Choose language

ATLAS Access
End User License And Service Access Agreement

 This End User License and Service Access Agreement, (“Agreement”) is a binding agreement between TKH Security B.V., a Dutch company, with its corporate registered address located at Werner von Siemensstraat 7, 2712 PN Zoetermeer, The Netherlands. Registered at the Dutch Chamber of Commerce with registration number 30191139 (“TKH Security”) and the individual that clicks the “I Agree” button at the end of this Agreement (“User”). User and TKH Security enter this Agreement because TKH Security already has entered into a certain Software License Agreement (the “Definitive Agreement”), either with User’s employer or another person or entity that has acquired goods and services from TKH Security (“Customer”) and such Customer has authorized User to use, or access said goods and services.
TKH Security provides the software and access to certain TKH Security services (including access to software provided as a service) to the User (“you” or “User”) solely on the terms and conditions set forth herein, and subject to the additional terms of the definitive agreement which bind Customer. The software and services are provided to you on the condition that you accept and comply with the terms of this agreement and Customer’s continued compliance with the definitive agreement. By clicking the “accept” button that appears at the end of this agreement you (a) accept this agreement and agree that you are legally bound by its terms, and (b) represent and warrant that: (i) you are of legal age to enter into a binding agreement and (ii) you have been authorized to access the software and services by Customer of TKH Security. If you do not agree to the terms of this agreement, you should not indicate your agreement by clicking below, and you are not authorized to download or use the software or access the services.

  1. Limited License Grant And Access Rights.
    Subject to the terms and conditions of this Agreement and the Definitive Agreement TKH Security hereby grants to User a non-exclusive, non-transferable, non-sublicensable, revocable right and license during the term of the Definitive Agreement to: (a) use and execute the ATLAS Access Mobile and Web App(s) (“App”) identified in the Definitive Agreement for User’s personal purposes only; and (b) to access additional TKH Security software hosted remotely by TKH Security as a service (“Services”). The specific Software and Services User is granted limited rights to use and access hereunder are specified in the Definitive Agreement.

  2. Limitations On License And Use Of Services; Reservation Of Rights And Customer Representations And Warranties
    1. No Implied Licenses or Other Authorizations. User acknowledges that, except as expressly stated in this Agreement, User receives no other right, authorization or licenses under this Agreement and all such rights are reserved to TKH Security. User acknowledges that, as between the Parties, TKH Security owns all intellectual property rights and proprietary interests that are embodied in the Software, Services and Documentation.
    2. “>User Representations Regarding Use of Software and Access to Services.
      • (a) User agrees not to act outside the scope of the rights that are expressly granted by TKH Security in this Agreement. Specifically, User represents that it shall not:
        • (1) use the Services, any Software or Documentation in any manner that is inconsistent with this Agreement;
        • (2) authorize access to or permit use of the Services, the Software or Documentation by persons other than User;
          (3) assign, sublicense, sell, lease or otherwise transfer or convey, or pledge as security or otherwise encumber, Customer’s or User’s rights under the licenses an d authorizations granted in this Agreement;
        • (4) modify or create any works comprised of, consisting or based upon all or any portion of the Software, Services, or Documentation;
        • (5) decompile, disassemble, reverse engineer or otherwise attempt to obtain or perceive the source code from which any component of the SaaS Services or the Base Software and any underlying software is compiled or interpreted, and User hereby acknowledges that nothing in this Agreement shall be construed to grant Customer or User any right to obtain or use such source code;
        • (6) access or use the Software, Services or Documentation in any manner or for any purpose that infringes, misappropriates, or otherwise violates any intellectual property rights or other right of any third party, or that otherwise violates any law applicable to the access or use of the Services or Documentation;
        • (7) use, copy, reproduce, display, edit or publish the Software or Documentation except as expressly agreed herein;
          (8) allow any third party to use or access the Services or the Software on an application service provider (“ASP”) basis for its or their own ASP or software-as-a-service offering;
        • (9) create Internet “links” to the Services or copy, “frame” or “mirror” the Services (or any part thereof) on any other server or wireless or Internet-based device;
        • (10) access the Software or Services (or any part thereof) for purposes of monitoring its availability, performance or functionality, or for any other benchmarking or competitive purposes, or in order to build a competitive product or service;
        • (11) perform penetration testing of TKH Security’s web site and/or the hosted environment for the Services, or other web application to (i) identify security weaknesses or to find security vulnerabilities that may be subject to attack or other exploitation, including gathering information about the target before the test, identifying possible entry points, attempting to break in — either virtually or for real — and reporting back the findings, or (ii) test TKH Security’s security policy, its adherence to compliance requirements, its employees’ security awareness and its ability to identify and respond to security incidents; or
        • (12) use or allow any other person or entity to use the Software, or Services to:
          • (A) send “spam” or unsolicited messages in violation of applicable laws;
          • (B) send or store infringing, obscene, threatening, libellous, or otherwise unlawful or tortious material, including material harmful to children or violative of third-party privacy rights;
          • (C) send or store material containing software viruses, worms, Trojan horses or other harmful computer code, files, scripts, agents or
            programs; or
          • (D) modify, interfere with or disrupt the integrity or performance of the Services (including the data contained therein); or
          • (E) attempt to gain or permit unauthorized access to the hosted environment, the Services or TKH Security’s (or its agents’) systems or
          • (F) upload, post, store, view, transmit, distribute or otherwise publish through the Services any content that (i) restricts or inhibits any other person from using and enjoying the Services or the Software, (ii) is unlawful, threatening, harassing, abusive, libellous, defamatory,
            obscene, vulgar, offensive, pornographic, profane, sexually explicit, invasive of another’s privacy, hateful, tortious or indecent; (iii)
            constitutes or encourages conduct that would constitute a criminal offense, give rise to civil liability or otherwise violate any applicable
            local, state, national or international law; (iv) violates, plagiarizes, or infringes the rights of third parties, including, but not limited to,
            intellectual property rights, rights of privacy or publicity or any other proprietary rights; (v) contains any viruses, Trojan horses, worms, time bombs, cancelbots, or other harmful components that are intended to damage, detrimentally interfere with, surreptitiously intercept or expropriate any system, data or personal information, (vi) constitutes or contains false or misleading indications of origin or statements of fact; or (vii) would harm minors in any way.
    3. License Control. User acknowledges and agrees that (i) the Software including the software that is delivered as part of the Services may contain code or require devices that detect or prevent unauthorized use of the Software and/or that will disable the Software if it so detects unauthorized use.
User shall not avoid, circumvent, or disable any security device, procedure, protocol, or mechanism that TKH Security may include, require or establish with respect to the Software or the Services.
    4. Suspension or Termination of Use of Software and/or Services. TKH Security may, directly or indirectly, and by use of any lawful means, suspend, terminate, or otherwise deny User’s access to or use of all or any part of the Software, Services, and Documentation, without incurring any resulting obligation or liability, if: (a) TKH Security receives a judicial or other governmental demand or order, subpoena, or law enforcement request that expressly or by reasonable implication requires TKH Security to do so; or (b) TKH Security believes, in its good faith and reasonable discretion, that: (i) User has failed to comply with any material term of this Agreement, or accessed or used the Software, Documentation or Services beyond the scope of the rights granted or for a purpose not authorized under this Agreement or the Definitive Agreement; (ii) Authorized User is, has been, or is likely to be involved in any fraudulent, misleading, or unlawful activities relating to or in connection with the Software or the Services; or (iii) this Agreement expires or is terminated. This Section does not limit any of TKH Security’s other rights or remedies, whether at law, in equity, or under this Agreement.

  3. Access And Security; Privacy
    1. User Credentials. User is exclusively responsible for maintaining the security and integrity of his/her user credentials used to access the Services, Software and Documentation and shall employ all physical, administrative, and technical controls, screening, and security procedures and other safeguards necessary to protect against any unauthorized access to or use of the User’s access credentials.
    2. Data Protection. The use of the App implies the processing of certain personal data of the User as is described in TKH Security’s Privacy Policy.
    3. User Notices. TKH Security reserves the right, and User expressly agrees that TKH Security may notify User of the Services of important announcements regarding the operation of the Services and other announcements related to the Service and User therefore accordingly agrees: (a) to receive such notices; and (b) that the User will not have the option of opt out of receiving such notices.

  4. Fees
    1. User expressly acknowledges and agrees that continued use of and access to the Software, Services and Documentation is dependent on Customer payment of fees set out in the Definitive Agreement. Subject to the terms of the Definitive Agreement, TKH Security is entitled to suspend or terminate User’s use of the Software, Services and Documentation if Customer fails to make timely payment of Fees.

  5. Representations; Disclaimer Of Warranties
    1. User represents that he/she has been duly authorized by Customer to access and use the Software, Services and Documentation hereunder.
    2. DISCLAIMER. The services, software, documentation, and all other products and services performed or provided by TKH Security are performed and provided “as is,” and TKH Security disclaims any and all promises, representations and warranties, whether express or implied, including, but not limited to, any implied warranties of
      Merchantability, fitness for a particular purpose, non-infringement, quiet enjoyment, system integration and/or data accuracy. TKH Security does not warrant that the services, software, documentation, and all services performed by TKH Security will meet customer’s or user’s requirements or that the operation of the services, software, documentation, and all services performed by TKH Security will operate in customer’s, user’s or any computer environment, be uninterrupted or error-free, or that all errors will be corrected.

  6. Indemnification
    1. User’s Indemnity Obligations. User agrees to indemnify, defend and hold harmless TKH Security from and against any and all losses, liabilities, costs, expenses (including reasonable attorneys’ fees) or damages resulting from any claim by any third party based upon or arising from (a) User’s gross negligence or willful misconduct; (b) User’s infringement, misappropriation or violation of any third-party proprietary right, including copyright, patent, trade secret, right of publicity, right of privacy, and trademark rights, or other violation of rights arising from the use of the Software or Services by User.

  7. Disclaimer Of Liability
    1. In no event will TKH Security or any of its service providers engaged in connection with the software or services contemplated for use herein be liable to you for any use, interruption, delay, or inability to use the software, documentation or service. You are provided the software, services and documentation pursuant to the definitive agreement between TKH Security and customer, solely for the benefit of customer and at customer’s discretion. You acknowledge that you have no rights under the definitive agreement including any rights to enforce any of its terms. Any obligation or liability TKH Security or any of its service providers, may have with respect to your use or inability to use the software, services or documentation shall be solely to customer pursuant to that agreement and subject to all limitations of liability set forth therein.

  8. Term And Termination
    1. Term of Agreement. This Agreement shall become effective when the User indicates its agreement to the terms and conditions hereof and, except as specified herein, will remain in effect for the shorter of a) the length of the term (or any renewal term) of the Definitive Agreement, or b) the length of time that User is a duly authorized User designated by the Customer. TKH Security reserves the right to terminate this Agreement if User breaches any term or condition of this Agreement.
    2. Consequences of termination. Effective immediately upon expiration or termination of this Agreement, all access rights and licenses granted under this Agreement will become void, and User shall have no continuing rights to use any Confidential Information.

  9. Miscellaneous Provisions
    1. Processor is not permitted to (completely or partially) transfer or outsource to third parties its obligations that stem from this Agreement, unless Controller has provided prior written consent for this purpose and subject to the provisions in the Main Agreement. 
    2. Parties explicitly agree that the Controller’s general terms and conditions (of purchase) are not applicable to this Agreement. 
    3. This Agreement will be entered into for the duration of the term of the Main Agreement. 
    4. This Agreement takes effect after signing of the Agreement by both Parties. 
    5. In the event that one or more provisions of this Agreement should turn out to be null or void, the other provisions of this Agreement will remain fully in force. In that event, Parties are obligated to replace a void provision with a provision which is legally binding and deviates as little as possible – given the purpose and intent of this Agreement – from the void provision. 
    6. This Agreement can only be prematurely terminated in whole or in part if Parties agree to such in writing. In absence of such written consent, this Agreement cannot be wholly or partially dissolved extrajudicially. If this Agreement contains any provisions which are, by their nature, intended to persist after termination, then these will fully remain in force. 
    7. Changes or additions to this Agreement are only binding if they have been agreed to in writing. 
    8. If laws and regulations change in such a manner that the Agreement no longer satisfies the requirements laid down in laws and/or regulations, Parties will adjust the Agreement in mutual consultation in accordance with these amended laws and/or regulations.