Encryption License Agreement

This agreement exists between you and Beyond Encryption. No other person has the right to enforce their conditions. Each paragraph of this agreement operates separately. When a competent court or authority decides that one of them is illegal or unenforceable, the other paragraphs remain fully in force and effective. We do not wait for you to have access to or process the personal data you encrypt with services that, in most cases, are only accessible by you and the recipients of your encrypted emails as personal data. To the extent that we deal with service delivery data, both parties agree, when this agreement is reached, that you act as data manager and that we act on your behalf as a data processor. References to „data processors,“ „data managers“ and „personal data“ in this section must be of importance to them in the DMP. Each party undertakes never to disclose to third parties confidential information made available to the other party (including information relating to the other party`s business, customers, customers or suppliers) or to use it for purposes other than those of this Agreement, unless it is required by law or law, by a government or regulator or for each party to fulfill its obligations under this Agreement. 17. Checking the authenticity of the software. The end user can demonstrate permission to use the software in one of the following ways: (i) by a third party designated by the vendor or supplier; (ii) a written licensing agreement, where such an agreement has been reached; (iii) by transmitting an email sent by the provider with license details (username and password). Licensing information and end-user identification data, in accordance with the privacy policy, may be required to verify the software`s requirements.

Before entering into a paid contract, your licensing agreement begins with a „free“ use period considered a trial period. We grant you a free personal, non-transferable, non-exclusive license (the „trial license“), to use the Services during this period, only for the evaluation of services, as you reasonably request, to assess the potential adequacy of use in your business. For all license applications (for example. B, technology transfers, hardware and/or software development, manufacturing agreements or the resale/transfer of encryption items), the following information (if not included in the completed BXA 748P form) facilitates rapid verification by agencies: We may transfer our rights and obligations under this contract to another organization, but this has no impact on your rights or obligations arising from this Agreement. In this case, we will always inform you in writing or on our website. You can only transfer your rights and obligations under this contract to another person if we consent in writing. The user accepts that this is a non-exclusive and non-transferable license for The Services. We reserve the right to amend this ATAD from time to time to reflect legislative changes or changes in the way we conduct our business.