END USER LICENSE AGREEMENT (EULA)

IMPORTANT: PLEASE READ ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT BEFORE USING ‘ITL Total Security’ SOFTWARE. ITL Total Security IS PLEASED TO LICENSE THE ‘ITL Total Security’ SOFTWARE TO YOU AS THE INDIVIDUAL, COMPANY, OR OTHER LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE (REFERRED TO BELOW AS "YOU" OR "YOUR") ON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE CONTRACT BETWEEN YOU AND ITL Total Security. BY CLICKING ON THE "AGREE", “ACCEPT” OR "YES" BUTTON OR ANY OTHER INDICATOR OF YOUR ELECTRONIC ACCEPTANCE OF THIS AGREEMENT, INSTALLING THE DOWNLOADED SOFTWARE, ACCESSING THE SOFTWARE ONLINE, OR, IF APPLICABLE, BREAKING THE SEAL OF THE TANGIBLE MEDIA CONTAINING THE SOFTWARE, YOU AGREE TO THE TERMS AND CONDITIONS OF THIS AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND CONDITIONS, THEN DO NOT CLICK THE "AGREE", "ACCEPT", OR "YES" BUTTON OR OTHER INDICATOR OF YOUR ELECTRONIC ACCEPTANCE OF THIS AGREEMENT, AND DO NOT USE OR ACCESS THIS SOFTWARE.

"ITL Total Security" is an intelligent Antivirus for your system that blocks all malware infections such as viruses, Trojan, spyware, etc. and keeps you protected.

1. License

1.1. The software which accompanies or is accessible through this license (collectively the "software") is the property of ITL Total Security or its licenses and is protected by copyright law. While ITL Total Security continues to own the intellectual property rights to the software, you will have certain rights to use the software after your acceptance of this license. This license governs any releases, revisions, or enhancements to the software that ITL Total Security may furnish.

1.2. The software will be installed as a free trial for a limited period of time and will work with all of its features after the purchase of a license key as per the subscription period.

1.3. Except as may be modified by a ‘ITL Total Security’ license certificate, license coupon, or license key (collectively, "License Key") that accompanies, precedes, or follows this license, your rights and obligations with respect to the use of this software are as follows:
You are entitled to:

  • Use the software on or in conjunction with up to (i) the number of systems specified by your order for the software, or (ii) in the case of software purchased on a CD or other physical medium, the number specified on the software package, or (iii) if you received the software in combination with other hardware or software, solely in conjunction with such other hardware or software;

  • Transfer the software on a permanent basis to another person or entity, provided that you first notify ITL Total Security Support of your intention in writing and that you retain no copies of the software and the transferee agrees to the terms of this license.

1.4 Notwithstanding Section 1.3 above, if a License Key accompanies, precedes, or follows this license, you may:

  • Make that number of copies of the software licensed to you by ITL Total Security as provided in your License Key. your License Key shall constitute proof of your right to make such copies;
  • Make one copy of the software for backup purposes, or copy the software onto the hard drive of your system and retain the original for backup purposes.
  • Use the software on a network if you have a licensed copy of the software for each system that can access the software over that network;

1.5 You are not entitled to:

  • Use the software in any way not authorized by this license;
  • Copy the documentation which accompanies the software;
  • Sub-license, rent or lease any portion of the software;
  • Reverse engineer, decompile, disassemble, modify, translate, make any attempt to discover the source code of the software, or create derivative works from the software;
  • Use a previous version or copy of the software after you have received a disk replacement set or an upgraded version; upon upgrading the software, all copies of the prior version must be destroyed;
  • Use a later version of the software than is provided herewith unless you have purchased upgrade insurance or have otherwise separately acquired the right to use such later version; or
  • Use the software for the purpose of creating multiple systems or hard drives not connected to the original system, with similar or identical configurations to that of the original system or hard drive.
  • The application may collect system information to improve the product performance and customer experience. By installing the software you agree to allow the application to collect and use system information for the sole purpose of product enhancement. The information collected will never be shared or distributed in any form.

1.6 The application may display third party offers from time to time. These offers are put in such a way, so as not to interfere or hamper the user experience. The acceptance or rejection of the offer is purely left at user’s discretion. Such offers are carefully selected by the compliance team.

2. Term & Termination

2.1. Term

The initial term of this Agreement will commence on the date you acquire or download the software. The initial term will continue for the term you specified in your order for the software, or if you received the software in combination with other hardware or software, the term specified by your supplier. If renewal terms are available, ITL Total Security will provide notice offering you the opportunity to purchase renewals at the then-current renewal price. The initial term and any renewals purchased are referred to in this Agreement as the 'Term'.

2.2. Termination

ITL Total Security, in addition to such other rights may be available at law or equity, shall be entitled to terminate this Agreement at any time without notice if you commit a material breach of this Agreement.

2.3. Effect of Termination

On the expiration or termination of this Agreement, you will cease using the software, ITL Total Security may cease making updates available to you, and the software may cease functioning. Sections 1.4, 3, 4, 5, 6, 7, 8, 9, 11, 12 and 13 will survive the expiration or termination of this Agreement.

3. Ownership

ITL Total Security reserves all rights in the software not expressly granted by this Agreement. All copyrights, trademarks and other conceivable intellectual property rights in and to the software are owned by ITL Total Security or its licensors, and are protected by United States and foreign copyright laws, international treaties and other applicable laws. Any copy of the software you are allowed to make pursuant to this Agreement must contain the entire copyright and other notices included with the original copy of the software.

4. Content Updates

You acknowledge that certain ITL Total Security software products utilize content that is updated from time to time. For example, ‘ITL Total Security’ products utilize updated Mac components, like registry structure etc. & content delivery features utilize updated URL links, etc. (collectively, "Content Updates"). you may obtain Content Updates during any period for which you have (i) purchased a subscription for Content Updates for the software (including any subscription included with your original purchase of the software), (ii) purchased upgraded insurance for the software, (iii) entered into a maintenance agreement that includes Content Updates, or (iv) otherwise separately acquired the right to obtain Content Updates. Except to the extent expressly stated above, this license does not permit you to obtain and use Content Updates. You further acknowledge that you must routinely download and permit installation of updates in order to obtain maximum benefit from the software and to keep your Mac functioning in an optimal state.

5. Warranty

ITL Total Security warrants that the media on which the software is distributed will be free from defects for a period of thirty (30) days from the date of your purchase of the software (the "Warranty Period"). Your sole remedy in the event of a breach of this warranty will be that ITL Total Security will replace any defective media returned to ITL Total Security within the Warranty Period or, if Section 6 below applies, refund the money you paid for the software. ITL Total Security does not warrant that the software will meet your requirements or that operation of the software will be uninterrupted or error-free. In order to exercise your rights under this Section 5, you must uninstall and destroy all copies of the software you may have made (including all archival copies), and (i) if you purchased the software by download, follow the instructions on the confirmation email you received in connection with the purchase, or (ii) for all other purchases, return the software in its original package, along with your receipt, to the point of purchase.

THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES, WHETHER EXPRESSED OR IMPLIED, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON INFRINGEMENT OF INTELLECTUAL PROPERTY RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM STATE TO STATE AND COUNTRY TO COUNTRY.

6. Money Back Guarantee

If you are the original licensee of this copy of the software and are not completely satisfied with it for any reason, you are entitled to receive a refund of the money you paid for the software (less shipping, handling and any applicable taxes) by notifying ITL Total Security Customer Service or the Dealer in writing at any time during the sixty (60) day period following the date of purchase (the "Guarantee Period"). If you received the software as a "bundled" product with the purchase of your Mac or other computer component, or if you fail to notify ITL Total Security Customer Service or the Dealer within the Guarantee Period, you will not be entitled for a refund.

7. Privacy

7.1. ITL Total Security may deliver any notice to you via pop-up window, dialog box, email or other means, even though you may not receive the notice unless and until you launch the software. Any such notice will be deemed delivered on the date ITL Total Security first makes it available through the software, irrespective of when you actually receive it.

7.2. You acknowledge that ITL Total Security collects certain information regarding the users of the software, including certain personally identifiable information. You hereby consent to ITL Total Security for collection and use of such information, and agree that ITL Total Security's collection and use of such information will be governed by ITL Total Security's Privacy Policy and that ITL Total Security may revise the same from time to time.

8. Disclaimer of Damages

EXCEPT AS EXPRESSLY PROVIDED BY SECTION 5 OF THIS AGREEMENT, ITL Total Security DISCLAIMS ALL OTHER WARRANTIES WITH RESPECT TO THE SOFTWARE, MEDIA AND ANY OTHER SUBJECT MATTER OF THIS AGREEMENT, WHETHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, THE IMPLIED WARRANTY OF FITNESS FOR A PARTICULAR PURPOSE AND IMPLIED WARRANTY OF NONINFRINGEMENT. ITL Total Security DOES NOT WARRANT THAT THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE. Some jurisdictions do not allow limitations on an implied warranty, so the above limitations may not apply to you. You may have other rights that vary from jurisdiction to jurisdiction.

9. Limitation of Liability

9.1. SOME STATES AND COUNTRIES, INCLUDING MEMBER COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.

9.2. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH HEREIN FAILS OF ITS ESSENTIAL PURPOSE, AND NOTWITHSTANDING ANYTHING HEREIN TO THE CONTRARY:

(A) IN NO EVENT WILL ITL Total Security OR ITS LICENSORS HAVE ANY LIABILITY OR RESPONSIBILITY TO YOU WHATSOEVER FOR ANY DEFECT, MALFUNCTION, DAMAGE, OR LOSS, RESULTING FROM YOUR INSTALLATION OR USE OF THIRD PARTY SOFTWARE, HARDWARE, EQUIPMENT, PERIPHERALS, OR OTHER PRODUCTS, INCLUDING BUT NOT LIMITED TO, SOFTWARE VERSION UPDATES, CONTENT UPDATES, OR OTHER FILES RECEIVED FROM ANY THIRD PARTY (COLLECTIVELY, "THIRD PARTY PRODUCTS"), RECEIVED IN CONNECTION WITH YOUR (OR ANY THIRD PARTY'S) USE OF THE SOFTWARE. ALL WARRANTIES AND OBLIGATIONS OF THIRD PARTIES IN CONNECTION WITH THIRD PARTY PRODUCTS ARE OUTSIDE THE SCOPE OF THIS AGREEMENT AND MUST BE ADDRESSED UNDER A SEPARATE AGREEMENT BETWEEN YOU AND SUCH THIRD PARTIES.

(B) IN NO EVENT WILL ITL Total Security OR ITS LICENSORS BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL, PUNITIVE, INDIRECT OR SIMILAR DAMAGES, INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT OF THE USE OR INABILITY TO USE THE SOFTWARE, EVEN IF ITL Total Security HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

(C) IN NO EVENT WILL ITL Total Security'S OR ITS LICENSORS' LIABILITY EXCEED THE PURCHASE PRICE OF THE SOFTWARE.

9.3. THE DISCLAIMERS AND LIMITATIONS SET FORTH ABOVE APPLY REGARDLESS OF WHETHER YOU ACCEPT THE SOFTWARE.

10. Taxes

You shall be responsible for the payment of all sales, use and similar taxes relating to the license of the software as applicable to your state/country and the respective taxation structure.

11. Government Users

If the software is downloaded or accessed by or on behalf of the United States of America, its agencies and/or instrumentalities ("U.S. Government"), it is provided with Restricted Rights. Use, duplication, or disclosure of the software by the U.S. Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer software clause of DFARS 252-227-7013 or subparagraphs (c)(1) and (2) of the Commercial Computer software- Restricted Rights at 48 CFR 52.227-19, as applicable.

12. Export Control

The software and the underlying information and technology may not be downloaded, accessed or otherwise exported or re-exported. You must comply with all domestic and international export laws and regulations that apply to ITL Total Security. These laws include restrictions on destinations, end users and end use. You agree not to export this software or related licenses to any prohibited country, entity or person for which an export license or other governmental approval is required. Obtaining necessary licenses and approvals is solely your obligation. By downloading, accessing or using the software, you agree to the foregoing and you represent and warrant that you are not located in, under the control of, or a national or resident of any such country which might fall under any type of restricted list.

13. General Terms

13.1. Indian law governs the interpretation of this agreement and applies to claims for breach of it, regardless of conflict of laws principles. Jurisdiction over and venue of any suit arising out of or related to this agreement will be in the state courts located in Jaipur, Rajasthan, India. If any provision of this agreement is found to be invalid by any court having competent jurisdiction, the invalidity of such provision shall not affect the validity of the remaining provisions of this agreement, which shall remain in full force and effect. No waiver of any term of this agreement shall be deemed further or continuing waiver of such term or any other term.

13.2. This Agreement was originally prepared in the English language. Although ITL Total Security may provide one or more translations for your convenience, the English version will control in the case of any conflict or discrepancy.

13.3. This agreement constitutes the entire agreement between you and ITL Total Security with respect to this transaction and any prior statements or representations. Any changes to this agreement must be made in writing, signed by an authorized representative of ITL Total Security.

ITL Total Security Contact Information

Support email : support@innovanathinklabs.com