LICENCE TERMS FOR SECURED ENCRYPT Clause Samples

LICENCE TERMS FOR SECURED ENCRYPT. 2.1. Subject to the terms of this Schedule 2, we, grant you a non-assignable, non-exclusive, revocable, limited and non-transferable licence to use the Solution on your Device(s) during the Subscription Period. 2.2. You will not, and will not permit any third party to: 2.2.1. Disclose any licence or authorisation number for Solution to any party other than to us or our authorised representatives; 2.2.2. Circumvent or attempt to circumvent controls on the installation or use of the Solution; 2.2.3. Copy, modify, change, alter, duplicate, create derivative works from, frame, mirror, republish, download, display, transmit, or distribute all or any portion of the Solution in any form or media or by any means nor attempt to do any such thing; 2.2.4. Reverse compile, disassemble, translate, reconstruct, transform, extract, reverse engineer or otherwise reduce to human-perceivable form all or any part of the Software and/or Solution nor attempt to do any such thing except to the extent that (by virtue of sections 50B and 296A of the Copyright, Designs and Patents Act 1988) such actions cannot be prohibited because they are necessary to decompile the Software and/or Solution to obtain the information necessary to create an independent program that can be operated with the Software and/or Solution or with another program (“Permitted Objective”), and provided that the information obtained by you during such activities: 2.2.4.1. is not disclosed or communicated without our prior written consent to any third party to whom it is not necessary to disclose or communicate it in order to achieve the Permitted Objective; 2.2.4.2. is not used to create any software that is substantially similar in its expression to the Solution; 2.2.4.3. is kept secure; and 2.2.4.4. is used only for the Permitted Objective; 2.2.5. Publish, sell, distribute, broadcast, transmit, communicate, transfer, rent, lease, assign, display, disclose, pledge, share, licence or otherwise commercially exploit the Solution; 2.2.6. Grant any third party access to or use of the Solution or use the Solution for the benefit of any third party; and/or 2.2.7. Access or use Secured Encrypt other than in accordance with this Schedule 2, the other terms of your Agreement or any terms of use set out on the Website or otherwise made available to you. 2.3. By using the Solution you: 2.3.1. Confirm that the Solution may include recommendations in relation to: software installation, configuration or updates; operating s...