Common use of Security Products Clause in Contracts

Security Products. When you receive access to our security Products as part of a delivery of our analytics and mobility Products, you may only use those security Products to authenticate access to analytics reports. You are responsible for (a) configuring the security Products to integrate with your network and the Security Applications; and (b) making available to your Named Users terms of use and a privacy policy for the Security Applications that is consistent with the terms of use and privacy policy we include as part of the Security Applications on each platform where the Security Applications are available (e.g., the Apple App Store for iOS devices and the Google Play Store for Android devices). “Security Application” means the iOS and Android versions of any of our proprietary, standard mobile security software applications that users can download onto their smartphones, as may be modified by us from time to time. OUR SECURITY PRODUCTS ARE NOT DESIGNED TO AND WILL NOT BE USED TO MANAGE PHYSICAL OR LOGICAL ACCESS TO FACILITIES OR SYSTEMS WHERE DELAY IN OR FAILURE OF SUCH ACCESS COULD THREATEN HEALTH OR SAFETY, OR CAUSE PROPERTY, ENVIRONMENTAL OR SIMILAR DAMAGE OR LOSS, AND YOU AGREE NOT TO USE THEM TO MANAGE SUCH ACCESS UNLESS YOU PROVIDE A FAILSAFE MECHANISM FOR LOCAL BYPASS OF THE SECURITY PRODUCTS FOR USE IN AN EMERGENCY FOR WHICH YOU WILL BE FULLY RESPONSIBLE.

Appears in 4 contracts

Samples: Software License Agreement, Software License Agreement, Software License Agreement

AutoNDA by SimpleDocs
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!