator help Note: It is possible to remove all FileVault 2 users but the last one. Also the owner can be removed, then the next user in the list will be marked as owner. In SafeGuard Disk Encryption for Mac it does not make a difference if a user is owner or not. The last remaining FileVault 2 user cannot be removed. 4.6 Synchronization with backend In the process of synchronization, the states of the clients are reported to the SafeGuard Enterprise backend, policies are updated and the user-machine assignment is checked. Therefore, the following information is sent from the clients and appears in SafeGuard Management Center: As soon as an endpoint is encrypted, "POA" is checked. Other information that is displayed includes drive name, label, type, state, algorithm and operating system. New FileVault 2 users are added also in Management Center. Note: If the SafeGuard Enterprise client software is removed from an endpoint, the endpoint and its users are still visible in SafeGuard Management Center. But the timestamp of the last server contact does not change anymore. On client side the following things are changed: Policies that were changed in Management Center are changed on the client. Users that have been deleted or blocked in Management Center are also removed from the list of FileVault 2 users on the client. 4.7 Preference pane A preference pane allows you to set preferences for a specific application or the system. After installing Sophos Encryption on a Mac client, the following preference pane icon appears in the System Preferences: Click on the icon to open the Sophos Encryption preference pane. The About content is shown. The menu bar allows you to open the following menu information windows: About tab The About tab informs you about the product version installed on the client and about the copyright and registered trademark(s). If Sophos SafeGuard File Encryption is installed, it will also be listed. 11

12 Sophos SafeGuard Disk Encryption for Mac Click on the question mark symbol in the lower right corner to open the Sophos SafeGuard Disk Encryption Quick startup guide in the system's language Server tab Click on Server to display a window containing the following information and functionality: Server Info Contact interval: shows the interval at which synchronization with the server is started. See also Locally administered configuration options (section 3.2) for information on how to set this interval. Preset default value is 90 minutes. Last Contacted: shows the date when a client last communicated with the server Primary Server URL: URL of the main server connection Secondary Server URL: URL of the secondary server connection Server Verification: shows whether SSL server verification for communication with the SafeGuard Enterprise server is enabled or disabled. Refer to Command line options (section 4.9) (command sgdeadmin --enable-server-verify or sgdeadmin --disable-server-verify) for a description of how to modify this option. Drag configuration zip file here Drag the configuration zip file to this drop zone in order to apply configuration information from the Management Center to the Mac client. See also Manual (attended) installation (section 2.2). Synchronize Click this button to start manually synchronizing database information such as policies. This might be required after having performed modifications in the SafeGuard Management Center. If the synchronization fails, the following icon will appear: Open the log file to retrieve information about possible causes. You can modify the automatic synchronization contact interval by modifying the corresponding parameter. See also Locally administered configuration options (section 3.2). Company Certificate Valid from: the date the certificate has become valid Valid to: the date the certificate validity expires Issuer: the instance which has issued the certificate Serial: the serial number of the company certificate 12

13 Administrator help User tab Click on User to display information about: The Username of the user currently logged on. The Domain, listing the domain directory the client belongs to. For local users the local computer name is displayed. Note: The entry Domain must be identical to the entry in System Preferences - Users & Groups - Login Options - Network Account Server The SafeGuard User GUID, displaying the GUID which has been generated for the user following their first logon. In the second window section you can check/uncheck the following option: Show System Menu for Disk Encryption: when activated, the Sophos SafeGuard Disk Encryption icon appears in the menu bar. See also Sophos SafeGuard Disk Encryption system menu (section 4.8). The third window section displays information about the User Certificate (it is not necessary for disk encryption): Valid from: the date the certificate has become valid Valid to: the date the certificate validity expires Issuer: the instance which has issued the certificate Serial: the serial number of the certificate Disk Encryption tab Click on Disk Encryption to display information about the current policies and the status of the Mac client. The first window section tells you whether the system disk should be encrypted according to the policy set by the security officer. The second window section displays the status of the Mac client. This can be one of the following: The system disk is encrypted and a centrally stored recovery key is available. The system disk is encrypted but there is no centrally stored recovery key available. The system disk is not encrypted. At the bottom a button Decrypt System Disk is displayed. It will be enabled if FileVault 2 is enabled, the current user is active in FileVault 2 and the security officer has set a policy defining that no encryption is necessary for the client. 13

14 Sophos SafeGuard Disk Encryption for Mac Note: If there is no centrally stored recovery key available, the helpdesk cannot assist with password recovery. Therefore, the recovery key should be imported using the command line tool: sgdeadmin --import-recoverykey. If the recovery key is unknown by the user as well as by the security officer, decryption and subsequent encryption of the disk will be necessary in order to create a new recovery key. 4.8 Sophos SafeGuard Disk Encryption system menu The system menu provides the following information: The icon (on the left) shows the encryption status: Figure 1: System menu Green icon: The system disk is encrypted. Red icon: The system disk is not encrypted. The following menu item is available when you click on the icon: Open Sophos Encryption Preferences... Opens the Sophos Encryption Preference Pane. Note: In order to enable or disable the system menu see User tab (section 4.7.3). 4.9 Command line options The Terminal application allows you to enter commands and command line options. The following command line options are available: Command name sgdeadmin Definition lists available commands including short help hints Additional parameters/supplements (optional) possible supplement --help 14

15 Administrator help Command name sgdeadmin --version sgdeadmin --status sgdeadmin --list-user-details sgdeadmin --list-policies sgdeadmin --synchronize sgdeadmin --import-recoverykey sgdeadmin --import-config "/path/to/target/file" Definition displays version and copyright information of the installed product returns system status information such as version, server and certificate information. returns information of the user currently logged on displays policy-specific information. Key GUIDs are resolved to key names if possible. Bold print indicates a personal key. forces an immediate server contact (needs working server connection). imports the FileVault 2 recovery key, overwrites existing recovery key imports the specified configuration zip file. See also Manual (attended) installation (section 2.2). The command needs administrative rights (sudo). Note: Use the drag and drop functionality to drag a complete path from, for example, the Finder into the Terminal application. Additional parameters/supplements (optional) --all displays information for all users (sudo required) --xml returns output in xml format. --all displays information for all users (sudo required) --xml returns output in xml format --force existing recovery key will be overwritten without any additional confirmation "recoverykey" if it is not entered, user will be asked for it 15

16 Sophos SafeGuard Disk Encryption for Mac Command name sgdeadmin --enable-server-verify sgdeadmin --disable-server-verify Definition turns on SSL server verification for communication with the SafeGuard Enterprise server. After installation, the SSL server verification is activated. The command needs administrative rights (sudo). turns off SSL server verification for communication with the SafeGuard Enterprise server. The command needs administrative rights (sudo). Note: We do not recommend this option as it may create a security vulnerability. Additional parameters/supplements (optional) The following commands are explained in detail in section Locally administered configuration options (section 3.2): sgdeadmin --enable-systemmenu sgdeadmin --disable-systemmenu sgdeadmin --contact-interval sgdeadmin --synchronize 16

17 Administrator help 5 Recovery Recovery provides a way of accessing an encrypted volume by means of a centrally stored recovery key. This is necessary because a user might forget the Mac OS X logon password and there might be no other credentials available. 5.1 Recovery key handling If all FileVault-enabled users on a particular system forget their passwords, credentials are not available and there is no recovery key available, then the encrypted volume cannot be unlocked and the data is unaccessible. Data may be lost permanently, so proper recovery planning is essential. A new recovery key is generated during each activation of disk encryption. Without Sophos SafeGuard Disk Encryption being installed at the time of the encryption, it is displayed to the user who consequently is responsible for its protection against loss. With Sophos SafeGuard Disk Encryption, it is securely sent to the SafeGuard Enterprise backend and stored centrally. The security officer can retrieve it whenever needed. See Forgotten Mac OS X logon password (section 5.2) for more information about the recovery process. But even if SafeGuard Disk Encryption was not installed when the disk was encrypted, the recovery key can be managed centrally. Therefore it is necessary to import it. The relevant command line option is sgdeadmin --import-recoverykey, see also Command line options (section 4.9). Any input within the recovery key will be sent in upper case. Note: Mac OS X 10.8: the recovery key will not be checked, it is the responsibility of the user to enter it correctly. An error will be displayed only if the format is invalid. Mac OS X 10.9: the recovery key will be checked if valid or not. In order to check whether a recovery key is present for a client, see Disk Encryption tab (section 4.7.4). If there is an institutional recovery key present, it can be used for recovery as well. For more information see OS X: How to create and deploy a recovery key for FileVault 2 at support.apple.com/kb/ht Forgotten Mac OS X logon password If a user forgets the Mac OS X logon password and there are no other credentials available, proceed as follows: 1. The user switches on the Mac. 17

18 Sophos SafeGuard Disk Encryption for Mac 2. The user clicks on? in the logon dialog. Alternatively, the user can enter a wrong logon password three times. The password hint is displayed and the user is asked if he or she wants to reset the password using the recovery key. 3. The user clicks on the triangle next to the message in order to get to the next step (to enter the recovery key): 4. In SafeGuard Management Center open the recovery wizard by selecting Tools > Recovery and display the recovery key for the specific machine. 5. Tell the user the recovery key to be entered at the Mac. The Mac starts and the user can enter a new password and a password hint. Mac OS X 10.9 only: The recovery key is replaced as soon as it has been used once to start the system. The new recovery key is generated automatically and sent to the SafeGuard Enterprise backend where it is stored to be available for the next recovery. Note: Be careful to whom you give a recovery key of an endpoint! As a recovery key is always machine specific and not user specific, it might also be necessary to check that the recovery key is not used to get unauthorized access to another user's sensitive data on the same machine. 18

19 Administrator help 6 Uninstallation from client If you need to uninstall the software from a client computer, proceed as follows: 1. On the Mac client go to /Library. 2. Select the folder /Sophos SafeGuard DE. 3. Select and double-click the file Sophos SafeGuard DE Uninstaller.pkg 4. A wizard guides you through uninstallation. Note: It is not necessary to decrypt the disk before uninstalling the software. Note: A user with administrative rights cannot be prevented from uninstalling the software. (A policy that prevents this on Windows clients has no effect on Mac clients.) Note: The uninstaller package is signed. In case of internet problems you may have a delay of up to 20 minutes during the uninstallation procedure. 19

20 Sophos SafeGuard Disk Encryption for Mac 7 Technical support You can find technical support for Sophos products in any of these ways: Visit the SophosTalk community at community.sophos.com/ and search for other users who are experiencing the same problem. Visit the Sophos support knowledgebase at Download the product documentation at Send an to including your Sophos software version number(s), operating system(s) and patch level(s), and the text of any error messages. 20

21 Administrator help 8 Legal notices Copyright 2014 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise unless you are either a valid licensee where the documentation can be reproduced in accordance with the license terms or you otherwise have the prior permission in writing of the copyright owner. Sophos, Sophos Anti-Virus and SafeGuard are registered trademarks of Sophos Limited, Sophos Group and Utimaco Safeware AG, as applicable. All other product and company names mentioned are trademarks or registered trademarks of their respective owners. Disclaimer and Copyright for 3rd Party Software This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit ( AES-NI This software uses code from the Intel_aes_lib. The following is applicable to Intel_aes_lib: /* intel_aes_lib source files come from Intel. * Modified by Patrick Fay * Copyright (c) 2010, Intel Corporation All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. Neither the name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21

22 Sophos SafeGuard Disk Encryption for Mac DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Issue Date: Aug 6, 2010 */ DISCLAIMER [The AES-NI library] software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose. Gladman AES Copyright (c) , Brian Gladman, Worcester, UK. All rights reserved. LICENSE TERMS The free distribution and use of this software is allowed (with or without changes) provided that: 1. source code distributions include the above copyright notice, this list of conditions and the following disclaimer; 2. binary distributions include the above copyright notice, this list of conditions and the following disclaimer in their documentation; 3. the name of the copyright holder is not used to endorse products built using this software without specific written permission. DISCLAIMER This software is provided 'as is' with no explicit or implied warranties in respect of its properties, including, but not limited to, correctness and/or fitness for purpose. Zlib, Part of FreeType zlib.h -- interface of the 'zlib' general purpose compression library version 1.1.4, March 11th, 2002 Copyright (C) Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required.2. Altered source versions must be plainly 22

23 Administrator help marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly Mark Adler The data format used by the zlib library is described by RFCs (Request for Comments) 1950 to 1952 in the files ftp://ds.internic.net/rfc/rfc1950.txt (zlib format), rfc1951.txt (deflate format) and rfc1952.txt (gzip format). PCF, Part of FreeType Copyright (C) 2000 by Francesco Zappa Nardelli Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. GptLib Copyright (c) 2002 Marcel Moolenaar All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR 23

24 Sophos SafeGuard Disk Encryption for Mac PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. gsoap Rationale This license agreement for commercial use of the gsoap software standard edition in open source form shall replace the gsoap public license and GPL license for Customer's use of the Software, thereby permanently replacing the terms and conditions imposed by the gsoap public license and GPL license, as set forth in this Agreement. This license covers the entire gsoap source distribution, including, but not limited to, the runtime library, compiler, WSDL importer, example applications, and documentation. THIS LICENSE AGREEMENT ("Agreement") is made and entered into as of the last date executed by the parties below (the "Effective Date") by and between GENIVIA, INC., a Florida corporation having a principal place of business at 3178 Shamrock East, Tallahassee, Florida 32309, USA, ("Genivia"), and Sophos Limited and its subsidiaries and affiliates, a company in accordance with the laws of England and Wales having a principal place of business at The Pentagon, Abingdon, OX14 3YP, United Kingdom ("Customer"). The parties agree as follows: 1. DEFINITIONS. "Original Code" means Source Code of computer software code which is described in the Source Code notice required by Exhibit A as Original Code. "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. When Covered Code is released as a series of files, a Modification is: (i) any addition to or deletion from the contents of a file containing Original Code or previous Modifications; (ii) any new file that contains any part of the Original Code, or previous Modifications. "Covered Code" means the Original Code, or Modifications or the combination of the Original Code, and Modifications, in each case including portions thereof. "Software" means the Covered Code and accompanying documentation and support files referenced in section 1 of Exhibit A, including Updates (if any). "Updates" means any patches, bug fixes, upgrades, and new versions of the Software made generally available by Genivia during the term of this Agreement. "Source Code" means computer programming code in human readable form that is not suitable for machine execution without the intervening steps of interpretation or compilation, meaning the preferred form of the Covered Code for making modifications to it, including all modules it contains, plus any associated interface definition files, scripts used to control compilation and installation of an Executable Object Code, or source code differential comparisons against the Original Code. The Source Code can be in a compressed or archival form, provided the appropriate decompression or de-archiving software is widely available for no charge. 24

25 Administrator help GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 2 of 8 "Executable Object Code" means the computer programming code in any other form than Source Code that is not readily perceivable by humans and suitable for machine execution without the intervening steps of interpretation or compilation. "Authorized Site" means the specific address of Customer s facility consisting of a single building or multiple buildings on a contiguous campus as specified in Exhibit A. "Project" means a concerted undertaking by an identified Customer development team to design or produce a Target Application. "Run-Time Module" means the Software in Source Code form or as Executable Object Code to be incorporated into a Target Application as inseparably embedded code or statically linked to a Target Application. "Target Application" means an end-user item, such as a software product that is possibly replicated in identical form and offered for sale or licensed to third parties, or a device or system developed by Customer pursuant to a Project that contains a Run-Time Module, or any portion thereof, as specified in Exhibit A and any Updates made during the term of this Agreement. 2. SOURCE CODE LICENSE. Subject to Customer s compliance with the terms and conditions of this Agreement and payment of any applicable fees, Genivia hereby grants to Customer a non-transferable, nonexclusive, worldwide, perpetual, royalty-free, paid-up license: (i) to reproduce and use the Software solely at the Authorized Sites in connection with the Project; (ii) to make backup copies at the Authorized Sites for the purpose of this Agreement; (iii) to store the Software in a source code repository; (iv) to create Modifications and other derivative works of the Software, solely to the extent necessary to support the development of the Target Application; (v) to compile the Software, including any Modifications and derivative works thereof, into Run-Time Modules; (vi) to reproduce an unlimited number of Run-Time Modules for physical incorporation into the Target Application; and (vii) to market, sell, offer to sell, and distribute the Target Application. 3. RESTRICTIONS. Customer shall reproduce and include any and all copyright notices and proprietary rights legends, as such notices and legends appear in the original Software, on any copy of the Software, or portion thereof, with the exception of the gsoap public license and GPL license notices. The Software shall be handled, used and stored, solely at the Authorized Site identified in Exhibit A. The Software may be used from a single machine, a set of machines, or a network file server, but there shall be no access to the Software from any external network not located at the Authorized Sites. GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 3 of 8 A function of the Software is to create Run-Time Modules for incorporation into Target Applications. Except as set forth in Section 2 above, no license is granted hereunder to reproduce or distribute the gsoap soapcpp2 compiler and wsdl2h importer as part of such Target Application. 25

26 Sophos SafeGuard Disk Encryption for Mac 4. OWNERSHIP. Genivia represents and warrants to Customer that Genivia has all rights in the Software necessary to grant the rights and license granted to Customer in this Agreement. Without limiting the foregoing, Genivia represents and warrants that Genivia has acquired an assignment of all intellectual property rights in and to all portions of the Software delivered to Customer under this Agreement. Customer shall not have any obligation to provide, assign, or disclose to Genivia or any other party any Modifications. Notwithstanding the foregoing, Genivia and its licensors shall retain exclusive ownership of all worldwide Intellectual Property Rights in and to the Software. Customer acknowledges that this Agreement does not grant to Customer any Intellectual Property Rights in or to the Software other than the limited rights with respect to the Software as set forth in Section DELIVERY AND PAYMENT. Immediately following the Effective Date, Genivia grants Customer the right to download the Software from the Approved Software Download Site specified in Exhibit A, and install the Software at the Authorized Site and use the Software as set forth in Section 2 subject to the restrictions listed in Section 3. Notwithstanding any terms or other agreements posted on the Approved Software Download Site, this Agreement shall be the sole and exclusive agreement governing Customer's use of the Software. Customer shall pay to Genivia the Software license fee set forth in Exhibit A. License fees will be invoiced with shipment of this License Agreement. Payment of all amounts invoiced shall be due forty-five (45) days after receipt of the invoice. All payments and amounts shall be paid without deduction, set-off or counter claim, free and clear of any restrictions or conditions, and without deduction for any taxes, levies, imposts, duties, fees, deductions, withholdings or other governmental charges. If any deduction is required to be made by law, Customer shall pay in the manner and at the same time such additional amounts as will result in receipt by Genivia of such amount as would have been received by Genivia had no such amount been required to be deducted. If Customer is claiming sales or use tax exemption, a certified Tax Exempt Certificate must be attached to this Agreement or applicable purchase order submitted by Customer. 6. TERM AND TERMINATION. GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 4 of 8 This Agreement shall commence upon the Effective Date and is granted in perpetuity, but may be terminated without notice in the following circumstances: if Customer breaches any term of this agreement, unless such breach is curable and is cured by Customer within thirty (30) days after notice of such breach is provided by Genivia; if Customer, being a firm or partnership, is dissolved; or, by Customer, if Customer destroys the Software for any reason. Upon termination, Customer shall destroy any remaining copies of the Software or otherwise return or dispose of 26

27 Administrator help such material. Termination pursuant to this clause shall not affect any rights or remedies, which Genivia may have otherwise under this license or at law. The following Sections shall survive any termination of this Agreement: Sections 1, 4, 6, 8, and 10. Termination of this Agreement, if any, shall not affect any licenses or other grants of any rights, titles, or interests of Customer in or to any Run-Time Modules or the Target Application. 7. LIMITED WARRANTY. Genivia warrants that the Software, installation scripts, and future Updates will be provided to Customer. Customer assumes full responsibility for: (i) the selection, download, and installation of the Software from the Approved Software Download Site specified in Exhibit A; (ii) the proper use of the Software; (iii) verifying the results obtained from the use of the Software; and (iv) taking appropriate measures to prevent loss of data. Genivia does not warrant that the operation of the Software will meet Customer s requirements or that Customer will be able to achieve any particular results from use or modification of the Software or that the Software will operate free from error. EXCEPT AS EXPRESSLY SET FORTH IN SECTIONS 7 AND 8 OF THIS AGREEMENT, GENIVIA AND ITS LICENSORS DISCLAIM ALL WARRANTIES, WHETHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT OF THIRD PARTY INTELLECTUAL PROPERTY RIGHTS, AND ANY WARRANTY THAT MAY ARISE BY REASON OF TRADE USAGE, CUSTOM, OR COURSE OF DEALING.WITHOUT LIMITING THE FOREGOING, CUSTOMER ACKNOWLEDGES THAT THE SOFTWARE IS PROVIDED "AS IS" AND THAT GENIVIA DOES NOT WARRANT THE SOFTWARE WILL RUN UNINTERRUPTED OR ERROR FREE. THE ENTIRE RISK AS TO RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY CUSTOMER. UNDER NO CIRCUMSTANCES WILL GENIVIA BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES OF ANY KIND OR NATURE WHATSOEVER, WHETHER BASED ON CONTRACT, WARRANTY, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR OTHERWISE, ARISING OUT OF OR IN ANY WAY RELATED TO THE SOFTWARE, EVEN IF GENIVIA HAS BEEN ADVISED ON THE POSSIBILITY OF SUCH DAMAGE OR IF SUCH DAMAGE COULD HAVE BEEN REASONABLY FORESEEN, AND NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY EXCLUSIVE REMEDY PROVIDED. SUCH LIMITATION ON DAMAGES INCLUDES, BUT IS NOT LIMITED TO, DAMAGES FOR LOSS OF GOODWILL, LOST PROFITS, LOSS OF DATA OR SOFTWARE, WORK STOPPAGE, COMPUTER FAILURE OR MALFUNCTION OR IMPAIRMENT OF OTHER GOODS. IN NO EVENT WILL GENIVIA BE LIABLE FOR THE COSTS OF PROCUREMENT OF SUBSTITUTE SOFTWARE OR GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 5 of 8 SERVICES. CUSTOMER ACKNOWLEDGE THAT THIS SOFTWARE IS NOT DESIGNED FOR USE IN ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS SUCH AS OPERATION OF NUCLEAR FACILITIES, AIRCRAFT NAVIGATION OR CONTROL, OR LIFECRITICAL APPLICATIONS. GENIVIA EXPRESSLY DISCLAIM ANY LIABILITY RESULTING FROM USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN HAZARDOUS ENVIRONMENTS AND ACCEPTS NO LIABILITY IN RESPECT OF ANY ACTIONS OR CLAIMS BASED ON THE USE OF THE SOFTWARE IN ANY SUCH ON-LINE EQUIPMENT IN 27

28 Sophos SafeGuard Disk Encryption for Mac HAZARDOUS ENVIRONMENTS BY CUSTOMER. FOR PURPOSES OF THIS PARAGRAPH, THE TERM "LIFE-CRITICAL APPLICATION" MEANS AN APPLICATION IN WHICH THE FUNCTIONING OR MALFUNCTIONING OF THE SOFTWARE MAY RESULT DIRECTLY OR INDIRECTLY IN PHYSICAL INJURY OR LOSS OF HUMAN LIFE. THIS DISCLAIMER OF WARRANTY CONSTITUTES AN ESSENTIAL PART OF THIS LICENSE. NO USE OF ANY COVERED CODE IS AUTHORIZED HEREUNDER EXCEPT UNDER THIS DISCLAIMER. 8. INFRINGEMENT INDEMNITY. Genivia will defend at its expense any suit brought against Customer and will pay all damages finally awarded in such suit insofar as such suit is based on a claim that the Software as provided to Customer infringes a previously issued patent, trademark, trade secret or copyright, provided that Genivia is notified promptly of such claim and is given full and complete authority (including settlement authority consistent with the other terms and conditions of this Agreement), information and assistance by Customer for such defense. In the event that the Software is held in any such suit to infringe such a right and its use is enjoined, or if in the opinion of Genivia the Software is likely to become the subject of such a claim, Genivia at its own election and expense will either (i) procure for Customer the right to continue using the Software or (ii) modify or replace the Software so that it becomes noninfringing while giving substantially equivalent performance. In the event that (i) or (ii) above are not, in Genivia s sole determination, obtainable using reasonable commercial efforts, then Genivia may terminate this Agreement and refund amount Customer paid Genivia under this Agreement for the Software which is the subject of such claim. The indemnification obligation shall not apply to infringement actions or claims to the extent that such actions or claims are caused solely by: (i) modifications made to the Software by a party other than Genivia; and (ii) the combination of the Software with items not supplied by Genivia or which Genivia has specifically not approved for combination with the Software. 9. GENERAL. Neither party shall be liable hereunder by reason of any failure or delay in the performance of its obligations hereunder (except for the payment of money) on account of strikes, shortages, riots, insurrection, fires, flood, storm, explosions, acts of God, war, governmental action, labor conditions, earthquakes, material shortages or any other cause which is beyond the reasonable control of such party. GENIVIA INC. STANDARD EDITION LICENSE AGREEMENT FOR COMMERCIAL USE 6 of 8 The Software is a "commercial item" as that term is defined at 48 C.F.R , consisting of "commercial computer software" and "commercial computer software documentation" as such terms are used in 48 C.F.R Consistent with 48 C.F.R and 48 C.F.R through , Customer will provide the Software to U.S. Government End Users only pursuant to the terms and conditions therein. Customer may not delegate, assign or transfer this Agreement, the license(s) granted or any of Customer s rights or duties hereunder without Genivia's express prior written consent, except by 28

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3

More information

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7

Sophos SafeGuard Native Device Encryption for Mac quick startup guide. Product version: 7 Sophos SafeGuard Native Device Encryption for Mac quick startup guide Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 2 Working with SafeGuard

More information

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 6.1

Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 6.1 Sophos SafeGuard File Encryption for Mac Quick startup guide Product version: 6.1 Document date: January 2014 Contents 1 About SafeGuard File Encryption for Mac...3 2 First use...4 3 Working with SafeGuard

More information

Sophos SafeGuard Disk Encryption for Mac Startup guide

Sophos SafeGuard Disk Encryption for Mac Startup guide Startup guide Document date: January 2011 Content 1 Before you begin... 2 2 Protecting Mac OS X computers... 3 3 Technical support... 4 4 Copyright... 5 1 1 Before you begin 1.1 System requirements Hardware

More information

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.

Enterprise Manager to Enterprise Console upgrade guide. Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7. Enterprise Manager to Enterprise Console upgrade guide Sophos Enterprise Manager version 4.7 Sophos Enterprise Console version 4.7.1 Document date: July 2011 Contents 1 About this guide...3 2 What are

More information

RSA Two Factor Authentication

RSA Two Factor Authentication RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

RSA Two Factor Authentication. Feature Description

RSA Two Factor Authentication. Feature Description RSA Two Factor Authentication Feature Description VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide

Hyper V Windows 2012 and 8. Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8. Installation Guide Virtual LoadMaster for Microsoft Hyper V on Windows Server 2012, 2012 R2 and Windows 8 Installation Guide VERSION: 3.0 UPDATED: SEPTEMBER 2015 Copyright Notices Copyright 2002 2015 KEMP Technologies, Inc..

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

PointCentral Subscription Agreement v.9.2

PointCentral Subscription Agreement v.9.2 PointCentral Subscription Agreement v.9.2 READ THIS SUBSCRIPTION AGREEMENT ( AGREEMENT ) CAREFULLY BEFORE INSTALLING THIS SOFTWARE. THIS AGREEMENT, BETWEEN CALYX TECHNOLOGY, INC., DBA CALYX SOFTWARE (

More information

1. IMPORTANT NOTICE 2. LICENSE OF SOFTWARE PROGRAMS. 2.1. License Grant

1. IMPORTANT NOTICE 2. LICENSE OF SOFTWARE PROGRAMS. 2.1. License Grant RAPID FOCUS SECURITY, INC. DBA PWNIE EXPRESS END USER LICENSE AGREEMENT FOR ENTERPRISE PENTESTING APPLIANCE (EPA), PWN PLUG, PWN PLUG WIRELESS, PWN PLUG 3G, PWN PLUG ELITE, PWN PHONE, PWN PAD, PWN PLUG

More information

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT

CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT CITRIX SYSTEMS, INC. SOFTWARE LICENSE AGREEMENT PLEASE READ THIS SOFTWARE LICENSE AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING OR USING CITRIX OR CITRIX-SUPPLIED SOFTWARE. BY DOWNLOADING OR INSTALLING

More information

Microsoft SharePoint

Microsoft SharePoint Microsoft SharePoint VERSION: 1.1 UPDATED: JULY 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 13 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc.. All rights

More information

SafeGuard Easy upgrade guide. Product version: 7

SafeGuard Easy upgrade guide. Product version: 7 SafeGuard Easy upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1 Upgrade

More information

Sophos Enterprise Console quick startup guide. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console quick startup guide. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console quick startup guide Product version: 5.1 Document date: June 2012 Contents 1 About this guide...3 2 What do I install?...3 3 What are the key steps?...3 4 Check the system requirements...4

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

HIGHSEC eid App Administration User Manual

HIGHSEC eid App Administration User Manual HIGHSEC eid App Administration User Manual Contents 1 Introduction... 3 2 Application overview... 3 3 Managing HIGHSEC eid App... 3 3.1 Deleting card pairings... 4 4 Inspecting smart card contents... 5

More information

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012

Sophos Disk Encryption License migration guide. Product version: 5.61 Document date: June 2012 Sophos Disk Encryption License migration guide Product version: 5.61 Document date: June 2012 Contents 1 About this guide...3 2 Add encryption to an existing Sophos security solution...5 3 SDE/SGE 4.x

More information

Realex Payments Gateway Extension with 3D Secure for Magento. User Guide to Installation and Configuration. StudioForty9 www.studioforty9.

Realex Payments Gateway Extension with 3D Secure for Magento. User Guide to Installation and Configuration. StudioForty9 www.studioforty9. Realex Payments Gateway Extension with 3D Secure for Magento User Guide to Installation and Configuration StudioForty9 www.studioforty9.com User Guide: Table of Contents 3 How to Install the Realex Module

More information

SafeGuard Enterprise upgrade guide. Product version: 7

SafeGuard Enterprise upgrade guide. Product version: 7 SafeGuard Enterprise upgrade guide Product version: 7 Document date: December 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6 4.1

More information

TOPS Internet Backup Service User Guide

TOPS Internet Backup Service User Guide TOPS Internet Backup Service User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 09 2006 TOPS IBF AA 3.2.1 The

More information

HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT

HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT HYBRID SOLUTIONS INDEPENDENT SOFTWARE VENDOR AGREEMENT THE VERTEXFX TRADER API (THE SOFTWARE ) AND THE ACCOMPANYING DOCUMENTATION (THE RELATED MATERIALS ) (COLLECTIVELY, THE PRODUCT ) ARE PROTECTED BY

More information

Affiliate means a legal entity that is owned by or under common ownership with Stratus Technologies Ireland Limited.

Affiliate means a legal entity that is owned by or under common ownership with Stratus Technologies Ireland Limited. STRATUS TECHNOLOGIES IRELAND LIMITED ( STRATUS ) END-USER LICENSE AGREEMENT AND SOFTWARE SUPPORT TERMS AND CONDITIONS FOR STRATUS everrun SOFTWARE PRODUCTS Please read this end user license agreement ("EULA")

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description

System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description System Center Virtual Machine Manager 2012 R2 Plug-In Feature Description VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002)

SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002) SOFTWARE LICENSE AGREEMENT (Web Version October 18, 2002) Whenever LICENSEE licenses software products ( Program(s) as further defined herein), a License Form shall be executed which shall refer to this

More information

Boost Libraries Boost Software License Version 1.0

Boost Libraries Boost Software License Version 1.0 Citrix AppDNA Listing of Open Source Components The following is a listing of open source licensed software which may accompany AppDNA. Each of the components listed below may be redistributed under the

More information

Port Following. Port Following. Feature Description

Port Following. Port Following. Feature Description Feature Description VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo are registered

More information

Virtual LoadMaster for Microsoft Hyper-V

Virtual LoadMaster for Microsoft Hyper-V Virtual LoadMaster for Microsoft Hyper-V on Windows Server 2012, 2012 R2 and Windows 8 VERSION: 1.3 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 20 Copyright

More information

EXHIBIT A SOFTWARE LICENSE TERMS AND CONDITIONS

EXHIBIT A SOFTWARE LICENSE TERMS AND CONDITIONS EXHIBIT A SOFTWARE LICENSE TERMS AND CONDITIONS These Software License Terms and Conditions ( Terms and Conditions ) govern the grant of a software license by ( Licensor ), a component of the University

More information

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011

End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 End User License Agreement South Jersey CrashPlan: Managed Backup Solutions Last Updated 4/14/2011 We appreciate your selection of South Jersey CrashPlan, the premier online/offsite backup service offered

More information

MDM Zinc 3.0 End User License Agreement (EULA)

MDM Zinc 3.0 End User License Agreement (EULA) MDM Zinc 3.0 End User License Agreement (EULA) THIS AGREEMENT (or "EULA") IS A LEGAL AGREEMENT BETWEEN THE PERSON, COMPANY, OR ORGANIZATION THAT HAS LICENSED THIS SOFTWARE ("YOU" OR "CUSTOMER") AND MULTIDMEDIA

More information

Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20

Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20 Open Source Used In Cisco D9865 Satellite Receiver Software Version 2.20 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed

More information

C-DAC Medical Informatics Software Development Kit End User License Agreement

C-DAC Medical Informatics Software Development Kit End User License Agreement C-DAC Medical Informatics Software Development Kit End User License Agreement BY DOWNLOADING AND INSTALLING, COPYING OR OTHERWISE USING THE CENTRE FOR DEVELOPMENT OF ADVANCED COMPUTING ( C-DAC ) MEDICAL

More information

SafeGuard Enterprise upgrade guide. Product version: 6.1

SafeGuard Enterprise upgrade guide. Product version: 6.1 SafeGuard Enterprise upgrade guide Product version: 6.1 Document date: February 2014 Contents 1 About this guide...3 2 Check the system requirements...4 3 Download installers...5 4 About upgrading...6

More information

FME SOFTWARE LICENSE AGREEMENT

FME SOFTWARE LICENSE AGREEMENT FME SOFTWARE LICENSE AGREEMENT IMPORTANT READ CAREFULLY: This FME Software License Agreement ("Agreement") is a legal agreement between You (either an individual or a single legal entity) and Safe Software

More information

Statement of Work. for. Online Event Registration Product Deployment for Salesforce Implementation. for. Open Web Application Security Project (OWASP)

Statement of Work. for. Online Event Registration Product Deployment for Salesforce Implementation. for. Open Web Application Security Project (OWASP) Statement of Work for Online Event Registration Product Deployment for Salesforce Implementation for Open Web Application Security Project (OWASP) July 9, 2010 TABLE OF CONTENTS INTRODUCTION... 3 SCOPE...

More information

Evoqua Water Technologies LLC. ( Evoqua )

Evoqua Water Technologies LLC. ( Evoqua ) Evoqua Water Technologies LLC. ( Evoqua ) Remote Monitoring Services Terms and Conditions of Use These terms and conditions govern the use of Evoqua Link2Site sm Remote Monitoring Services whether the

More information

Sophos Anti-Virus for Linux startup guide. Product version: 9

Sophos Anti-Virus for Linux startup guide. Product version: 9 Sophos Anti-Virus for Linux startup guide Product version: 9 Document date: December 2013 Contents 1 About this guide...3 2 System requirements...3 3 About Sophos Anti-Virus for Linux...3 4 Installing

More information

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement

Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement Pervasive Software Inc. Pervasive PSQL v11 Insurance License Agreement IMPORTANT: DO NOT INSTALL THE ENCLOSED OR DOWNLOADED SOFTWARE UNTIL YOU HAVE READ THIS PERVASIVE PSQL LICENSE AGREEMENT ( AGREEMENT

More information

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE.

WE RECOMMEND THAT YOU PRINT OUT AND KEEP A COPY OF THIS AGREEMENT FOR YOUR FUTURE REFERENCE. RAPID CONNECT SERVICES(sm) and SPECIFICATION LICENSE AGREEMENT THIS RAPID CONNECT SERVICES AND SPECIFICATION LICENSE AGREEMENT IS BETWEEN FIRST DATA MERCHANT SERVICES CORPORATION ( FDMS ) FDMS AND YOU,

More information

PWNIE EXPRESS TERMS AND CONDITIONS AND END USER LICENSE AGREEMENT PWN PULSE SOFTWARE AND SENSOR HARDWARE AS A SERVICE

PWNIE EXPRESS TERMS AND CONDITIONS AND END USER LICENSE AGREEMENT PWN PULSE SOFTWARE AND SENSOR HARDWARE AS A SERVICE PWNIE EXPRESS TERMS AND CONDITIONS AND END USER LICENSE AGREEMENT PWN PULSE SOFTWARE AND SENSOR HARDWARE AS A SERVICE Pwnie Express and the end user customer or licensee (the Licensee ) agree that the

More information

End-User Software License Agreement

End-User Software License Agreement End-User Software License Agreement This End-User Software License Agreement (the Agreement ) is a license agreement between you (the Licensee ) and IMSWorkX, Inc. ( IMSWorkX ), a Delaware corporation

More information

Rhea Help Desk Software End User License Agreement

Rhea Help Desk Software End User License Agreement Rhea Help Desk Software End User License Agreement THIS "END USER LICENSE AGREEMENT" (THE "EULA") IS A LEGAL AGREEMENT BETWEEN THE INDIVIDUAL OR LEGAL ENTITY OR ASSOCIATION INTENDING TO USE THE SOFTWARE

More information

BES10 Self-Service. Version: 10.2. User Guide

BES10 Self-Service. Version: 10.2. User Guide BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create

More information

Zentyal Server Subscription Terms

Zentyal Server Subscription Terms Zentyal Server Subscription Terms These Zentyal Server Subscription terms apply to the Software and Services (as defined below) and, together with your Purchase Order, form the agreement ( Agreement )

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console server to server migration guide Product : 5.1 Document date: June 2012 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the key

More information

CA ARCserve Backup Patch Manager for Windows

CA ARCserve Backup Patch Manager for Windows CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS

XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS XANGATI END USER SOFTWARE LICENSE TERMS AND CONDITIONS IMPORTANT: PLEASE READ BEFORE DOWNLOADING, INSTALLING OR USING THE XANGATI, INC. ("LICENSOR") SOFTWARE YOU HAVE LICENSED ("SOFTWARE"). BY EXECUTING

More information

Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide

Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide Sophos SafeGuard Disk Encryption, Sophos SafeGuard Easy Demo guide Product version: 5.60 Document date: April 2011 Contents 1 Introduction...3 2 Requirements...5 3 The demo configuration package...6 4

More information

Consulting Terms. 1. Consulting Services

Consulting Terms. 1. Consulting Services These Consulting Terms, together with a Work Order, and any terms which are incorporated by written reference in any of the foregoing (including written reference to information contained in a URL or policy)

More information

Sophos Enterprise Console server to server migration guide. Product version: 5.2

Sophos Enterprise Console server to server migration guide. Product version: 5.2 Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the

More information

AGILE RISK MANAGEMENT LLC MASTER SOFTWARE LICENSE AGREEMENT

AGILE RISK MANAGEMENT LLC MASTER SOFTWARE LICENSE AGREEMENT AGILE RISK MANAGEMENT LLC MASTER SOFTWARE LICENSE AGREEMENT TERMS AND CONDITIONS 1. Scope of Agreement; Definitions. This Agreement covers the license and permitted use of the Agile Risk Management LLC

More information

PERFORCE End User License Agreement for Open Source Software Development

PERFORCE End User License Agreement for Open Source Software Development Perforce Open Source End User License Agreement Page 1 1. Introduction PERFORCE End User License Agreement for Open Source Software Development This is a License Agreement ( Agreement ) between Perforce

More information

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT

HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT HSS Specific Terms HSS SOFTWARE LICENSE AGREEMENT 1. LICENSE 2. TERMINATION Subject to the terms and conditions of this HSS Software License Agreement (the Agreement ), HSS hereby grants to Client (herein

More information

IICLE ONLINE SUBSCRIPTIONS TERMS AND CONDITIONS

IICLE ONLINE SUBSCRIPTIONS TERMS AND CONDITIONS IICLE ONLINE SUBSCRIPTIONS TERMS AND CONDITIONS IICLE Online Library, IICLE Online CLE, and IICLE Online All Access subscriptions are accepted and approved with the understanding that the Subscriber has

More information

Partners in Care Welch Allyn Connex Software Development Kit License Agreement

Partners in Care Welch Allyn Connex Software Development Kit License Agreement This Software Development Kit End User ( Agreement ) is between Welch Allyn, Inc. ( Welch Allyn ) and the Customer identified in the purchase order ( Customer or You ), and it governs the Software Development

More information

Log Insight Manager. Deployment Guide

Log Insight Manager. Deployment Guide Log Insight Manager Deployment Guide VERSION: 3.0 UPDATED: OCTOBER 2015 Copyright Notices Copyright 2002-2015 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies

More information

BrightStor ARCserve Backup for Linux

BrightStor ARCserve Backup for Linux BrightStor ARCserve Backup for Linux Agent for MySQL Guide r11.5 D01213-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the end user's

More information

GEO Sticky DNS. GEO Sticky DNS. Feature Description

GEO Sticky DNS. GEO Sticky DNS. Feature Description GEO Sticky DNS Feature Description VERSION: 5.0 UPDATED: JANUARY 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies and the KEMP Technologies logo

More information

RockWare Click-Wrap Software License Agreement ( License )

RockWare Click-Wrap Software License Agreement ( License ) RockWare, Inc. ( RockWare ) 2221 East Street, Suite 101 Golden CO 80401 USA RockWare Click-Wrap Software License Agreement ( License ) IMPORTANT - READ ALL OF THE TERMS AND CONDITIONS IN THIS LICENSE CAREFULLY

More information

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows:

If you do not wish to agree to these terms, please click DO NOT ACCEPT and obtain a refund of the purchase price as follows: IMPORTANT: READ THIS AGREEMENT CAREFULLY. THIS IS A LEGAL AGREEMENT BETWEEN AVG TECHNOLOGIES CY, Ltd. ( AVG TECHNOLOGIES ) AND YOU (ACTING AS AN INDIVIDUAL OR, IF APPLICABLE, ON BEHALF OF THE INDIVIDUAL

More information

CA VPN Client. User Guide for Windows 1.0.2.2

CA VPN Client. User Guide for Windows 1.0.2.2 CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

Software Hosting and End-User License Subscription Agreement

Software Hosting and End-User License Subscription Agreement Software Hosting and End-User License Subscription Agreement (Last Updated October 31, 2015) IMPORTANT! The Contrail software (the "SOFTWARE") that you seek to use was developed by OneRain Incorporated

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Mayfair EULA for Journal Office

Mayfair EULA for Journal Office Mayfair EULA for Journal Office 9-April-2014 Page 1 of 9 Mayfair EULA for Journal Office Mayfair Software End User License Agreement Software programs which you received either installed on on the device

More information

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12

2.6.1 Creating an Acronis account... 11 2.6.2 Subscription to Acronis Cloud... 11. 3 Creating bootable rescue media... 12 USER'S GUIDE Table of contents 1 Introduction...3 1.1 What is Acronis True Image 2015?... 3 1.2 New in this version... 3 1.3 System requirements... 4 1.4 Install, update or remove Acronis True Image 2015...

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Mobile Banking and Mobile Deposit Terms & Conditions

Mobile Banking and Mobile Deposit Terms & Conditions Mobile Banking and Mobile Deposit Terms & Conditions PLEASE CAREFULLY REVIEW THESE TERMS AND CONDITIONS BEFORE PROCEEDING: This Mobile Banking and Mobile Deposit Addendum ( Addendum ) to the Old National

More information

Merchant Service and Licensing Agreement

Merchant Service and Licensing Agreement 5204 S. Sand Cherry Circle, Sioux Falls SD 57108 www.etechglobal.com Phone: (605) 339-4529 Merchant Service and Licensing Agreement AGREEMENT The EtechGlobal Online Store service ("EtechGlobal Online Store"

More information

Sophos Cloud Migration Tool Help. Product version: 1.0

Sophos Cloud Migration Tool Help. Product version: 1.0 Sophos Cloud Migration Tool Help Product version: 1.0 Document date: June 2015 Contents 1 About the Sophos Cloud Migration Tool...4 2 How does Sophos Cloud differ from on-premise management?...5 3 How

More information

SELLING TERMS AND CONDITIONS

SELLING TERMS AND CONDITIONS SELLING TERMS AND CONDITIONS 1. The Agreement. All sales by Sterling Machinery, Inc., an Arkansas corporation (the Seller ) to the purchaser of Seller s Goods (the Buyer ) shall be governed by the following

More information

Sophos Anti-Virus for VMware vshield upgrade guide. Product version: 1.1

Sophos Anti-Virus for VMware vshield upgrade guide. Product version: 1.1 Sophos Anti-Virus for VMware vshield upgrade guide Product version: 1.1 Document date: February 2014 Contents 1 About this guide...3 2 Key steps in upgrading...3 3 Set up the new update share...3 4 Check

More information

CCA-DSS Encryption Installation Guide

CCA-DSS Encryption Installation Guide CCA-DSS Encryption Installation Guide October, 2010 Copyright Copyright 2010 Nodus Technologies, Inc. All rights reserved. Your right to copy this documentation is limited by copyright law and the terms

More information

TERMS AND CONDITIONS

TERMS AND CONDITIONS TERMS AND CONDITIONS ACCEPTANCE OF ANY PURCHASE ORDER FROM A CUSTOMER FOR USE OF ANY EQUIPMENT AND SOFTWARE PROVIDED BY RX MONITORING SYSTEMS INC. ( RXMS ) IS CONDITIONED UPON THESE TERMS AND CONDITIONS.

More information

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document:

Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement. In this document: Canadian Pharmaceutical Distribution Network Certificate Authority Services Agreement In this document: Company refers to the hospital, hospital group, or other entity that has been pre- registered by

More information

Website Hosting Agreement

Website Hosting Agreement Website Hosting Agreement 6 oak grove avenue This Hosting Contract governs your purchase and use, in any manner, of all Web site hosting services, including the Shared Hosting Services, (collectively,

More information

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012

Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012 Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that

More information

CA DLP. Release Notes for Advanced Encryption. r12.0

CA DLP. Release Notes for Advanced Encryption. r12.0 CA DLP Release Notes for Advanced Encryption r12.0 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Mac OS X Users 10.0 Symantec Enterprise Vault: Guide for Mac OS X Users The software described in this book is furnished under a license agreement and may be used only

More information

Software License Agreement

Software License Agreement Software License Agreement GRANT OF LICENSE This Accusoft Corporation ("ACCUSOFT") Agreement ("LICENSE") grants YOU ("LICENSEE") a non-exclusive and non-transferable right to use the trial mode version

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

End User License Agreement for the Intel(R) Software Development Products

End User License Agreement for the Intel(R) Software Development Products IMPORTANT - READ BEFORE COPYING, INSTALLING OR USING. Do not copy, install, or use the Materials provided under this license agreement ("Agreement"), until you have carefully read the following terms and

More information

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE

THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE THOMSON REUTERS (TAX & ACCOUNTING) INC. FOREIGN NATIONAL INFORMATION SYSTEM TERMS OF USE 1. License and Permitted Use The Foreign National Information System (FNIS) is licensed, not sold. Subject to the

More information

Paychex Accounting Online Terms of Use

Paychex Accounting Online Terms of Use Paychex Accounting Online Terms of Use Paychex recommends that Client read the Terms of Use prior to using the Paychex Accounting Online Software ( Software ). If Client does not accept and agree with

More information

WEBSITE DEVELOPMENT STANDARD TERMS AND CONDITIONS

WEBSITE DEVELOPMENT STANDARD TERMS AND CONDITIONS WEBSITE DEVELOPMENT STANDARD TERMS AND CONDITIONS A. Client commitment: Client agrees to allocate time and process information, as needed, during the duration of the project. Client agrees to review the

More information

Autodesk EMEA Campus License Agreement

Autodesk EMEA Campus License Agreement IMPORTANT. BY SIGNING THIS LICENSE AGREEMENT, INSTITUTION AGREES TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS EMEA CAMPUS LICENSE AGREEMENT ( LICENSE AGREEMENT ). THESE ARE THE ONLY TERMS UPON WHICH

More information

FILEMAKER PRO ADVANCED SOFTWARE LICENSE

FILEMAKER PRO ADVANCED SOFTWARE LICENSE FILEMAKER PRO ADVANCED SOFTWARE LICENSE IMPORTANT -- READ CAREFULLY: BY INSTALLING, COPYING, DOWNLOADING, ACCESSING OR OTHERWISE USING THE SOFTWARE, YOU AGREE TO BE BOUND BY THE TERMS OF THIS LICENSE.

More information

END USER LICENSE AGREEMENT ( EULA )

END USER LICENSE AGREEMENT ( EULA ) END USER LICENSE AGREEMENT ( EULA ) PLEASE READ CAREFULLY THIS EULA IS A LEGAL AGREEMENT BETWEEN YOU, EITHER AS AN INDIVIDUAL, COMPANY OR OTHER LEGAL ENTITY (IN ANY CAPACITY REFERRED TO HEREIN AS END USER,

More information

Sophos Anti-Virus for Mac OS X Help. For networked and single computers running Mac OS X version 10.4 or later

Sophos Anti-Virus for Mac OS X Help. For networked and single computers running Mac OS X version 10.4 or later Sophos Anti-Virus for Mac OS X Help For networked and single computers running Mac OS X version 10.4 or later Product version: 7 Document date: October 2009 Contents 1 About Sophos Anti-Virus...3 2 On-access

More information

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0

Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0 Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5

More information

Periodicals Archive Online / PAO 1802-1995 CUSTOM TERMS AND CONDITIONS

Periodicals Archive Online / PAO 1802-1995 CUSTOM TERMS AND CONDITIONS Periodicals Archive Online / PAO 1802-1995 Before you use ProQuest Information and Learning Company's electronic products, whether marketed under the ProQuest, Chadwyck-Healey, bigchalk, Micromedia, Softline,

More information

Configuring IKEv2 VPN for Mac OS X Remote Access to a GTA Firewall

Configuring IKEv2 VPN for Mac OS X Remote Access to a GTA Firewall Mac Install Configuring IKEv2 VPN for Mac OS X Remote Access to a GTA Firewall strongswan Client strongswan201503-01 Global Technology Associates 3361 Rouse Rd, Suite 240 Orlando, FL 32817 Tel: +1.407.380.0220

More information

SMALL BUSINESS EDITION. Sophos Control Center startup guide

SMALL BUSINESS EDITION. Sophos Control Center startup guide SMALL BUSINESS EDITION Sophos Control Center startup guide Product version: 4.0 Document date: September 2009 Contents 1 About this guide...3 2 System requirements...4 3 Installation...5 4 Protecting networked

More information

6. MODIFICATIONS. Licensee may modify, adapt and create improvements to the SOFTWARE subject to the following conditions:

6. MODIFICATIONS. Licensee may modify, adapt and create improvements to the SOFTWARE subject to the following conditions: ACADIA UNIVERSITY Software License Agreement This Software License Agreement ("Agreement") is made and entered into this _ of 20, (the "Effective Date") by and between The Governors of Acadia University

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

END USER LICENSE AGREEMENT

END USER LICENSE AGREEMENT END USER LICENSE AGREEMENT 1. SCOPE OF THIS AGREEMENT. This END USER LICENSE AGREEMENT ("EULA") is a legal agreement between you (either an individual or a single entity) and TradeStation ("TS") governing

More information