how to build a website


CWATCH WEB SECURITY

END USER LICENSE AND SUBSCRIBER AGREEMENT

THIS AGREEMENT CONTAINS A BINDING ARBITRATION CLAUSE. PLEASE READ THE AGREEMENT CAREFULLY BEFORE ACCEPTING THE TERMS AND CONDITIONS.

IMPORTANT—PLEASE READ THESE TERMS CAREFULLY BEFORE APPLYING FOR, ACCEPTING, OR USING THE SERVICES. BY USING, APPLYING FOR, OR ACCEPTING THE ACCOUNT OR SERVICES OR BY CLICKING ON “I ACCEPT” BELOW, YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, THAT YOU UNDERSTAND IT, AND THAT YOU AGREE TO BE BOUND BY ITS TERMS. IF YOU DO NOT AGREE TO THESE TERMS, DO NOT CLICK “I ACCEPT” AND DO NOT APPLY FOR, ACCEPT, OR USE THE SERVICES.

In exchange for Subscriber’s use of the Services, Subscriber agrees as follows: 

1. General.

1.1. License. Subject to the terms herein, Datarisk grants Subscriber a limited, non-exclusive, non-transferable, revocable license to use CWatch Web Security, including the accompanying software, services, documentation, and other information and files (the “Services”), provided that Subscriber agrees to the unmodified terms and conditions of this Agreement. Any rights in the Services not expressly granted in this Agreement are reserved by Datarisk.

1.2. Restrictions. The licenses granted herein are only valid if:

(i) the Services are NOT modified in any manner;

(ii) the Services are only installed and used in accordance with Subscriber’s network security policies,

(iii) Subscriber possesses the necessary authority and power to install and use the Services,

(iv) Subscriber promptly pays all license fees when due, and

(v) this Agreement is accepted without modification and has not been breached.

1.3. Registration. When registering for the Services, Subscriber must provide accurate information and must update the registration information if it changes. Datarisk may limit the Services if Subscriber fails to complete a required registration process. Subscriber may also be required to select a username and password. Maintaining the confidentiality of this password and username is Subscriber’s responsibility. Subscriber must notify Datarisk immediately of any unauthorized use of Subscriber’s account. Any information that is untrue, inaccurate, or incomplete may result in the immediate termination of this Agreement in Datarisk’s discretion.

1.4. Trial, Evaluation, and Beta. If this Agreement pertains to a trial, beta, or evaluation license, the licenses granted herein will terminate upon the expiration or cancellation of the trial or evaluation period or when the Services are no longer available. Subscriber may use the Services only for the duration of the trial or evaluation period. All such licenses are limited to one per customer per promotion or beta test.

1.5. Updates. Datarisk is not obligated to provide updates to the Services. If an update is provided and the update is not accompanied by an additional agreement, this Agreement applies to Subscriber’s use of the update.


2. Limitations.

2.1. Compliance with Laws. Subscriber must comply with all rules, regulations, and laws applicable to Subscriber when using the Services, including laws applicable to data collection, privacy, and export control. Subscriber shall not use the Services to (1) engage in conduct that is offensive, abusive, contrary to public morality, indecent, defamatory, obscene, or menacing; (2) cause Datarisk or a third party distress, annoyance, denial of any service, disruption, or inconvenience; or (3) send or receive unsolicited bulk correspondence.

2.2. Prohibited Activities. The Services are not designed, manufactured or intended for use or resale as or with on-line control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines or weapon systems in which the failure of the Services could lead directly to death, personal injury or severe physical or environmental damage. Subscriber may not:

(i) resell or transfer the Services to any third party;

(ii) register or use any Datarisk logo or trademark in any jurisdiction;

(iii) modify any software in any manner;

(iv) attempt to gain unauthorized access to any computer systems;

(v) interfere or disrupt a network connected to the Services;

(vi) use the Services to infringe the intellectual property, proprietary, or privacy rights of a third party;

(vii) post, distribute, or transmit any offensive, obscene, vulgar, violent, defamatory, harassing, harmful, or otherwise objectionable material or any software or computer file that contains malware, such as a Trojan, virus, or adware; or

(viii) interfere with another’s use of the Services or other similar services.

2.3. Subscriber Obligations. Subscriber must (1) obtain and pay for all equipment and third-party services (e.g., Internet access and email service) required for Subscriber to access and use the Services; (2) maintain the security of Subscriber’s identification, and other confidential information relating to Subscriber’s account; and (3) be responsible for all charges resulting from use of Subscriber’s account associated with the Services. Subscriber is solely responsible for the content of Subscriber’s computer and any transmissions made through the Services.

2.4. Export. Subscriber represents and warrants that Subscriber is not located in and will not modify, export or re-export, either directly or indirectly, the Services and related software to any country or entity under United States restrictions or to any country or entity subject to applicable trade sanctions. The United States restricted country and persons list is subject to change without notice from Datarisk, and Subscriber must comply with the list as it exists in fact. DATARISK SHALL NOT BE LIABLE FOR SUBSCRIBER’S VIOLATION OF ANY SUCH EXPORT OR IMPORT LAWS, WHETHER UNDER UNITED STATES LAW OR FOREIGN LAW.

3. Monitoring and Reporting.

3.1. Installation. As part of the consideration of Subscriber’s use of the Services, Subscriber is required to (1) download and install all software accompanying the Services, (2) reconfigure firewalls, antivirus solutions, and other IT security services that interfere with or prevent the Services from operating correctly, and (3) continuously forward Subscriber Information. “Subscriber Information” means log data about Subscriber’s web traffic, including but not limited to, signatures, request/response headers, source IP, and time. Once Subscriber has completed the above installation requirements, which shall be determined by Datarisk in its sole discretion, Datarisk will start analyzing Subscriber Information.

3.2. Monitoring; Notifications; Reporting. Once Datarisk has received Subscriber Information for the minimum initial time period indicated in Subscriber’s account, but not less than 30 days, Datarisk will monitor Subscriber Information for Unusual Activity during the term of this Agreement. “Unusual Activity” means an anomaly in Subscriber Information, as determined by Datarisk. When Datarisk determines that Subscriber is experiencing Unusual Activity, Datarisk will classify the event as low-priority, medium-priority, high-priority, or critical- priority, as determined solely by Datarisk. Datarisk will provide notifications to Subscriber based upon the assigned level of priority. For medium-priority Unusual Activity, Datarisk will notify Subscriber by email of the Unusual Activity. For high-priority Unusual Activity, Datarisk will notify Subscriber, by all communications methods Subscriber has provided to Datarisk, within 2 hours after the Unusual Activity being classified as high-priority. For critical-priority Unusual Activity, Datarisk will notify Subscriber, by all communications methods provided to Datarisk by Subscriber, within 30 minutes after the Unusual Activity being classified as critical-priority. At the end of each reporting period, a report will be generated containing Subscriber Information, including Unusual Activity.

3.3. Limitations. The notification requirements stated in section 3.2 shall exclude periods during which (i) the Services are being updated, (ii) there is a failure of Datarisk’s or Subscriber’s internet service provider, (iii) Subscriber Information was not received by Datarisk, or (iv) there is an error or outage in the Services that is a direct result of Subscriber’s acts or omissions. Reports shall only include Subscriber Information that was received by Datarisk.

3.4. Remediation. The Services do not include any remediation assistance from Datarisk. Datarisk shall not be responsible for assisting Subscriber in correcting or eliminating any security flaw or vulnerability. The Services do not, and are not intended to, fix, remedy, prevent, or eliminate vulnerabilities or other insecurities. Remedying any vulnerabilities or insecurities is solely Subscriber’s responsibility. Any remediation assistance may be made available by Datarisk in its sole and absolute discretion and may entail an additional fee.

4. Ownership.

4.1. Ownership Rights. The Services are being licensed, not sold. Datarisk retains all ownership rights in and to the Services, including any intellectual property rights therein. 

4.2. Copyright. The Services contain material that is protected by United States and foreign intellectual property laws, including copyright, trademark, trade secret, and patent law. All rights not granted to Subscriber herein are expressly reserved by Datarisk. Subscriber shall not remove any copyright or other proprietary notice of Datarisk from the Services. 

4.3. Submissions. Any communications sent to Datarisk are the property of Datarisk or of Datarisk’s affiliates. Unless stated otherwise herein, submissions are not considered confidential, and Datarisk is not liable for any use or disclosure of a submission. Except as noted herein, Datarisk is entitled to unrestricted use of any submissions for any purpose whatsoever without compensation to the provider of the submission. 

5. Payment.

5.1. Fees. Subscriber agrees to pay all fees, including overage charges, listed on Datarisk website applicable to the Services. Datarisk may modify fees for the Services in its sole discretion. Subscriber’s failure to terminate this Agreement after a fee change is posted constitutes Subscriber’s acceptance of the amended prices, which will apply on Subscriber’s next invoice. 

5.2. Limited License. The licenses granted herein are only for the number of end-user licenses purchased by Subscriber. 

5.3. Renewal. The licenses granted herein shall automatically renew until this Agreement is terminated by Subscriber or by Datarisk. Any credit card or account provided to Datarisk to pay for the Services shall be automatically charged for the Services upon renewal. In the event that Datarisk is unable to bill the credit card or account on file or Subscriber requests that Datarisk not bill the credit card or account, Subscriber shall be solely responsible for any renewal payment required. In the event that payment is not made, the Services may become unavailable to Subscriber and Datarisk may terminate this Agreement in its sole and absolute discretion without notice to Subscriber. 

5.4. Billing Issues. Subscriber agrees to provide Datarisk notice of any billing problems or disputes within thirty (30) days after they first appear on the statement Subscriber receives from Subscriber’s bank, credit card company, or other billing company. Failure to notify Datarisk of the problem within the thirty (30) day period will result in Subscriber’s acceptance of the charges, waiving Subscriber’s right to dispute such problems or discrepancies. Datarisk does not provide any refunds for the Services. 

5.5. Service Modifications. Datarisk may at any time change, modify, add to, discontinue, or retire the Services either in whole or in part. Datarisk will provide notice of material changes to the Services or changes to this Agreement by posting such changes at www.Datarisk.com which shall be Subscriber’s sole notice of such changes. Subscriber must periodically check the website to inform yourself of any such changes. 

6. Term and Termination.

6.1. Term. This Agreement is effective until terminated by Subscriber or by Datarisk. Subscriber may only use the Services during the period for which Subscriber has paid the subscription fee. 

6.2. Termination by Subscriber. Subscriber may terminate this Agreement, after payment of all fees due, at any time by (1) notifying Datarisk of Subscriber’s intent to terminate this Agreement by email at support@Datarisk.com; and (2) uninstalling all copies of any software provided with the Services. Subscriber’s termination will be effective upon Datarisk’s receipt and processing of the email, which may take up to 24 hours. 

6.3. Termination by Datarisk. Datarisk may terminate this Agreement in its sole discretion without notice. Datarisk may refuse access or deny participation into the Services at any time. 

  6.4. Excessive Use. Datarisk may monitor its systems for excessive consumption of network resources and may take technical or other remedies deemed necessary to prevent or eliminate any excessive consumption. If Subscriber’s consumption of the Services is deemed excessive by Datarisk, based on the average use of the Services by other customers, Datarisk may terminate Subscriber’s account or adjust the price offered to Subscriber for the Services. 

6.5. Events upon Termination. Upon termination, Subscriber shall immediately cease using the Services. Datarisk may disable use of the Services or related software without further notice to Subscriber, and may remove and erase any account information, backup data, and other information stored or collected by Datarisk. No refunds shall be provided for any unused Services. 

7. Privacy.

7.1. Privacy Policy. The use of personal information by Datarisk is governed by the Datarisk privacy policy which is available at http://www.Datarisk.com/repository/css_privacy_agreem ent.html. Subscriber should periodically review this website, as Datarisk may revise the Privacy Policy at any time. Datarisk may occasionally send Subscriber communications regarding Subscriber’s account or the Services. 

7.2. Data Collection. Datarisk may collect certain information about Subscriber’s use of the Services, including, without limitation, statistics relating to the use of the Services, performance metrics relating to the Services, and configuration settings. Information collected will be sent to Datarisk and may be used by Datarisk without restriction. Datarisk may also collect information about the use of the Services to ensure compliance with this Agreement. 

7.3. Disclosure. Datarisk will disclose information where required by a subpoena, interception order or other lawful process. Datarisk may also disclose information when it believes that such disclosure is necessary to protect the rights or safety of others or to enforce, or protect Datarisk’s rights under this Agreement. 

7.4. Compliance. Subscriber shall be responsible for complying with any and all necessary privacy laws and regulations in any applicable jurisdiction(s). This includes all local, state, and Federal laws in the United States, all European Union laws or directives, and any other laws throughout the world. Subscriber shall make the appropriate and required disclosures to individuals. Pursuant to Section 10, Subscriber shall indemnify Datarisk for any alleged privacy or data security violation. 

8. Warranty Disclaimers.

8.1. Use of Internet. Reasonable effort shall be made by Datarisk to provide reliable services, but Datarisk provides the Services on the Internet and, as such, they are subject to the operation of Internet and telecommunications infrastructures which are beyond the control of Datarisk. Datarisk does not warrant that the services will be uninterrupted or that Subscriber will be able to access or use the Services at the location and times of Subscriber’s choosing. 

8.2. Warranty Disclaimer. THE SERVICES AND ACCOMPANYING SOFTWARE ARE PROVIDED “AS IS” AND “AS AVAILABLE” WITHOUT WARRANTY OF ANY KIND. ANY USE OF THE SERVICES IS AT SUBSCRIBER’S OWN RISK. DATARISK DOES NOT WARRANT THAT ANY SOFTWARE PROVIDED WILL OPERATE SUBSTANTIALLY IN ACCORDANCE WITH THE DOCUMENTATION ACCOMPANYING THAT SOFTWARE. TO THE MAXIMUM EXTENT PERMITTED BY LAW, DATARISK DISCLAIMS ALL WARRANTIES OF ANY KIND, WHETHER EXPRESSED OR IMPLIED, IN EQUITY OR AT LAW, INCLUDING IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. DATARISK DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SERVICES WILL MEET ANY REQUIREMENTS OR NEEDS SUBSCRIBER MAY HAVE, THAT ANY DEFECTS OR ERRORS IN THE SERVICES WILL BE CORRECTED, OR THAT THE SERVICES ARE COMPATIBLE WITH ANY PARTICULAR PLATFORM. SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO SUBSCRIBER. SUBSCRIBER SHALL BEAR THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE SERVICES. 

8.3. Data Transfer. ANY AND ALL MATERIAL AND/OR DATA DOWNLOADED OR OTHERWISE OBTAINED THROUGH THE USE OF THE SERVICES IS DONE AT SUBSCRIBER’S OWN RISK. SUBSCRIBER IS SOLELY RESPONSIBLE FOR THE USE OR POSSESSION OF SUCH DATA OR MATERIAL. DATARISK DOES NOT ACTIVELY MONITOR ANY INFORMATION OR MATERIAL TRANSFERRED THROUGH THE SERVICES AND CANNOT WARRANT THE CONTENT OF SUCH MATERIAL OR DATA. 

9. Limitation of Liability. IN NO EVENT SHALL DATARISK, ITS AFFILIATES, OR THEIR EMPLOYEES, AGENTS, LICENSORS OR SUPPLIERS BE LIABLE FOR (I) ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF OR RELATED TO (A) THE USE OF THE SERVICES, (B) THE DELAY OR INABILITY TO USE THE SERVICES, (C) ANY INFORMATION, DATA, OR SERVICES OBTAINED THROUGH THE SERVICES, (D) UNAUTHORIZED THIRD PARTY ACCESS TO SUBSCRIBER’S ACCOUNT, OR (E) THIS AGREEMENT; OR (II) ANY COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES. THIS LIMITATION APPLIES REGARDLESS OF WHETHER SUCH DAMAGES ARE BASED ON CONTRACT, TORT, STRICT LIABILITY OR OTHER THEORY AND SHALL APPLY EVEN IF DATARISK, ITS AFFILIATES, OR THEIR EMPLOYEES, AGENTS, LICENSORS OR SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT WILL DATARISK’S TOTAL AGGREGATE LIABILITY RESULTING FROM OR RELATED TO THIS AGREEMENT EXCEED THE FEES PAID BY SUBSCRIBER TO DATARISK UNDER THIS AGREEMENT DURING THE TWELVE (12) MONTH PERIOD IMMEDIATELY PRECEDING THE EVENT WHICH GAVE RISE TO THE CLAIM. THE LIMITATIONS HEREIN SHALL APPLY EVEN IF ANY ESSENTIAL PURPOSE OF THIS AGREEMENT FAILS TO BE MET.

10. Indemnification. Subscriber shall release, indemnify, defend and hold harmless Datarisk and its contractors, agents, employees, officers, directors, shareholders, affiliates and assigns from all liabilities, claims, damages, costs and expenses, including reasonable attorney's fees and expenses, of third parties relating to or arising out of (a) this Agreement or the breach of Subscriber’s warranties, representations and obligations under this Agreement, (b) falsehoods or misrepresentations by Subscriber, or (c) Subscriber’s violation of the intellectual property rights or other proprietary rights of a third party. When Datarisk is threatened with a suit or sued by a third party, Datarisk may seek written assurances from Subscriber concerning Subscriber’s promise to indemnify Datarisk. Failure to provide those assurances is a material breach of this Agreement. Datarisk shall have the right to participate in any defense by Subscriber of a third-party claim  related to Subscriber’s use of the Services, with counsel of Datarisk’s choice. Subscriber shall have sole responsibility to defend Datarisk against any claim, but Subscriber must receive Datarisk's prior written consent regarding any related settlement. The terms of this paragraph will survive any termination or cancellation of this Agreement. 

11. Miscellaneous.

11.1. Entire Agreement. This Agreement, including any documents referenced herein, shall constitute the entire agreement between the parties. Any waiver of this Agreement shall only be effective if it is in writing and signed by both parties. Except as otherwise provided in this Agreement, Datarisk may: (1) revise the terms and conditions of this Agreement; and/or (2) change any part of the Services. Any such revisions or changes will be binding and effective immediately upon the earlier of posting the change to www.Datarisk.com or upon notification to Subscriber by e-mail or United States mail. Subscriber agrees to periodically review the Datarisk website to be aware of any such changes. By continuing to use the Services after a change, Subscriber agrees to abide by and be bound by any such changes. Datarisk is not bound by and Subscriber may not rely on any representation by (i) an agent, representative or employee of a third party; or (ii) information posted on the Datarisk website of a general informational nature. Section headings are for reference only and are not part of the terms of this Agreement. 

11.2. Independent Contractors. Subscriber and Datarisk are independent contractors, and nothing contained in this Agreement shall be construed to designate or establish Subscriber as a partner, employee, joint venturer, or agent of Datarisk for any purpose whatsoever. 

11.3. Force Majeure. Any delays in or failure by Datarisk shall be excused to the extent that the delay or failure is beyond Datarisk’s reasonable control. Datarisk shall not be liable for any failure or problem related to access or use of the Internet. 

11.4. Severability. Any provision held invalid or unenforceable will be reformed to the minimum extent necessary to make the provision valid and enforceable. If reformation is not possible, the provision shall be omitted and the balance of this Agreement shall remain valid and enforceable. 

11.5. Governing Law; Venue. Any disputes related to the Services shall be governed by and construed in accordance with the laws of the state of New Jersey. Any actions arising out of or based on this Agreement shall be brought in the federal or state courts of New Jersey. The United Nations Convention on Contracts for the International Sale of Goods and the Uniform Computer Information Transaction Act shall not apply to this Agreement and are specifically excluded. 

11.6. Limitation on Actions. Neither party may bring any action, regardless of form, arising out of nor relating to this Agreement more than one (1) year after the cause of action has accrued. 

11.7. Non-assignment. Subscriber may not assign or delegate any of its rights or obligations under this Agreement, whether by merger, consolidation, operation of law, or any other manner, without the prior written consent of Datarisk. For purposes of this section only, a change in control is deemed an assignment. Any transfer without Datarisk’s consent renders this Agreement voidable at Datarisk's option. Datarisk may assign and delegate its rights and obligations under this Agreement. 

  11.8. Notices. All notices, demands or requests made to Datarisk with respect to this Agreement shall be in writing and mailed to Datarisk at 1255 Broad Street, Suite 100, Clifton, NJ 07013, United States. All notices to Subscriber shall be sent to the email address listed in Subscriber’s account. Datarisk shall have no obligation to provide notice or attempt to locate a customer other than through the account email address. 

11.9. Survival. All sections regarding Confidentiality, Disclaimer of Warranties, Indemnification, Limitation on Liability, Intellectual Property, Arbitration, and Miscellaneous shall survive the termination of this Agreement. 

11.10. Rights of Third Parties. There are no third party beneficiaries under this Agreement. 

12. Arbitration. To the extent permitted by law, before Subscriber may begin arbitration with respect to a dispute involving any aspect of this Agreement, Subscriber shall notify Datarisk, and any other party to the dispute for the purpose of seeking dispute resolution. If the dispute is not resolved within sixty (60) days after the initial notice, then a party may proceed in accordance with the following:

(i) Any unresolved dispute arising under the terms of this Agreement shall be decided by arbitration conducted through the services of the American Arbitration Association (hereinafter referred to as the “AAA”).

(ii) Notice of demand for an arbitration hearing shall be in writing and properly served upon the parties to this Agreement. Arbitration hearings shall be held in the state of New Jersey at a location mutually agreeable to the parties.

(iii) There shall be one Arbitrator to hear the matter. The parties shall initially agree to a panel of 3 possible Arbitrators to hear the matter and each party shall have the opportunity to name one Arbitrator to be dropped from the panel until one remains. The party giving notice of the Arbitration demand shall be first to indicate its selection.

(iv) All costs of the Arbitration and the AAA shall be borne equally by both parties to this Agreement, regardless of the final decision. The defaulting party as determined by the Arbitrator, shall pay all other costs and expenses, including reasonable attorney’s fees, incurred by the party in enforcing its rights under this Agreement.

BY CLICKING “I ACCEPT” BELOW, YOU AGREE THAT YOU HAVE READ AND UNDERSTAND THIS AGREEMENT AND THAT YOU WILL BE BOUND BY AND COMPLY WITH ALL OF ITS TERMS AND CONDITIONS. DO NOT CLICK THE “I ACCEPT” BUTTON IF YOU DO NOT AGREE TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT. 


SCHEDULE A 

Open Source Software

Copies of the following licenses are provided at the following links: 

i. Artistic License (hereinafter “Artistic License v1”): http://dev.perl.org/licenses/artistic.html 

  ii. GNU General Public License version 2 (hereinafter “GPLv2”): http://www.gnu.org/licenses/old-licenses/gpl-2.0.en.html 

iii. GNU General Public License version 3 (hereinafter “GPLv3”): http://www.gnu.org/licens es/gpl-3.0.en.html

The following applies to components licensed under GPLv2 or GPLv3 (hereinafter, the “GPL”): The Service may include components that are licensed or sublicensed under the GPL. The GPL permits users to use, copy, modify, or redistribute modules. A copy of the GPL license can be found in this schedule. All open-source software components are licensed free of charge. 

Datarisk does not provide a warranty for these components. For 3 years following your purchase of the Product, Datarisk will provide, for a charge reflecting Datarisk’s distribution costs, the complete machine-readable copy of the modified software modules that are covered by GPL. To obtain a complete machine-readable copy of the corresponding source code, verbatim or modified, on a medium customarily used for software interchange, please send your written request to opensourcesoftware@Datarisk.com. Please include your name, address, telephone number, email address, the product you purchased, and the specific software components. You may copy and distribute verbatim copies of this source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty, keep intact all the notices that refer to the GPL and to the absence of any warranty, and give any other recipients of the program a copy of the GPL along with the program.

Components licensed to Datarisk under the terms of Perl itself are, where applicable, modified and redistributed by Datarisk under the Artistic License v1. 

The following applies to JSON: Copyright (c) 2002 JSON.org 

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

The Software shall be used for Good, not Evil.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND

 

NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

The following applies to YAML::Syck 

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

The following applies to jQuery UI 

Copyright jQuery Foundation and other contributors, https://jquery.org/

This software consists of voluntary contributions made by many individuals. For exact contribution history, see the revision history available at https://github.com/jquery/jquery-ui

The following license applies to all parts of this software except as documented below:

====

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: 

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

 

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. 

====

Copyright and related rights for sample code are waived via CC0. Sample code is defined as all source code contained within the demos directory.

CC0: http://creativecommons.org/publicdomain/zero/1.0/

====

All files located in the node_modules and external directories are externally maintained libraries used by this software which have their own licenses; we recommend you read them, as their terms may differ from the terms above.

The following applies to jQuery Bonsai and jQuery Qubit:

The MIT License (MIT) Copyright (c) 2014 Simon Wade

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.


*Eligible business must be a member in good standing of a Chamber of Commerce or approved professional association.
© Copyright Datarisk Canada - All Rights Reserved