5.2. When the activation code is used to activate the software to verify the legal use of the software, the end user undertakes to regularly provide the rightholder with the following information: type, version and location of the installed software, versions of installed updates, identification of the computer and identifier of the installation of the software on the computer, activation code and unique identifier of the activation of the a License ktuelle, the type, version and size of the operating system words, the name of the virtual environment when the software is installed in the virtual environment, and the identifiers of the software components active at the time the information is transmitted. Some data is not personal, in accordance with the legislation of certain countries. Regardless of the type of data and the area in which the data was received or processed, we apply the highest data protection standards and apply various legal, organizational and technical measures to protect user data, guarantee security and confidentiality and guarantee the rights of users guaranteed by current legislation. This information is analyzed to warn users of unsecured (i.e. poorly protected) Wi-Fi access points and prevent personal data from being accidentally intercepted. 14.1. This Agreement is the entire agreement between you and the Rightholder and supersedes all other prior agreements, proposals, communications or advertisements, orally or in writing, with respect to the Software or the subject matter of this Agreement. You confirm that you have read this agreement, that you understand it and that you agree to be subject to its terms.
If, for any reason, any provision of this Agreement is held by a court of competent jurisdiction to be invalid, void or unenforceable, in whole or in part, that provision shall be interpreted more narrowly, so that it shall become legal and enforceable, and the entire Agreement shall not fail and the balance of the Agreement shall remain in full force and effect: as long as it is permitted by law or by the law of equity. retain its original intent to the extent possible. No waiver of any provision or condition shall be valid therea, unless signed in writing and by an authorized representative of the rightholder, provided that no waiver of a breach of the provisions of this Agreement constitutes a waiver of any prior, simultaneous or subsequent breach. The fact that the rightholder does not insist on the strict observance or application of any provision of this Agreement or of a right shall not be construed as a waiver of such provision or right. 5.10. The End User shall be fully liable, with respect to the Rightholder, for any damage resulting from a breach of this License Agreement, in particular the End User`s inability to obtain, where applicable, effective consent from the data subject and/or the lack of sufficient effective consent and/or the absence of evidence and/or late proof of effective consent of the data subject and/or other breach an obligation under this Agreement. This information helps to establish lists of harmless applications and prevents security products from incorrectly identifying these applications as malicious. This data is also used to update and expand program categories for functions such as child safety and app startup command. In addition, this information helps us to offer users security solutions that best meet their needs. Data such as device type, operating system, etc., may be required so that the user does not have to acquire a new license for the security product after reinstalling the operating system. This information also helps us analyze cyber threats, as it shows how many devices are affected by a particular threat.