Terms of Use for Kaspersky Security for Microsoft Office 365
We use cookies to make your experience of our websites better. By using and further navigating this website you accept this. Detailed information about the use of cookies on this website is available by clicking on more information.
Accept and close

 

 

Kaspersky Security for Microsoft Office 365

 
 
 

Terms of Use for Kaspersky Security for Microsoft Office 365

Back to article list
2018 Feb 01 ID: 14096
 
 
 
 

TERMS OF USE FOR KASPERSKY SECURITY FOR MICROSOFT OFFICE 365

ATTENTION! Take special care to familiarize yourself with the Terms of Use for Kaspersky Security for Microsoft Office 365, the Rights Owner of which is AO Kaspersky Lab (hereinafter the 'Rights Owner'), before registering and connecting to it. Connection to and use of this Solution indicates your unreserved agreement to the terms outlined below. If you do not agree with the terms as outlined below, you must not use the Solution.

Definitions

The Rights Owner (owner of exclusive rights for the Software) is AO Kaspersky Lab.

Solution means the web sites of the Rights Owner, online resources and also the software set up within the Rights Owner's infrastructure, the use of which is implemented through websites.

Partners are the organizations which are distributing the Solutions based on agreements with the Rights Owner.

License Certificate is a document that the User gets with a License, which contains information about the License provided.

If there is a written license agreement or a license certificate with terms of use of the Solution, the terms of use set forth in said license agreement or license certificate shall prevail over the present Terms of Use.

The Solution Kaspersky Security for Microsoft Office 365 is intended to protect the mail service Microsoft Exchange Online within Microsoft Office 365. The Solution checks messages for viruses and other types of threat which may be transmitted by email, as well as for spam and phishing. A description of the Solution’s functionality is available in online help.

The Solution can be used on the condition that you comply with all restrictions and conditions stipulated in the present Terms of Use.

If you are using the Solution based on a free license for evaluation purposes, you have the right to use the Solution only for evaluation purposes and only within the evaluation period, which is thirty (30) days, starting from the Solution’s activation date. Any use of the Solution for other purposes or after the end of the evaluation period is prohibited. If you are using the Solution based on a fee-based license, you have the right to use the Solution to protect Objects in the number stipulated during registration of your purchase of the license to use the Solution. If you purchase a license to use the Solution on the Internet, the term of your use of the Solution is indicated during registration of your purchase. If you purchase a license to use the Solution from a Partner, the term of your use of the Solution may be determined between you and the Partner. If you have a License Certificate, the term of use of the Solution is indicated in the License Certificate.

In order to use the Solution you need to be registered on the web portal cloud.kaspersky.com. When you begin to use the Solution you thereby confirm your consent to provide the email address that was specified on registration for receiving notifications from the Rights Holder and his partners associated with the use of the Solution. The set of notifications is available here.

By using the Solution you thereby confirm your consent to provide to the Rights Owner for the purposes of checking letters and other items (meetings, tasks, etc.) which are processed in accordance with the protection's settings. The items that are checked are not stored in the Solution's infrastructure after the check has ended, but are removed immediately after the check has been completed. The data stored to ensure that the Solution can operate, as well as the statistical data on the results of the check, are available here.

The provided information is protected and processed in accordance with the privacy statement.

You agree that the Solution may deliver backup copies beyond listed data. Backup copies include only data stored by the Solution, and not data that have been removed post-processing. The rules for processing back-up copies are available here.

During the period of time when the Solution is being used you are entitled to receive technical support (technical support is provided in accordance with the rules for technical support).

When the Solution is being used it is forbidden to: study, scan or check any vulnerability of the Solution, as well as any other connected system or network, violate safety or authentication measures used in relation to the Solution, or such systems and networks; decode, decompile, disassemble or perform any reverse engineering of software used to ensure the functionality of the Solution; harm or threaten other users in any way, such as through viruses, overloading, flooding, sending unwanted emails or email bombing the Solution; impede or attempt to impede the access of any user, host or network; authorize or assist any other person carrying out any of the above-mentioned activities.

The Rights Owner does not guarantee that the Objects will be protected from threats after the end of the term of use of the Solution. If the Solution was used based on a trial, the access to the Solution and data stored in the Solution's infrastructure will be automatically deleted upon the expiration of one month after the end of the evaluation period. If the Solution was used based on a commercial license, the access to the Solution and data stored in the Solution's infrastructure will be automatically deleted upon the expiration of six months after the end of the commercial license. The Solution may contain links to external websites or resources. We provide these links solely for your convenience and bear no responsibility for their content or resources provided on them or available from them or links to products or services. You acknowledge your sole responsibility and accept all the risks when using any external websites or resources.

Limitation of warranty by using the Solution on a fee-based license

The Rights Owner guarantees, that the Solution will work in accordance with the description set forth in online help.

You agree, that no Solutions are error-free.

The Rights Owner does not guarantee the Solution's work if the terms described in online help are not followed, as well as in the event of violations of the terms of this Agreement by the User.

The Rights Owner does not guarantee, that the User will always have access to the functionality, described in the Help, upon expiration of the term of use.

APART FROM THE LIMITED GUARANTEE SPECIFIED IN THIS PARAGRAPH, THE SOFTWARE SOLUTION IS PROVIDED 'AS IS'. THE RIGHTS OWNER AND ITS PARTNERS DO NOT OFFER ANY GUARANTEES FOR ITS USE OR PRODUCTIVITY. APART FROM THE GUARANTEES, TERMS, REPRESENTATIONS OR PROVISIONS, THE DEGREE OF WHICH MAY NOT BE EXCLUDED OR LIMITED BY THE APPLICABLE LEGISLATION, THE RIGHTS OWNER AND ITS PARTNERS DO NOT PROVIDE ANY GUARANTEES, TERMS, REPRESENTATIONS OR PROVISIONS (EXPRESSED EXPLICITLY OR IMPLICITLY) FOR EVERYTHING, AMONG WHICH ARE THE UNRESTRICTED NON-VIOLATION OF THE RIGHTS OF THIRD PARTIES, COMMERCIAL QUALITY, INTEGRATION OR SUITABILITY FOR SPECIFIC PURPOSES. YOU AGREE TO BEAR RESPONSIBILITY FOR THE CHOICE OF SOLUTION, THE USE OF THE SOLUTION, AND ALSO THE RESULTS OBTAINED WITH ITS HELP.

If you are using the Solution based on a free license for evaluation purposes, there is no guarantee for software functionality.

THE SOFTWARE IS PROVIDED 'AS IS'. THE RIGHTS OWNER DOES NOT OFFER ANY GUARANTEES, CONDITIONS, REPRESENTATIONS OR STATEMENTS (EXPRESSED EXPLICITLY OR IMPLICITLY) FOR EVERYTHING, INCLUDING WITHOUT LIMITATIONS THE VIOLATION OF THIRD PARTY RIGHTS, THE COMMERCIAL QUALITY, INTEGRATION OR SUITABILITY FOR SPECIFIC PURPOSES. YOU AGREE TO BEAR RESPONSIBILITY FOR THE CHOICE OF SOFTWARE, THE INSTALLATION AND THE USE OF THE SOFTWARE, AND ALSO THE RESULTS OBTAINED WITH ITS HELP.

Limitation of liability

TO THE FULLEST EXTENT, ASSUMED BY THE APPLICABLE LAW, THE RIGHTS OWNER AND/OR ITS PARTNERS DO NOT BEAR RESPONSIBILITY FOR ANY LOSSES OR DAMAGE (INCLUDING LOSSES ASSOCIATED WITH COMMERCIAL PROFIT THAT IS LESS THAN EXPECTED, INTERRUPTION OF ACTIVITY, LOSS OF INFORMATION OR OTHER DAMAGE TO ASSETS) CONNECTED WITH THE USE OR IMPOSSIBILITY OF USE OF THE SOFTWARE, EVEN IF THE RIGHTS OWNER AND ITS PARTNERS WERE INFORMED OF THE POSSIBILITY OF SUCH LOSSES OR DAMAGE. THE LIABILITY OF THE RIGHTS OWNER'S AND ITS PARTNERS FOR THE VIOLATION OF ANY CONDITION OF THIS LICENSE AGREEMENT IN ANY CASE IS RESTRICTED TO THE AMOUNT YOU ACTUALLY PAID FOR THE SOFTWARE. THESE RESTRICTIONS MAY NOT BE EXCLUDED OR LIMITED IN ACCORDANCE WITH THE APPLICABLE LEGISLATION.

These Terms for Use are regulated in accordance with the legislation of the Russian Federation.

The provided information is protected and processed in accordance with the privacy statement.

Contact Details: you can find contact details on the link.

KASPERSKY SECURITY NETWORK STATEMENT

This Statement defines the procedure by which Users provide the information indicated in the list below, and describes the use of the provided information.

This Statement pertains to Kaspersky Security for Microsoft Office 365, the rights owner of which is AO Kaspersky Lab (hereinafter “Kaspersky Lab”).

You agree to automatically provide to the Rights Owner the information indicated below by means of the Solution used to increase the operational protection and improve the quality of the software's work:

 - Identifier for the discovery of various URLs in the body of a single email;

- IP address of the sender of a scanned email;

- Information about all scanned objects: name, size, and checksum (MD5, SHA2-256, SHA1) of the scanned file, file type identifier, executable file flag,

- URL used to request reputation information;

- Name of first-level domains from URLs in scanned emails;

- Checksum (MD5) of the name of files attached to a message;

- Number of IP addresses (v4 and v6) in the header of scanned emails and a flag indicating whether the address belongs to a local or external network relative to the user's computer;

- Non-reversible checksum of names of domains from the header of scanned emails;

- Result of email scanning and final spam score;

- Attack target (name of organization, website); - Checksum (MD5) of the email address of the sender of scanned emails; - URLs contained in scanned emails with deleted passwords; - Checksums (MD5) of images in emails;

- Short text signatures from the body of the email (irreversible convolutions of the text, which cannot be used to recover the original text; the text itself is not sent) for filtering known spam distributions and for the product to make decisions about these spam distributions;

- IP addresses of the sender of emails and of intermediate mail servers, version of the sender's mail client, email identifier, information about the filling out of fields in emails, checksum (CRC32) of email fragments determined by markup language, names of domains of the sender of emails from the SMTP session and MIME header, checksums (CRC32) of the name of the sender from the SMTP session and MIME header, checksums (CRC32) of the name of the recipient and domain from the SMTP session.

For additional scanning at Kaspersky Lab, the user agrees to provide executable files or parts thereof, which may be used by criminals to harm the user's computer.

The Rights Owner may use the received information to create reports on information security risks. Kaspersky Lab protects any information received in this way as prescribed by law and applicable rules of Kaspersky Lab. Data are transmitted over encrypted communication channels.

 

 

© 2017 AO Kaspersky Lab. All Rights Reserved. 

 
 
 
 
Was this information helpful?
Yes No
 

 
 

Have you found what you were looking for?

Please let us know how we can make this website more comfortable for you

Send feedback Send feedback

Thank you!

Thank you for submitting your feedback.
We will review your feedback shortly.